New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC GCIA Exam - Topic 1 Question 3 Discussion

Actual exam question for GIAC's GCIA exam
Question #: 3
Topic #: 1
[All GCIA Questions]

Mark works as a Network Security Administrator for BlueWells Inc. The company has a Windowsbased network. Mark is giving a presentation on Network security threats to the newly recruited employees of the company. His presentation is about the External threats that the company recently faced in the past. Which of the following statements are true about external threats?

Each correct answer represents a complete solution. Choose three.

Show Suggested Answer Hide Answer
Suggested Answer: A, B, C

Contribute your Thoughts:

0/2000 characters
Luisa
4 months ago
Wait, are we sure about B? Flooding isn't always an external threat.
upvoted 0 times
...
Sheridan
4 months ago
I agree with A and C, but D just doesn't fit here.
upvoted 0 times
...
Maryanne
4 months ago
B sounds right, but isn't that more like a DDoS attack?
upvoted 0 times
...
Kirk
4 months ago
C is spot on, external threats come from outside.
upvoted 0 times
...
Daryl
5 months ago
A is definitely true, firewalls are essential!
upvoted 0 times
...
Cora
5 months ago
I know option D is wrong because it talks about internal threats, but I can't recall if option A is the best way to counter external threats.
upvoted 0 times
...
Yaeko
5 months ago
I feel like option B sounds familiar. Flooding a network with requests seems like a DDoS attack, which is definitely an external threat.
upvoted 0 times
...
Laquanda
5 months ago
I'm a bit unsure about option A. I think firewalls do help with external threats, but I'm not completely confident if that's the only measure needed.
upvoted 0 times
...
Barney
5 months ago
I remember studying that external threats are primarily from outside the organization, so I think option C is definitely correct.
upvoted 0 times
...
Major
5 months ago
I'm a bit confused by this question. I'll need to review the material on common cloud security vulnerabilities before I can decide.
upvoted 0 times
...
Elsa
5 months ago
This is a tricky one. I'm not super familiar with the Cortex XDR product line, so I'm not 100% sure which objects are considered sensors. I'll make an educated guess, but I'm not entirely confident in my answer.
upvoted 0 times
...
Corinne
5 months ago
I think employee pension contributions are treated as deductions, but I can't remember if the employer ones are too.
upvoted 0 times
...
Graham
5 months ago
Let me break this down. We need a pattern that can handle cloud storage device failures without disrupting data access. Direct LUN Access and Intra-Storage Device Vertical Tiering don't seem relevant. Storage Workload Management could work, but Redundant Storage is probably the most robust approach.
upvoted 0 times
...

Save Cancel