Independence Day Deal! Unlock 25% OFF Today – Limited-Time Offer - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC Exam GCCC Topic 6 Question 35 Discussion

Actual exam question for GIAC's GCCC exam
Question #: 35
Topic #: 6
[All GCCC Questions]

Which of the following CIS Controls is used to manage the security lifecycle by validating that the documented controls are in place?

Show Suggested Answer Hide Answer
Suggested Answer: D

Contribute your Thoughts:

Laquita
1 months ago
Wait, is this a pop quiz? I didn't study for this! *panicked laughter* Seriously though, I'm stuck between B and D. Decisions, decisions...
upvoted 0 times
...
Lazaro
1 months ago
Ha! Trick question, right? Obviously, the answer is A. Controlled use of administrative privilege is the key to managing the security lifecycle. Gotta keep those admins on a tight leash!
upvoted 0 times
...
Vi
1 months ago
Oooh, this is a tough one. I'm leaning towards C, since data protection is such a fundamental part of the security lifecycle. But I could be wrong...
upvoted 0 times
Detra
2 days ago
I agree, but I think B might also be important for managing security controls.
upvoted 0 times
...
Becky
20 days ago
I think C is a good choice, data protection is crucial for security.
upvoted 0 times
...
...
Garry
1 months ago
I'm going with B. Account monitoring and control is crucial for managing the security lifecycle and ensuring the documented controls are actually being implemented.
upvoted 0 times
Erick
9 days ago
I agree, B is definitely important for ensuring the controls are in place.
upvoted 0 times
...
...
Tyra
2 months ago
Hmm, this one's tricky. I'm guessing D, since penetration tests and red team exercises are all about validating the security controls in place.
upvoted 0 times
Carlee
1 months ago
Yeah, I agree. Penetration tests and red team exercises are essential for validating security controls.
upvoted 0 times
...
Lamar
2 months ago
I think you're right, D does seem like the best choice for managing the security lifecycle.
upvoted 0 times
...
...
Dorsey
2 months ago
I believe it could also be D) Penetration Tests and Red Team Exercises, as they validate the effectiveness of security controls.
upvoted 0 times
...
Donte
3 months ago
I agree with Beatriz, because monitoring and controlling accounts is essential for security.
upvoted 0 times
...
Beatriz
3 months ago
I think the answer is B) Account Monitoring and Control.
upvoted 0 times
...

Save Cancel