New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC GCCC Exam - Topic 9 Question 63 Discussion

Actual exam question for GIAC's GCCC exam
Question #: 63
Topic #: 9
[All GCCC Questions]

Which of the following baselines is considered necessary to implement the Boundary Defense CIS Control?

Show Suggested Answer Hide Answer
Suggested Answer: D

Contribute your Thoughts:

0/2000 characters
Maricela
3 months ago
Multi-Factor Authentication is crucial, but not for this control.
upvoted 0 times
...
Rikki
3 months ago
Wait, is D really not a baseline? That seems odd.
upvoted 0 times
...
Stephaine
3 months ago
C is also important, but I lean towards B too.
upvoted 0 times
...
Antonio
4 months ago
I agree, B makes the most sense for boundary defense!
upvoted 0 times
...
Cristy
4 months ago
Definitely think it's B, the Network Traffic/Service Baseline.
upvoted 0 times
...
Blair
4 months ago
I keep mixing up the options, but I think Network Information Flow is relevant too. It might help in understanding how data moves across the boundary.
upvoted 0 times
...
Dean
4 months ago
I practiced a similar question, and I feel like Network Device Configuration Baselines are crucial for securing the perimeter. Maybe that's the answer?
upvoted 0 times
...
Cecily
4 months ago
I'm not entirely sure, but I remember something about Multi-Factor Authentication being important for security. Could it be necessary for Boundary Defense?
upvoted 0 times
...
Louvenia
5 months ago
I think the Network Traffic/Service Baseline might be the right answer since it relates to monitoring and controlling traffic at the boundary.
upvoted 0 times
...
Ahmad
5 months ago
I'm leaning towards D. Network Information Flow as the necessary baseline. The Boundary Defense control is all about monitoring and controlling network traffic, so that seems like the most relevant baseline.
upvoted 0 times
...
Paulina
5 months ago
I think the answer is C. Network Device Configuration Baselines. That makes sense to me since the Boundary Defense control is focused on network devices and their configurations.
upvoted 0 times
...
Dona
5 months ago
Hmm, I'm a bit confused on this one. I'm not entirely sure which baseline is considered necessary for the Boundary Defense CIS Control. I'll have to review the material again to make a more informed decision.
upvoted 0 times
...
Tarra
5 months ago
I'm pretty sure the answer is B. Network Traffic/Service Baseline. That seems like the most relevant baseline for implementing the Boundary Defense CIS Control.
upvoted 0 times
...
Stephania
10 months ago
Haha, the choices are like a 'Choose Your Own Adventure' for network security! I'm going to go with C. Network Device Configuration Baselines - it just feels right, you know?
upvoted 0 times
Jennie
9 months ago
I see your point, but I still think D, Network Information Flow, is the key baseline for this control.
upvoted 0 times
...
Youlanda
9 months ago
I think B could also be a good option, Network Traffic/Service Baseline is crucial for security.
upvoted 0 times
...
Devora
9 months ago
I agree, C does seem like the most logical choice for Boundary Defense CIS Control.
upvoted 0 times
...
...
Lanie
10 months ago
Hmm, I'm a bit stumped on this one. I was thinking it might be D. Network Information Flow, but I'm not 100% confident. Guess I'll have to do some more research before the exam.
upvoted 0 times
Wilford
9 months ago
Yeah, let's go with C for now.
upvoted 0 times
...
Antione
9 months ago
I agree, C sounds like a good choice.
upvoted 0 times
...
Rebecka
9 months ago
I think it might be C. Network Device Configuration Baselines.
upvoted 0 times
...
Shannan
9 months ago
D) Network Information Flow
upvoted 0 times
...
Graciela
9 months ago
C) Network Device Configuration Baselines
upvoted 0 times
...
Minna
9 months ago
B) Network Traffic/Service Baseline
upvoted 0 times
...
Derick
9 months ago
A) Multi-Factor Authentication Standard
upvoted 0 times
...
...
Dominga
10 months ago
B. Network Traffic/Service Baseline sounds like the right answer to me. Monitoring and controlling network traffic is a key aspect of implementing the Boundary Defense control.
upvoted 0 times
...
Lawrence
10 months ago
I'm pretty sure the answer is C. Network Device Configuration Baselines. That's the baseline that ensures the security of network devices, which is crucial for the Boundary Defense CIS Control.
upvoted 0 times
Han
8 months ago
D) Network Information Flow doesn't seem to be related to Boundary Defense CIS Control.
upvoted 0 times
...
Loren
9 months ago
I agree with you, C) Network Device Configuration Baselines is the correct answer.
upvoted 0 times
...
Micaela
9 months ago
I believe it's B) Network Traffic/Service Baseline.
upvoted 0 times
...
Dino
10 months ago
I think it's A) Multi-Factor Authentication Standard.
upvoted 0 times
...
...
Edwin
11 months ago
I'm not sure, but I think it might be B) Network Traffic/Service Baseline, as monitoring network traffic can help detect and prevent unauthorized access.
upvoted 0 times
...
Adela
11 months ago
I agree with Leigha, because having proper network device configurations is crucial for boundary defense.
upvoted 0 times
...
Leigha
11 months ago
I think the answer is C) Network Device Configuration Baselines.
upvoted 0 times
...

Save Cancel