New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC GCCC Exam - Topic 6 Question 50 Discussion

Actual exam question for GIAC's GCCC exam
Question #: 50
Topic #: 6
[All GCCC Questions]

Below is a screenshot from a deployed next-generation firewall. These configuration settings would be a defensive measure for which CIS Control?

Show Suggested Answer Hide Answer
Suggested Answer: D

Contribute your Thoughts:

0/2000 characters
Laticia
3 months ago
Surprised this isn't more obvious, it's clearly about secure configurations!
upvoted 0 times
...
Mattie
3 months ago
Wait, are we sure it's not A? That seems relevant too.
upvoted 0 times
...
Lajuana
3 months ago
I agree with Aliza, D is the right choice!
upvoted 0 times
...
Aliza
4 months ago
I think it's B, controlling network ports is key here.
upvoted 0 times
...
Aliza
4 months ago
Definitely looks like D to me, secure config for network devices!
upvoted 0 times
...
Xuan
4 months ago
I’m a bit confused; I thought email and web protections were more about user devices than firewalls.
upvoted 0 times
...
Leontine
4 months ago
I feel like this could also tie into the need to know principle, but the firewall aspect makes me lean towards secure configuration.
upvoted 0 times
...
Lashawna
4 months ago
I remember practicing a question about firewall settings, and it was definitely about controlling network ports and protocols.
upvoted 0 times
...
Allene
5 months ago
I think this might relate to secure configuration for network devices, but I'm not entirely sure.
upvoted 0 times
...
Latricia
5 months ago
I'm a bit unsure about this one. The firewall settings seem to be about restricting access, but I'm not sure which CIS Control that would fall under. I'll have to think it through step-by-step to determine the best answer.
upvoted 0 times
...
Sylvia
5 months ago
Hmm, the question is asking about a specific CIS Control, but I'm not too familiar with those. I'll need to review the CIS Controls list carefully to figure out which one is the best match for this firewall configuration.
upvoted 0 times
...
Alex
5 months ago
This looks like a firewall configuration, so I'm thinking it's related to network security controls. I'll review the CIS Controls and see which one seems to best match the defensive measures shown in the screenshot.
upvoted 0 times
...
Mari
5 months ago
Ah, this is a classic network security question. The firewall settings are clearly designed to control and limit network access, so I'm going to go with Option B, "Limitation and Control of Network Ports, Protocols and Services."
upvoted 0 times
...
Alba
5 months ago
Okay, I've got this. The degree of dispersion of responsibility is called the level of decentralization, I believe.
upvoted 0 times
...
Jolanda
5 months ago
Based on the question, I believe the minimum configuration would be one template with two snapshots. That should provide the persistent disks for power users and the instant clone desktops for task workers.
upvoted 0 times
...
Alecia
9 months ago
After seeing that screenshot, I feel like I need to upgrade my home router. Can it even be considered 'next-gen' if it doesn't have a 'Deny All' button?
upvoted 0 times
Sol
8 months ago
D) Secure Configuration for Network Devices, such as Firewalls, Routers and Switches.
upvoted 0 times
...
Marsha
8 months ago
C) Email and Web Browser Protections
upvoted 0 times
...
Nenita
8 months ago
B) Limitation and Control of Network Ports, Protocols and Services
upvoted 0 times
...
Armanda
8 months ago
A) Controlled Access Based on the Need to Know
upvoted 0 times
...
...
Marya
10 months ago
Hmm, this is a tricky one. I wonder if the firewall is also limiting access based on need-to-know...Tough call, but I'll go with D.
upvoted 0 times
Twanna
9 months ago
User 3: I'm not sure, but I'll go with D, secure configuration for network devices.
upvoted 0 times
...
Jacob
9 months ago
User 2: I agree with Jacob, B sounds like the right choice.
upvoted 0 times
...
Hortencia
9 months ago
User 1: I think it's B, limiting and controlling network ports, protocols, and services.
upvoted 0 times
...
...
Francine
10 months ago
Email and web browser protections? Nah, this is definitely about securing network devices. D is the way to go.
upvoted 0 times
Leonida
9 months ago
Definitely, email and web browser protections wouldn't involve those settings.
upvoted 0 times
...
Giovanna
9 months ago
Yeah, those configuration settings look more like they are for network devices.
upvoted 0 times
...
Coleen
9 months ago
I agree, D is the best option for securing network devices.
upvoted 0 times
...
...
Stephanie
10 months ago
The screenshot shows settings for a next-gen firewall, so I think D is the correct answer.
upvoted 0 times
Justine
10 months ago
I think D is the best option too, considering the configuration settings shown in the screenshot.
upvoted 0 times
...
Justine
10 months ago
I agree, D seems like the most appropriate choice for this scenario.
upvoted 0 times
...
...
Florinda
11 months ago
I'm not sure, but I think it could also be D) Secure Configuration for Network Devices. The settings seem to focus on securing network devices like firewalls.
upvoted 0 times
...
Malcom
11 months ago
This looks like a configuration for controlling network ports and protocols, so I'd go with option B.
upvoted 0 times
William
9 months ago
I see where you're coming from, but I still think option C could be a possibility with email and web browser protections.
upvoted 0 times
...
Corazon
10 months ago
I'm leaning towards option B as well, it makes sense given the settings in the screenshot.
upvoted 0 times
...
Noble
10 months ago
I think option D could also be a good fit since it involves secure configuration for network devices.
upvoted 0 times
...
Brittney
10 months ago
I agree, option B seems like the best choice for this configuration.
upvoted 0 times
...
...
Hyun
11 months ago
I agree with Kerry. Those configuration settings definitely align with that CIS Control.
upvoted 0 times
...
Kerry
11 months ago
I think the answer is B) Limitation and Control of Network Ports, Protocols and Services.
upvoted 0 times
...

Save Cancel