Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC Exam GCCC Topic 9 Question 63 Discussion

Actual exam question for GIAC's GCCC exam
Question #: 63
Topic #: 9
[All GCCC Questions]

Which of the following baselines is considered necessary to implement the Boundary Defense CIS Control?

Show Suggested Answer Hide Answer
Suggested Answer: D

Contribute your Thoughts:

Stephania
3 months ago
Haha, the choices are like a 'Choose Your Own Adventure' for network security! I'm going to go with C. Network Device Configuration Baselines - it just feels right, you know?
upvoted 0 times
Jennie
2 months ago
I see your point, but I still think D, Network Information Flow, is the key baseline for this control.
upvoted 0 times
...
Youlanda
2 months ago
I think B could also be a good option, Network Traffic/Service Baseline is crucial for security.
upvoted 0 times
...
Devora
2 months ago
I agree, C does seem like the most logical choice for Boundary Defense CIS Control.
upvoted 0 times
...
...
Lanie
3 months ago
Hmm, I'm a bit stumped on this one. I was thinking it might be D. Network Information Flow, but I'm not 100% confident. Guess I'll have to do some more research before the exam.
upvoted 0 times
Wilford
2 months ago
Yeah, let's go with C for now.
upvoted 0 times
...
Antione
2 months ago
I agree, C sounds like a good choice.
upvoted 0 times
...
Rebecka
2 months ago
I think it might be C. Network Device Configuration Baselines.
upvoted 0 times
...
Shannan
2 months ago
D) Network Information Flow
upvoted 0 times
...
Graciela
2 months ago
C) Network Device Configuration Baselines
upvoted 0 times
...
Minna
2 months ago
B) Network Traffic/Service Baseline
upvoted 0 times
...
Derick
3 months ago
A) Multi-Factor Authentication Standard
upvoted 0 times
...
...
Dominga
3 months ago
B. Network Traffic/Service Baseline sounds like the right answer to me. Monitoring and controlling network traffic is a key aspect of implementing the Boundary Defense control.
upvoted 0 times
...
Lawrence
4 months ago
I'm pretty sure the answer is C. Network Device Configuration Baselines. That's the baseline that ensures the security of network devices, which is crucial for the Boundary Defense CIS Control.
upvoted 0 times
Han
2 months ago
D) Network Information Flow doesn't seem to be related to Boundary Defense CIS Control.
upvoted 0 times
...
Loren
2 months ago
I agree with you, C) Network Device Configuration Baselines is the correct answer.
upvoted 0 times
...
Micaela
2 months ago
I believe it's B) Network Traffic/Service Baseline.
upvoted 0 times
...
Dino
3 months ago
I think it's A) Multi-Factor Authentication Standard.
upvoted 0 times
...
...
Edwin
4 months ago
I'm not sure, but I think it might be B) Network Traffic/Service Baseline, as monitoring network traffic can help detect and prevent unauthorized access.
upvoted 0 times
...
Adela
4 months ago
I agree with Leigha, because having proper network device configurations is crucial for boundary defense.
upvoted 0 times
...
Leigha
4 months ago
I think the answer is C) Network Device Configuration Baselines.
upvoted 0 times
...

Save Cancel