Exam Details

  • Exam Code
    :GCCC
  • Exam Name
    :GCCC - GIAC Critical Controls Certification (GCCC)
  • Certification
    :Cyber Security
  • Vendor
    :GIAC
  • Total Questions
    :93 Q&As
  • Last Updated
    :May 13, 2024

GIAC Cyber Security GCCC Questions & Answers

  • Question 21:

    Which of the following is a reliable way to test backed up data?

    A. Verify the file size of the backup

    B. Confirm the backup service is running at the proper time

    C. Compare data hashes of backed up data to original systems

    D. Restore the data to a system

  • Question 22:

    As part of a scheduled network discovery scan, what function should the automated scanning tool perform?

    A. Uninstall listening services that have not been used since the last scheduled scan

    B. Compare discovered ports and services to a known baseline to report deviations

    C. Alert the incident response team on ports and services added since the last scan

    D. Automatically close ports and services not included in the current baseline

  • Question 23:

    An organization is implementing a control within the Application Software Security CIS Control. How can they best protect against injection attacks against their custom web application and database applications?

    A. Ensure the web application server logs are going to a central log host

    B. Filter input to only allow safe characters and strings

    C. Configure the web server to use Unicode characters only

    D. Check user input against a list of reserved database terms

  • Question 24:

    Executive management approved the storage of sensitive data on smartphones and tablets as long as they were encrypted. Later a vulnerability was announced at an information security conference that allowed attackers to bypass the device's authentication process, making the data accessible. The smartphone manufacturer said it would take six months for the vulnerability to be fixed and distributed through the cellular carriers. Four months after the vulnerability was announced, an employee lost his tablet and the sensitive information became public.

    What was the failure that led to the information being lost?

    A. There was no risk acceptance review after the risk changed

    B. The employees failed to maintain their devices at the most current software version

    C. Vulnerability scans were not done to identify the devices that we at risk

    D. Management had not insured against the possibility of the information being lost

  • Question 25:

    To effectively implement the Data Protection CIS Control, which task needs to be implemented first?

    A. The organization's proprietary data needs to be encrypted

    B. Employees need to be notified that proprietary data should be protected

    C. The organization's proprietary data needs to be identified

    D. Appropriate file content matching needs to be configured

  • Question 26:

    Which activity increases the risk of a malware infection?

    A. Charging a smartphone using a computer USB port

    B. Editing webpages with a Linux system

    C. Reading email using a plain text email client

    D. Online banking in Incognito mode

  • Question 27:

    What documentation should be gathered and reviewed for evaluating an Incident Response program?

    A. Staff member interviews

    B. NIST Cybersecurity Framework

    C. Policy and Procedures

    D. Results from security training assessments

  • Question 28:

    Review the below results of an audit on a server. Based on these results, which document would you recommend be reviewed for training or updates?

    A. Procedure for authorizing remote server access

    B. Procedure for modifying file permissions

    C. Procedure for adjusting network share permissions

    D. Procedure for setting and resetting user passwords

  • Question 29:

    Janice is auditing the perimeter of the network at Sugar Water InC. According to documentation, external SMTP traffic is only allowed to and from 10.10.10.25. Which of the following actions would demonstrate the rules are configured incorrectly?

    A. Receive spam from a known bad domain

    B. Receive mail at Sugar Water Inc. account using Outlook as a mail client

    C. Successfully deliver mail from another host inside the network directly to an external contact

    D. Successfully deliver mail from web client using another host inside the network to an external contact.

  • Question 30:

    Dragonfly Industries requires firewall rules to go through a change management system before they are configured. Review the change management log. Which of the following lines in your firewall ruleset has expired and should be removed from the configuration?

    A. access-list outbound permit tcp host 10.1.1.7 any eq smtp

    B. access-list outbound deny tcp any host 74.125.228.2 eq www

    C. access-list inbound permit tcp 8.8.0.0 0.0.0.255 10.10.12.252 eq 8080

    D. access-list inbound permit tcp host 8.8.207.97 host 10.10.12.100 eq ssh

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only GIAC exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your GCCC exam preparations and GIAC certification application, do not hesitate to visit our Vcedump.com to find your solutions here.