Independence Day Deal! Unlock 25% OFF Today – Limited-Time Offer - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC Exam GCCC Topic 6 Question 50 Discussion

Actual exam question for GIAC's GCCC exam
Question #: 50
Topic #: 6
[All GCCC Questions]

Below is a screenshot from a deployed next-generation firewall. These configuration settings would be a defensive measure for which CIS Control?

Show Suggested Answer Hide Answer
Suggested Answer: D

Contribute your Thoughts:

Alecia
1 months ago
After seeing that screenshot, I feel like I need to upgrade my home router. Can it even be considered 'next-gen' if it doesn't have a 'Deny All' button?
upvoted 0 times
Nenita
2 days ago
B) Limitation and Control of Network Ports, Protocols and Services
upvoted 0 times
...
Armanda
6 days ago
A) Controlled Access Based on the Need to Know
upvoted 0 times
...
...
Marya
1 months ago
Hmm, this is a tricky one. I wonder if the firewall is also limiting access based on need-to-know...Tough call, but I'll go with D.
upvoted 0 times
Twanna
13 days ago
User 3: I'm not sure, but I'll go with D, secure configuration for network devices.
upvoted 0 times
...
Jacob
16 days ago
User 2: I agree with Jacob, B sounds like the right choice.
upvoted 0 times
...
Hortencia
20 days ago
User 1: I think it's B, limiting and controlling network ports, protocols, and services.
upvoted 0 times
...
...
Francine
1 months ago
Email and web browser protections? Nah, this is definitely about securing network devices. D is the way to go.
upvoted 0 times
Leonida
21 days ago
Definitely, email and web browser protections wouldn't involve those settings.
upvoted 0 times
...
Giovanna
22 days ago
Yeah, those configuration settings look more like they are for network devices.
upvoted 0 times
...
Coleen
1 months ago
I agree, D is the best option for securing network devices.
upvoted 0 times
...
...
Stephanie
2 months ago
The screenshot shows settings for a next-gen firewall, so I think D is the correct answer.
upvoted 0 times
Justine
1 months ago
I think D is the best option too, considering the configuration settings shown in the screenshot.
upvoted 0 times
...
Justine
2 months ago
I agree, D seems like the most appropriate choice for this scenario.
upvoted 0 times
...
...
Florinda
2 months ago
I'm not sure, but I think it could also be D) Secure Configuration for Network Devices. The settings seem to focus on securing network devices like firewalls.
upvoted 0 times
...
Malcom
2 months ago
This looks like a configuration for controlling network ports and protocols, so I'd go with option B.
upvoted 0 times
William
27 days ago
I see where you're coming from, but I still think option C could be a possibility with email and web browser protections.
upvoted 0 times
...
Corazon
2 months ago
I'm leaning towards option B as well, it makes sense given the settings in the screenshot.
upvoted 0 times
...
Noble
2 months ago
I think option D could also be a good fit since it involves secure configuration for network devices.
upvoted 0 times
...
Brittney
2 months ago
I agree, option B seems like the best choice for this configuration.
upvoted 0 times
...
...
Hyun
2 months ago
I agree with Kerry. Those configuration settings definitely align with that CIS Control.
upvoted 0 times
...
Kerry
3 months ago
I think the answer is B) Limitation and Control of Network Ports, Protocols and Services.
upvoted 0 times
...

Save Cancel