New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC GCCC Exam - Topic 5 Question 13 Discussion

Actual exam question for GIAC's GCCC exam
Question #: 13
Topic #: 5
[All GCCC Questions]

Allied services have recently purchased NAC devices to detect and prevent non-company owned devices from attaching to their internal wired and wireless network. Corporate devices will be automatically added to the approved device list by querying Active Directory for domain devices. Non-approved devices will be placed on a protected VLAN with no network access. The NAC also offers a web portal that can be integrated with Active Directory to allow for employee device registration which will not be utilized in this deployment. Which of the following recommendations would make NAC installation more secure?

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

0/2000 characters
Kirk
4 months ago
Changing the wireless password seems a bit overkill after NAC setup.
upvoted 0 times
...
Rima
4 months ago
Daily inventory updates from AD? Definitely a must!
upvoted 0 times
...
Rosio
4 months ago
Wait, why wouldn't they use the device registration feature? Seems odd.
upvoted 0 times
...
Mica
4 months ago
I think disabling the web portal is a smart move.
upvoted 0 times
...
Lashonda
5 months ago
Sounds like a solid plan with the NAC devices!
upvoted 0 times
...
Vilma
5 months ago
Changing the wireless password after implementing NAC sounds like a basic security measure, but I wonder if it's really necessary if the NAC is already in place.
upvoted 0 times
...
Bettina
5 months ago
I feel like disabling the web portal is a good idea since we're not using it, but I'm not completely confident if that alone would enhance security.
upvoted 0 times
...
Pilar
5 months ago
I remember a practice question about updating inventories; configuring Active Directory to push updates daily seems like it would keep the NAC current.
upvoted 0 times
...
Lili
5 months ago
I'm not entirely sure, but I think enforcing company configuration standards for personal devices could help prevent vulnerabilities.
upvoted 0 times
...
Mari
5 months ago
I think I've got this one. The key is to define an SLA for Vulnerability Response, so I'd go with option D - make sure I have the right role and use the baseline SLA Application Modules.
upvoted 0 times
...
Alexia
5 months ago
Hmm, I'm not sure about this one. I'll have to think it through carefully to make sure I get the right component.
upvoted 0 times
...
Darrin
5 months ago
Hmm, I'm a bit unsure about the difference between the risk strategies here. I'll need to think this through carefully.
upvoted 0 times
...
Milly
5 months ago
C looks good to me. Credit card statements reveal business connections and contacts, which could be super useful in an investigation.
upvoted 0 times
...

Save Cancel