New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC GCFA Exam - Topic 7 Question 10 Discussion

Actual exam question for GIAC's GCFA exam
Question #: 10
Topic #: 7
[All GCFA Questions]

Based on the case study, to implement more security, which of the following additional technologies should you implement for laptop computers?

(Click the Exhibit button on the toolbar to see the case study.)

Each correct answer represents a complete solution. Choose two.

Show Suggested Answer Hide Answer
Suggested Answer: B, C

Contribute your Thoughts:

0/2000 characters
Michell
4 months ago
Not sure if encrypted data transmissions are necessary for laptops.
upvoted 0 times
...
Tamera
4 months ago
Agreed, EFS is a must for data protection!
upvoted 0 times
...
Franchesca
4 months ago
Wait, isn't PAP authentication outdated?
upvoted 0 times
...
Cathrine
4 months ago
I think digital certificates are also important.
upvoted 0 times
...
Keneth
5 months ago
Definitely EFS and two-factor authentication!
upvoted 0 times
...
Gerry
5 months ago
Two-factor authentication sounds familiar, and I think it was highlighted in a practice question we did last week.
upvoted 0 times
...
Ruth
5 months ago
I'm not entirely sure about PAP authentication; I think it's less secure than some of the other options.
upvoted 0 times
...
Mendy
5 months ago
I remember studying about EFS in class; it seems like a solid choice for securing files on laptops.
upvoted 0 times
...
Lai
5 months ago
I feel like digital certificates could be useful, but I'm not confident if they are the best fit for this scenario.
upvoted 0 times
...
Graciela
5 months ago
Okay, let me see. Return on investment is all about the financial side of a project, so I'm guessing the answer is financial feasibility. That's the category that would consider the financial viability and expected returns.
upvoted 0 times
...
Lashawnda
5 months ago
This is a tricky one. I'm not entirely sure if the auditor needs to consider both factors or just one of them. I'll have to review the concepts of audit sampling and control risk assessment to make sure I understand the right approach.
upvoted 0 times
...
Tammara
5 months ago
I think the command is 'docker exec -it test /bin/bash', but I'm not completely sure.
upvoted 0 times
...
Alease
5 months ago
I'm pretty sure detections are handled differently in simple versus advanced policies. Maybe the MD5 signatures just can't be used in simple detection policies?
upvoted 0 times
...

Save Cancel