Month End Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

GIAC GCCC GIAC Critical Controls Certification (GCCC) Exam Practice Test

Demo: 13 questions
Total 93 questions

GIAC Critical Controls Certification (GCCC) Questions and Answers

Question 1

As part of an effort to implement a control on E-mail and Web Protections, an organization is monitoring their webserver traffic. Which event should they receive an alert on?

Options:

A.

The number of website hits is higher that the daily average

B.

The logfiles of the webserver are rotated and archived

C.

The website does not respond to a SYN packet for 30 minutes

D.

The website issues a RST to a client after the connection is idle

Question 2

Which of the following CIS Controls is used to manage the security lifecycle by validating that the documented controls are in place?

Options:

A.

Controlled Use of Administrative Privilege

B.

Account Monitoring and Control

C.

Data Protection

D.

Penetration Tests and Red Team Exercises

Question 3

Which of the following assigns a number indicating the severity of a discovered software vulnerability?

Options:

A.

CPE

B.

CVE

C.

CCE

D.

CVSS

Question 4

Which of the following will decrease the likelihood of eavesdropping on a wireless network?

Options:

A.

Broadcasting in the 5Ghz frequency

B.

Using Wired Equivalent Protocol (WEP)

C.

Using EAP/TLS authentication and WPA2 with AES encryption

D.

Putting the wireless network on a separate VLAN

Question 5

What is the list displaying?

Options:

A.

Allowed program in a software inventory application

B.

Unauthorized programs detected in a software inventory

C.

Missing patches from a patching server

D.

Installed software on an end-user device

Question 6

An organization is implementing an application software security control their custom-written code that provides web—based database access to sales partners. Which action will help mitigate the risk of the application being compromised?

Options:

A.

Providing the source code for their web application to existing sales partners

B.

Identifying high-risk assets that are on the same network as the web application server

C.

Creating signatures for their IDS to detect attacks specific to their web application

D.

Logging the connection requests to the web application server from outside hosts

Question 7

Implementing which of the following will decrease spoofed e-mail messages?

Options:

A.

Finger Protocol

B.

Sender Policy Framework

C.

Network Address Translation

D.

Internet Message Access Protocol

Question 8

An organization has failed a test for compliance with a policy of continual detection and removal of malicious software on its network. Which of the following errors is the root cause?

Options:

A.

A host ran malicious software that exploited a vulnerability for which there was no patch

B.

The security console alerted when a host anti-virus ran whitelisted software

C.

The intrusion prevention system failed to update to the newest signature list

D.

A newly discovered vulnerability was not detected by the intrusion detection system

Question 9

Which of the following actions will assist an organization specifically with implementing web application software security?

Options:

A.

Making sure that all hosts are patched during regularly scheduled maintenance

B.

Providing end-user security training to both internal staff and vendors

C.

Establishing network activity baselines among public-facing servers

D.

Having a plan to scan vulnerabilities of an application prior to deployment

Question 10

An organization has created a policy that allows software from an approved list of applications to be installed on workstations. Programs not on the list should not be installed. How can the organization best monitor compliance with the policy?

Options:

A.

Performing regular port scans of workstations on the network

B.

Auditing Active Directory and alerting when new accounts are created

C.

Creating an IDS signature to alert based on unknown “User-Agent ” strings

D.

Comparing system snapshots and alerting when changes are made

Question 11

To effectively implement the Data Protection CIS Control, which task needs to be implemented first?

Options:

A.

The organization’s proprietary data needs to be encrypted

B.

Employees need to be notified that proprietary data should be protected

C.

The organization’s proprietary data needs to be identified

D.

Appropriate file content matching needs to be configured

Question 12

An organization is implementing a control for the Limitation and Control of Network Ports, Protocols, and Services CIS Control. Which action should they take when they discover that an application running on a web server is no longer needed?

Options:

A.

Uninstall the application providing the service

B.

Turn the service off in the host configuration files

C.

Block the protocol for the unneeded service at the firewall

D.

Create an access list on the router to filter traffic to the host

Question 13

What is a zero-day attack?

Options:

A.

An attack that has a known attack signature but no available patch

B.

An attack that utilizes a vulnerability unknown to the software developer

C.

An attack that deploys at the end of a countdown sequence

D.

An attack that is launched the day the patch is released

Demo: 13 questions
Total 93 questions