Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC Exam GCFR Topic 1 Question 21 Discussion

Actual exam question for GIAC's GCFR exam
Question #: 21
Topic #: 1
[All GCFR Questions]

What is shown in the screenshot?

Show Suggested Answer Hide Answer
Suggested Answer: B

Contribute your Thoughts:

Omega
3 months ago
Ooh, this is a tricky one. The image looks like it could be related to various security frameworks, but I think C is the way to go. Gotta love these certification exams that keep us on our toes!
upvoted 0 times
...
Paris
3 months ago
Haha, this looks like something straight out of a security analyst's playbook! I bet the answer is C, Mitre ATT&CK tactics. Time to put my cybersecurity skills to the test!
upvoted 0 times
Rebbecca
2 months ago
User 3: I'm going with C) Mitre ATT&CK tactics too. Let's see if we're correct!
upvoted 0 times
...
Shawna
2 months ago
User 2: Yeah, I agree. It definitely looks like a cybersecurity-related image.
upvoted 0 times
...
Herminia
2 months ago
User 3: Let's see if we can crack this security puzzle together!
upvoted 0 times
...
Charisse
2 months ago
User 2: I agree, I think the answer is C, Mitre ATT&CK tactics.
upvoted 0 times
...
Simona
2 months ago
User 1: Yeah, it definitely looks like a cybersecurity reference.
upvoted 0 times
...
Catina
3 months ago
User 1: I think you're right, C) Mitre ATT&CK tactics seems like the most relevant answer.
upvoted 0 times
...
...
Trevor
4 months ago
I'm not sure, but it could also be Google threat types. Let's analyze it further.
upvoted 0 times
...
Tenesha
4 months ago
I agree with Anisha, the screenshot looks like it's related to Mitre ATT&CK tactics.
upvoted 0 times
...
Yoko
4 months ago
Hmm, the image seems to depict various cybersecurity threat categories. But I'm not sure if it's specifically the Mitre ATT&CK tactics. I'll have to double-check that.
upvoted 0 times
Skye
3 months ago
I agree, it looks like different tactics used in cybersecurity.
upvoted 0 times
...
Marguerita
3 months ago
I think it's C) Mitre ATT&CK tactics.
upvoted 0 times
...
Tom
3 months ago
D) CIS critical controls
upvoted 0 times
...
Viola
3 months ago
C) Mitre ATT&CK tactics
upvoted 0 times
...
Rhea
3 months ago
B) Windows event channels
upvoted 0 times
...
Alisha
3 months ago
A) Google threat types
upvoted 0 times
...
...
Anisha
4 months ago
I think it's showing Mitre ATT&CK tactics.
upvoted 0 times
...
Whitley
4 months ago
The screenshot looks like a visual representation of the Mitre ATT&CK framework. I'm pretty sure the correct answer is C.
upvoted 0 times
Luisa
3 months ago
Good job, you're right about the screenshot showing the Mitre ATT&CK framework.
upvoted 0 times
...
Makeda
3 months ago
I've seen that framework before, it's definitely C) Mitre ATT&CK tactics.
upvoted 0 times
...
Lindsey
3 months ago
Yes, the correct answer is C) Mitre ATT&CK tactics.
upvoted 0 times
...
Lai
4 months ago
I agree, it does look like the Mitre ATT&CK framework.
upvoted 0 times
...
...

Save Cancel