New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC GCCC Exam - Topic 9 Question 54 Discussion

Actual exam question for GIAC's GCCC exam
Question #: 54
Topic #: 9
[All GCCC Questions]

Given the audit finding below, which CIS Control was being measured?

Show Suggested Answer Hide Answer
Suggested Answer: D

Contribute your Thoughts:

0/2000 characters
Ryan
3 months ago
I vote for Controlled Use of Administrative Privilege, it's crucial!
upvoted 0 times
...
Teddy
3 months ago
Surprised this isn't about Secure Configurations, seems like a big deal!
upvoted 0 times
...
Annalee
3 months ago
Not so sure, could also be about Limitation and Control of Network Ports.
upvoted 0 times
...
King
4 months ago
Totally agree, that makes the most sense here.
upvoted 0 times
...
Vi
4 months ago
I think it's definitely about Controlled Access Based on the Need to Know.
upvoted 0 times
...
King
4 months ago
Secure Configurations for Hardware and Software seems relevant too, but I feel like I need to double-check the definitions.
upvoted 0 times
...
Viva
4 months ago
Limitation and Control of Network Ports sounds familiar, but I can't recall if it fits this specific finding.
upvoted 0 times
...
Kenda
4 months ago
I remember a practice question that focused on administrative privileges. Could it be Controlled Use of Administrative Privilege?
upvoted 0 times
...
Selma
5 months ago
I think this might be about Controlled Access Based on the Need to Know, but I'm not entirely sure.
upvoted 0 times
...
Albina
5 months ago
Hmm, I'm a bit stumped on this one. The audit finding doesn't provide a lot of context, and the CIS Control options are quite specific. I'll need to carefully read through each choice and try to match it to the information given. Hopefully, I can eliminate some options and make an informed decision.
upvoted 0 times
...
Johana
5 months ago
Ugh, I'm not too familiar with the CIS Controls. This is a tricky one. The audit finding doesn't give me a lot to go on. I'll have to make an educated guess based on the options provided. Hopefully, I can eliminate a few choices and land on the right answer.
upvoted 0 times
...
Francene
5 months ago
Hmm, this looks like a question about CIS Controls. The audit finding mentions "unauthorized access", so I'm thinking it's probably related to access control or network security. I'll carefully review the options and see which one best matches the information provided.
upvoted 0 times
...
Shanda
5 months ago
Okay, I've got this. The audit finding is talking about unauthorized access, so it's clearly related to access control. Based on the options, I'd say the most relevant CIS Control is "Controlled Access Based on the Need to Know". That seems to be the best fit for the scenario described.
upvoted 0 times
...
Rose
5 months ago
I've got a good feeling about this. Nova for the firewall instance, and Neutron for the network resources. That's my best guess based on what I know about OpenStack.
upvoted 0 times
...
Dianne
9 months ago
I'm voting for option C because, let's be honest, who doesn't love a good network port and protocol control question? It's like a secret handshake for cybersecurity nerds.
upvoted 0 times
Holley
8 months ago
Controlling network ports, protocols, and services is definitely a key CIS Control.
upvoted 0 times
...
Jovita
8 months ago
I think option C makes the most sense in this scenario.
upvoted 0 times
...
Octavio
9 months ago
I agree, network port and protocol control is crucial for cybersecurity.
upvoted 0 times
...
...
Gerald
10 months ago
Ah, the old 'network ports and protocols' trick! I bet the exam writer thought they were being clever, but option C is the obvious choice here.
upvoted 0 times
Heidy
8 months ago
That's right, it's a key part of securing the network.
upvoted 0 times
...
Alease
9 months ago
Yeah, it's all about limiting and controlling network ports, protocols, and services.
upvoted 0 times
...
Johana
9 months ago
I agree, option C is definitely the correct choice.
upvoted 0 times
...
...
Emerson
10 months ago
Well, this is a no-brainer! The audit finding is clearly testing the 'Limitation and Control of Network Ports, Protocols and Services' CIS Control. Option C for the win!
upvoted 0 times
...
Francesco
10 months ago
This is a tricky one, but I think the key is the mention of 'network ports, protocols, and services' in the audit finding. So, I'm going with option C.
upvoted 0 times
Gearldine
9 months ago
User 3: I agree, option C it is then. Let's go with Limitation and Control of Network Ports, Protocols and Services.
upvoted 0 times
...
Marci
9 months ago
User 2: Yeah, that makes sense. Option C seems to be the most relevant choice based on the audit finding.
upvoted 0 times
...
Marjory
10 months ago
User 1: I think it's option C too, the audit finding does mention network ports, protocols, and services.
upvoted 0 times
...
...
Vi
10 months ago
I believe it could also be D) Secure Configurations for Hardware and Software. It's important to secure hardware and software on devices.
upvoted 0 times
...
Ellsworth
11 months ago
Hmm, the audit finding seems to be related to the configuration and control of network ports, protocols, and services. I'd say option C is the correct answer.
upvoted 0 times
Val
10 months ago
Let's go with option C then, it seems to align with the audit finding.
upvoted 0 times
...
Cassie
10 months ago
I see your point, but I still believe option C is the best fit based on the audit finding.
upvoted 0 times
...
Nobuko
10 months ago
I think option D could also be a possibility, as it involves secure configurations for hardware and software.
upvoted 0 times
...
Laurene
10 months ago
I agree, option C seems to be the most relevant in this case.
upvoted 0 times
...
...
Frederica
11 months ago
I agree with Kimbery. The audit finding seems to be related to hardware assets control.
upvoted 0 times
...
Kimbery
11 months ago
I think the CIS Control being measured is E) Inventory and Control of Hardware Assets.
upvoted 0 times
...

Save Cancel