New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC GISF Exam - Topic 1 Question 34 Discussion

Actual exam question for GIAC's GISF exam
Question #: 34
Topic #: 1
[All GISF Questions]

Which of the following is an examination of the controls within an Information technology (IT)

infrastructure?

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

0/2000 characters
Lenora
3 months ago
I never heard of ADP audits before, are they really that crucial?
upvoted 0 times
...
Magdalene
3 months ago
Risk analysis is important too, but not the right choice here.
upvoted 0 times
...
Quentin
4 months ago
Wait, isn't ITIL more about service management?
upvoted 0 times
...
Ryan
4 months ago
Totally agree, ADP audits are key for IT controls!
upvoted 0 times
...
Inocencia
4 months ago
I think the answer is C, ADP audit.
upvoted 0 times
...
Shakira
4 months ago
I practiced a question similar to this, and I think it was about ADP audits too. It just makes sense for IT infrastructure controls.
upvoted 0 times
...
Nathan
4 months ago
I feel like risk analysis could be related, but it seems more about identifying risks rather than examining controls specifically.
upvoted 0 times
...
Shaquana
5 months ago
I'm not so sure about that. I remember studying ITIL, but I can't recall if it directly examines controls or just provides a framework.
upvoted 0 times
...
Derrick
5 months ago
I think the answer might be C, ADP audit, because it specifically focuses on auditing controls in IT systems.
upvoted 0 times
...
Brynn
5 months ago
This is a good question to test our understanding of IT governance and assurance. I'll need to think through the common frameworks used to evaluate IT infrastructure and controls.
upvoted 0 times
...
Ligia
5 months ago
I'm a bit confused by the options here. ITIL, risk analysis, and SMART don't seem directly related to auditing IT controls. I'll have to carefully consider each choice.
upvoted 0 times
...
Kattie
5 months ago
Okay, I've got this. The key here is to identify the framework or methodology that specifically examines the controls within an IT environment. I think the answer is C - ADP audit.
upvoted 0 times
...
Lorrie
5 months ago
Hmm, not sure about this one. I'll have to review my notes on IT auditing and see if I can recall the different approaches.
upvoted 0 times
...
William
5 months ago
This looks like a question on IT controls and auditing. I'll need to think about the key frameworks and processes used to assess IT infrastructure.
upvoted 0 times
...
An
5 months ago
Hmm, I'm not sure about the app customization reports. That one seems a bit out of place compared to the other options. I'll have to think carefully about which three factors are the most relevant.
upvoted 0 times
...
Fallon
5 months ago
This question seems pretty straightforward. I'm pretty confident I can identify the easiest way to steal cryptocurrency.
upvoted 0 times
...
Teri
5 months ago
Password is the most common VPN authentication method, but I don't think it's the most secure. I'll go with Certificate.
upvoted 0 times
...
Alease
5 months ago
This looks like a networking question, so I'll need to think about the encryption protocols commonly used in 5G transport networks.
upvoted 0 times
...
Gertude
5 months ago
This seems like a straightforward question about WebLogic patching processes. I'm pretty confident I can identify the three correct options.
upvoted 0 times
...
Linwood
5 months ago
Okay, I think I've got a handle on this. The key is to find a way to both encrypt the existing unencrypted objects and ensure that all future objects are encrypted by default.
upvoted 0 times
...

Save Cancel