Independence Day Deal! Unlock 25% OFF Today – Limited-Time Offer - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC Exam GCCC Topic 9 Question 63 Discussion

Actual exam question for GIAC's GCCC exam
Question #: 63
Topic #: 9
[All GCCC Questions]

Which of the following baselines is considered necessary to implement the Boundary Defense CIS Control?

Show Suggested Answer Hide Answer
Suggested Answer: D

Contribute your Thoughts:

Stephania
1 months ago
Haha, the choices are like a 'Choose Your Own Adventure' for network security! I'm going to go with C. Network Device Configuration Baselines - it just feels right, you know?
upvoted 0 times
Jennie
11 days ago
I see your point, but I still think D, Network Information Flow, is the key baseline for this control.
upvoted 0 times
...
Youlanda
18 days ago
I think B could also be a good option, Network Traffic/Service Baseline is crucial for security.
upvoted 0 times
...
Devora
21 days ago
I agree, C does seem like the most logical choice for Boundary Defense CIS Control.
upvoted 0 times
...
...
Lanie
2 months ago
Hmm, I'm a bit stumped on this one. I was thinking it might be D. Network Information Flow, but I'm not 100% confident. Guess I'll have to do some more research before the exam.
upvoted 0 times
Wilford
12 days ago
Yeah, let's go with C for now.
upvoted 0 times
...
Antione
13 days ago
I agree, C sounds like a good choice.
upvoted 0 times
...
Rebecka
15 days ago
I think it might be C. Network Device Configuration Baselines.
upvoted 0 times
...
Shannan
17 days ago
D) Network Information Flow
upvoted 0 times
...
Graciela
20 days ago
C) Network Device Configuration Baselines
upvoted 0 times
...
Minna
21 days ago
B) Network Traffic/Service Baseline
upvoted 0 times
...
Derick
28 days ago
A) Multi-Factor Authentication Standard
upvoted 0 times
...
...
Dominga
2 months ago
B. Network Traffic/Service Baseline sounds like the right answer to me. Monitoring and controlling network traffic is a key aspect of implementing the Boundary Defense control.
upvoted 0 times
...
Lawrence
2 months ago
I'm pretty sure the answer is C. Network Device Configuration Baselines. That's the baseline that ensures the security of network devices, which is crucial for the Boundary Defense CIS Control.
upvoted 0 times
Han
6 days ago
D) Network Information Flow doesn't seem to be related to Boundary Defense CIS Control.
upvoted 0 times
...
Loren
17 days ago
I agree with you, C) Network Device Configuration Baselines is the correct answer.
upvoted 0 times
...
Micaela
21 days ago
I believe it's B) Network Traffic/Service Baseline.
upvoted 0 times
...
Dino
1 months ago
I think it's A) Multi-Factor Authentication Standard.
upvoted 0 times
...
...
Edwin
2 months ago
I'm not sure, but I think it might be B) Network Traffic/Service Baseline, as monitoring network traffic can help detect and prevent unauthorized access.
upvoted 0 times
...
Adela
2 months ago
I agree with Leigha, because having proper network device configurations is crucial for boundary defense.
upvoted 0 times
...
Leigha
3 months ago
I think the answer is C) Network Device Configuration Baselines.
upvoted 0 times
...

Save Cancel