New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC GCCC Exam - Topic 6 Question 35 Discussion

Actual exam question for GIAC's GCCC exam
Question #: 35
Topic #: 6
[All GCCC Questions]

Which of the following CIS Controls is used to manage the security lifecycle by validating that the documented controls are in place?

Show Suggested Answer Hide Answer
Suggested Answer: D

Contribute your Thoughts:

0/2000 characters
Fabiola
3 months ago
Surprised that people think B is the answer, I always thought it was more about A!
upvoted 0 times
...
Callie
3 months ago
A is crucial too, but I see why B is the answer.
upvoted 0 times
...
Stevie
3 months ago
Wait, is it really B? I thought it was C!
upvoted 0 times
...
Glen
4 months ago
I disagree, I feel like D is more relevant here.
upvoted 0 times
...
Cristal
4 months ago
I think it's definitely B, Account Monitoring and Control.
upvoted 0 times
...
Nicolette
4 months ago
I’m leaning towards C, but I’m not confident. Data protection seems important, but does it really manage the security lifecycle?
upvoted 0 times
...
Salina
4 months ago
I practiced a question similar to this, and I think it was about administrative privileges. So maybe A?
upvoted 0 times
...
Keva
4 months ago
I feel like it's B, but I can't recall if that specifically covers the lifecycle aspect. I need to double-check my notes.
upvoted 0 times
...
Barbra
5 months ago
I think it might be D, but I'm not entirely sure. I remember something about validating controls in the context of penetration tests.
upvoted 0 times
...
Moira
5 months ago
I think the answer is B - Account Monitoring and Control. That control is specifically about managing user accounts and privileges, which seems like it would be the best way to validate the documented security controls are in place. I'm pretty confident in that one.
upvoted 0 times
...
Shayne
5 months ago
I'm a bit confused on this one. I was considering A - Controlled Use of Administrative Privilege, since that's about managing access and privileges. But I'm not sure if that's the best fit for the question. Hmm, I'll have to think about it some more.
upvoted 0 times
...
Galen
5 months ago
Okay, let me think this through. The question is asking about validating the documented controls, so I'm leaning towards C - Data Protection. That control is all about ensuring the security controls are actually in place and working.
upvoted 0 times
...
Martina
5 months ago
Hmm, I'm not totally sure about this one. I was thinking maybe it could be D - Penetration Tests and Red Team Exercises, since that's about validating the security controls. But I'm not 100% confident on that.
upvoted 0 times
...
Earnestine
5 months ago
This one seems pretty straightforward. I think the answer is B - Account Monitoring and Control, since that's all about managing user accounts and privileges.
upvoted 0 times
...
Ricarda
5 months ago
Hmm, I'm a bit unsure about the relationship between Hive and MapReduce. I'll need to think through that part carefully.
upvoted 0 times
...
Nikita
5 months ago
Hmm, I'm a bit unsure here. The options seem a bit vague. I'd want to get more context before deciding how to approach this.
upvoted 0 times
...
Annice
5 months ago
This looks like a pretty straightforward question. I think the key is to identify the serverless components that can handle the different aspects of the requirement - running the script, sending email notifications, and processing the email responses.
upvoted 0 times
...
Leonora
5 months ago
I'm not sure, but I remember discussing that undifferentiated marketing means offering the same product to all. Could it be that?
upvoted 0 times
...
Sina
5 months ago
Isn't 21 typically for FTP? I just hope I don't mix them up during the exam.
upvoted 0 times
...
Jimmie
5 months ago
Ah, this is a tricky one. There are a few different documents that could potentially help, but I think the key is figuring out what's going to be most useful for this specific situation. Based on the information provided, I'm leaning towards the requirements document as the best recommendation. That will allow them to really nail down the purpose and target audience before moving forward with the design.
upvoted 0 times
...
Laquita
9 months ago
Wait, is this a pop quiz? I didn't study for this! *panicked laughter* Seriously though, I'm stuck between B and D. Decisions, decisions...
upvoted 0 times
...
Lazaro
9 months ago
Ha! Trick question, right? Obviously, the answer is A. Controlled use of administrative privilege is the key to managing the security lifecycle. Gotta keep those admins on a tight leash!
upvoted 0 times
...
Vi
9 months ago
Oooh, this is a tough one. I'm leaning towards C, since data protection is such a fundamental part of the security lifecycle. But I could be wrong...
upvoted 0 times
Inocencia
8 months ago
I'm still not sure, but I'll go with C for now.
upvoted 0 times
...
Veda
8 months ago
True, account monitoring is essential for ensuring security measures are in place.
upvoted 0 times
...
Detra
8 months ago
I agree, but I think B might also be important for managing security controls.
upvoted 0 times
...
Becky
9 months ago
I think C is a good choice, data protection is crucial for security.
upvoted 0 times
...
...
Garry
9 months ago
I'm going with B. Account monitoring and control is crucial for managing the security lifecycle and ensuring the documented controls are actually being implemented.
upvoted 0 times
Dottie
8 months ago
I see your point, but I still think B is the most crucial for managing the security lifecycle.
upvoted 0 times
...
Coleen
8 months ago
I think D is also important for testing the effectiveness of the controls.
upvoted 0 times
...
Erick
8 months ago
I agree, B is definitely important for ensuring the controls are in place.
upvoted 0 times
...
...
Tyra
10 months ago
Hmm, this one's tricky. I'm guessing D, since penetration tests and red team exercises are all about validating the security controls in place.
upvoted 0 times
Carlee
10 months ago
Yeah, I agree. Penetration tests and red team exercises are essential for validating security controls.
upvoted 0 times
...
Lamar
10 months ago
I think you're right, D does seem like the best choice for managing the security lifecycle.
upvoted 0 times
...
...
Dorsey
11 months ago
I believe it could also be D) Penetration Tests and Red Team Exercises, as they validate the effectiveness of security controls.
upvoted 0 times
...
Donte
11 months ago
I agree with Beatriz, because monitoring and controlling accounts is essential for security.
upvoted 0 times
...
Beatriz
11 months ago
I think the answer is B) Account Monitoring and Control.
upvoted 0 times
...

Save Cancel