New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC GCIH Exam - Topic 12 Question 20 Discussion

Actual exam question for GIAC's GCIH exam
Question #: 20
Topic #: 12
[All GCIH Questions]

John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. The company is aware of various types of security attacks and wants to impede them. Hence, management has assigned John a project to port scan the company's Web Server. For this, he uses the nmap port scanner and issues the following command to perform idle port scanning:

nmap -PN -p- -sI IP_Address_of_Company_Server

He analyzes that the server's TCP ports 21, 25, 80, and 111 are open.

Which of the following security policies is the company using during this entire process to mitigate the risk of hacking attacks?

Show Suggested Answer Hide Answer
Suggested Answer: B

Contribute your Thoughts:

0/2000 characters
Craig
3 months ago
Non-disclosure agreements don't really fit this scenario.
upvoted 0 times
...
Winifred
3 months ago
Wow, I didn't know nmap could do that!
upvoted 0 times
...
Shenika
3 months ago
Not sure about that, could be acceptable use too.
upvoted 0 times
...
Eveline
4 months ago
I think it's definitely an audit policy.
upvoted 0 times
...
Helga
4 months ago
The command uses idle scanning, pretty clever!
upvoted 0 times
...
Bernardo
4 months ago
I’m leaning towards the Audit policy as well, but I remember a question similar to this where the focus was on compliance and monitoring.
upvoted 0 times
...
Terry
4 months ago
I feel like the Acceptable Use Policy could be relevant too, especially since it outlines how employees should use company resources.
upvoted 0 times
...
Harrison
4 months ago
I think it might be the Audit policy since John is scanning for vulnerabilities, but I could be mixing it up with something else we practiced.
upvoted 0 times
...
Mose
5 months ago
I remember we discussed different security policies in class, but I'm not entirely sure which one applies here.
upvoted 0 times
...
Heike
5 months ago
I feel pretty confident about this one. The company is proactively scanning its own systems to identify potential vulnerabilities, so the relevant policy would be the Audit Policy, which governs how the company monitors and reviews its security measures.
upvoted 0 times
...
Vanda
5 months ago
Hmm, I'm a bit confused by the technical details in this question. I'll need to make sure I understand the port scanning process and how it relates to the security policies before I can answer this.
upvoted 0 times
...
Latanya
5 months ago
This seems like a straightforward question about network security policies. I'll need to carefully analyze the information provided in the question to determine which policy is being used.
upvoted 0 times
...
Amie
5 months ago
Okay, the key here is that the company is aware of security attacks and is actively trying to mitigate them by having John perform a port scan. Based on that, I think the correct answer is the Acceptable Use Policy, which would outline the company's security procedures and expectations.
upvoted 0 times
...
Lanie
5 months ago
I'm a bit confused by this question. The Revalue Open Balance feature is new to me, and I'm not sure how it relates to the different account types. I'll have to review my notes and try to figure out the logic behind this one.
upvoted 0 times
...
Sommer
5 months ago
This seems straightforward to me. Available-to-promise data allows you to plan inventory levels to meet customer demand, so the answer has to be A, inventory planning.
upvoted 0 times
...
Emilio
5 months ago
Okay, I think I've got this. The key here is that Router 1 isn't receiving any routes from Router 2. So the issue is likely on Router 2's end, probably with the routing protocol configuration. I'd try modifying the router ID or network type settings to see if that fixes the problem.
upvoted 0 times
...
Ashton
10 months ago
The company is being responsible by addressing security concerns, but I hope they have a clear acceptable use policy to ensure everyone is on the same page about proper network usage.
upvoted 0 times
Mi
8 months ago
C) Acceptable use policy
upvoted 0 times
...
Cristy
8 months ago
B) Antivirus policy
upvoted 0 times
...
Luis
9 months ago
A) Non-disclosure agreement
upvoted 0 times
...
...
Annice
10 months ago
Lol, I bet the IT team is doing the 'nmap dance' right now, hoping they don't accidentally take down the server. At least they're using the right tools for the job.
upvoted 0 times
Kris
9 months ago
C) Acceptable use policy
upvoted 0 times
...
Geoffrey
9 months ago
B) Antivirus policy
upvoted 0 times
...
Shelba
9 months ago
A) Non-disclosure agreement
upvoted 0 times
...
...
Tamra
10 months ago
I'm guessing the correct answer is D) Audit policy. The company is actively scanning its web server, which should be part of a comprehensive audit process to identify and mitigate security risks.
upvoted 0 times
Darell
8 months ago
C) Acceptable use policy
upvoted 0 times
...
Talia
9 months ago
B) Antivirus policy
upvoted 0 times
...
Quentin
9 months ago
A) Non-disclosure agreement
upvoted 0 times
...
...
Chan
10 months ago
Hmm, this looks like a network security assessment. The company is being proactive, which is good. I hope they have a solid audit policy in place to ensure the process is transparent and secure.
upvoted 0 times
Argelia
9 months ago
Lettie: Definitely, it's a good practice for maintaining network security.
upvoted 0 times
...
Nohemi
9 months ago
User 3: I agree, it helps ensure that the network is being assessed properly.
upvoted 0 times
...
Lettie
9 months ago
User 2: Yes, that's important for transparency and security.
upvoted 0 times
...
Mozelle
10 months ago
User 1: I think the company is using an audit policy.
upvoted 0 times
...
...
Salome
11 months ago
I believe the company should also have an Acceptable use policy to ensure employees follow security guidelines while using the network.
upvoted 0 times
...
Amos
11 months ago
I agree with Sommer. Audit policy helps in monitoring and detecting any unauthorized access or activities.
upvoted 0 times
...
Sommer
11 months ago
I think the company is using the Audit policy to mitigate the risk of hacking attacks.
upvoted 0 times
...

Save Cancel