Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC Exam GCCC Topic 6 Question 50 Discussion

Actual exam question for GIAC's GCCC exam
Question #: 50
Topic #: 6
[All GCCC Questions]

Below is a screenshot from a deployed next-generation firewall. These configuration settings would be a defensive measure for which CIS Control?

Show Suggested Answer Hide Answer
Suggested Answer: D

Contribute your Thoughts:

Alecia
3 months ago
After seeing that screenshot, I feel like I need to upgrade my home router. Can it even be considered 'next-gen' if it doesn't have a 'Deny All' button?
upvoted 0 times
Sol
1 months ago
D) Secure Configuration for Network Devices, such as Firewalls, Routers and Switches.
upvoted 0 times
...
Marsha
1 months ago
C) Email and Web Browser Protections
upvoted 0 times
...
Nenita
2 months ago
B) Limitation and Control of Network Ports, Protocols and Services
upvoted 0 times
...
Armanda
2 months ago
A) Controlled Access Based on the Need to Know
upvoted 0 times
...
...
Marya
3 months ago
Hmm, this is a tricky one. I wonder if the firewall is also limiting access based on need-to-know...Tough call, but I'll go with D.
upvoted 0 times
Twanna
2 months ago
User 3: I'm not sure, but I'll go with D, secure configuration for network devices.
upvoted 0 times
...
Jacob
2 months ago
User 2: I agree with Jacob, B sounds like the right choice.
upvoted 0 times
...
Hortencia
2 months ago
User 1: I think it's B, limiting and controlling network ports, protocols, and services.
upvoted 0 times
...
...
Francine
3 months ago
Email and web browser protections? Nah, this is definitely about securing network devices. D is the way to go.
upvoted 0 times
Leonida
2 months ago
Definitely, email and web browser protections wouldn't involve those settings.
upvoted 0 times
...
Giovanna
2 months ago
Yeah, those configuration settings look more like they are for network devices.
upvoted 0 times
...
Coleen
3 months ago
I agree, D is the best option for securing network devices.
upvoted 0 times
...
...
Stephanie
4 months ago
The screenshot shows settings for a next-gen firewall, so I think D is the correct answer.
upvoted 0 times
Justine
3 months ago
I think D is the best option too, considering the configuration settings shown in the screenshot.
upvoted 0 times
...
Justine
3 months ago
I agree, D seems like the most appropriate choice for this scenario.
upvoted 0 times
...
...
Florinda
4 months ago
I'm not sure, but I think it could also be D) Secure Configuration for Network Devices. The settings seem to focus on securing network devices like firewalls.
upvoted 0 times
...
Malcom
4 months ago
This looks like a configuration for controlling network ports and protocols, so I'd go with option B.
upvoted 0 times
William
3 months ago
I see where you're coming from, but I still think option C could be a possibility with email and web browser protections.
upvoted 0 times
...
Corazon
3 months ago
I'm leaning towards option B as well, it makes sense given the settings in the screenshot.
upvoted 0 times
...
Noble
3 months ago
I think option D could also be a good fit since it involves secure configuration for network devices.
upvoted 0 times
...
Brittney
3 months ago
I agree, option B seems like the best choice for this configuration.
upvoted 0 times
...
...
Hyun
4 months ago
I agree with Kerry. Those configuration settings definitely align with that CIS Control.
upvoted 0 times
...
Kerry
4 months ago
I think the answer is B) Limitation and Control of Network Ports, Protocols and Services.
upvoted 0 times
...

Save Cancel