Big Halloween Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the GIAC Cyber Security GCCC Questions and answers with CertsForce

Viewing page 2 out of 3 pages
Viewing questions 11-20 out of questions
Questions # 11:

Acme Corporation performed an investigation of its centralized logging capabilities. It found that the central server is missing several types of logs from three servers in Acme's inventory. Given these findings, what is the most appropriate next step?

Options:

A.

Define processes to manually review logs for the problem servers


B.

Restart or reinstall the logging service on each of the problem servers


C.

Perform analysis to identify the source of the logging problems


D.

Document the missing logs in the core evaluation report as a minor issue


Expert Solution
Questions # 12:

Which of the following is a benefit of stress-testing a network?

Options:

A.

To determine device behavior in a DoS condition.


B.

To determine bandwidth needs for the network.


C.

To determine the connectivity of the network


D.

To determine the security configurations of the network


Expert Solution
Questions # 13:

An Internet retailer's database was recently exploited by a foreign criminal organization via a remote attack. The initial exploit resulted in immediate root-level access. What could have been done to prevent this level of access being given to the intruder upon successful exploitation?

Options:

A.

Configure the DMZ firewall to block unnecessary service


B.

Install host integrity monitoring software


C.

Install updated anti-virus software


D.

Configure the database to run with lower privileges


Expert Solution
Questions # 14:

What is the first step suggested before implementing any single CIS Control?

Options:

A.

Develop an effectiveness test


B.

Perform a gap analysis


C.

Perform a vulnerability scan


D.

Develop a roll-out schedule


Expert Solution
Questions # 15:

Below is a screenshot from a deployed next-generation firewall. These configuration settings would be a defensive measure for which CIS Control?

Question # 15

Options:

A.

Controlled Access Based on the Need to Know


B.

Limitation and Control of Network Ports, Protocols and Services


C.

Email and Web Browser Protections


D.

Secure Configuration for Network Devices, such as Firewalls, Routers and Switches.


Expert Solution
Questions # 16:

The settings in the screenshot would be configured as part of which CIS Control?

Question # 16

Options:

A.

Application Software Security


B.

Inventory and Control of Hardware Assets


C.

Account Monitoring and Control


D.

Controlled Use of Administrative Privileges


Expert Solution
Questions # 17:

Which of the following is necessary for implementing and automating the Continuous Vulnerability Assessment and Remediation CIS Control?

Options:

A.

Software Whitelisting System


B.

System Configuration Enforcement System


C.

Patch Management System


D.

Penetration Testing System


Expert Solution
Questions # 18:

Which of the following statements is appropriate in an incident response report?

Options:

A.

There had been a storm on September 27th that may have caused a power surge


B.

The registry entry was modified on September 29th at 22:37


C.

The attacker may have been able to access the systems due to missing KB2965111


D.

The backup process may have failed at 2345 due to lack of available bandwidth


Expert Solution
Questions # 19:

Which type of scan is best able to determine if user workstations are missing any important patches?

Options:

A.

A network vulnerability scan using aggressive scanning


B.

A source code scan


C.

A port scan using banner grabbing


D.

A web application/database scan


E.

A vulnerability scan using valid credentials


Expert Solution
Questions # 20:

An administrator looking at a web application’s log file found login attempts by the same host over several seconds. Each user ID was attempted with three different passwords. The event took place over 5 seconds.

    ROOT

    TEST

    ADMIN

    SQL

    USER

    NAGIOSGUEST

What is the most likely source of this event?

Options:

A.

An IT administrator attempting to use outdated credentials to enter the site


B.

An attempted Denial of Service attack by locking out administrative accounts


C.

An automated tool that attempts to use a dictionary attack to infiltrate a website


D.

An attempt to use SQL Injection to gain information from a web-connected database


Expert Solution
Viewing page 2 out of 3 pages
Viewing questions 11-20 out of questions