New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC GISF Exam - Topic 6 Question 2 Discussion

Actual exam question for GIAC's GISF exam
Question #: 2
Topic #: 6
[All GISF Questions]

John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. The company is aware of various types of security attacks and wants to impede them. Hence, management has assigned John a project to port scan the company's Web Server. For this, he uses the nmap port scanner and issues the following command to perform idle port scanning:

nmap -PN -p- -sI IP_Address_of_Company_Server

He analyzes that the server's TCP ports 21, 25, 80, and 111 are open.

Which of the following security policies is the company using during this entire process to mitigate therisk of hacking attacks?

Show Suggested Answer Hide Answer
Suggested Answer: A

Contribute your Thoughts:

0/2000 characters
Cordie
4 months ago
Non-disclosure agreements? Not really relevant here, right?
upvoted 0 times
...
Lindsey
4 months ago
I agree, audit policies are crucial for identifying vulnerabilities.
upvoted 0 times
...
Shaquana
4 months ago
Wait, how can they be sure those ports are secure?
upvoted 0 times
...
Catarina
4 months ago
Definitely! Open ports need constant monitoring.
upvoted 0 times
...
Dalene
5 months ago
Sounds like they're using an audit policy to keep track of security.
upvoted 0 times
...
Sherell
5 months ago
This question reminds me of a practice scenario we did on security policies. I think the acceptable use policy is more about user behavior rather than network scanning.
upvoted 0 times
...
Lenna
5 months ago
I'm not entirely sure, but I feel like an antivirus policy wouldn't really apply here since John is scanning ports, not dealing with malware directly.
upvoted 0 times
...
Janessa
5 months ago
I remember we discussed how an audit policy is crucial for identifying vulnerabilities, so I think that might be the right answer.
upvoted 0 times
...
Ming
5 months ago
I keep getting mixed up between audit and acceptable use policies. I guess I need to think about which one focuses more on security measures like this.
upvoted 0 times
...
Katie
5 months ago
Wait, what happens if the 15 days takes us past the end of February? I'm not sure if that would cause an issue with the leap year. I better double-check the logic here.
upvoted 0 times
...
Ira
5 months ago
I'm pretty sure PEPs are always a high-risk category. That's definitely one selection.
upvoted 0 times
...
Annita
5 months ago
Ah, this is the kind of question I was hoping to see! The Fusioninsight HD Manager is responsible for managing the Loader, so I'm confident I can identify the correct operations it would perform.
upvoted 0 times
...
Isreal
5 months ago
Alright, let's break this down. The company is currently all-equity financed, and they're adding long-term debt. Based on the debt-to-equity ratio, the cost of equity should decrease, since the financial risk to shareholders is now lower.
upvoted 0 times
...
Lajuana
5 months ago
I'm a bit unsure about this one. The options seem similar, but I'll need to double-check the definitions to make sure I select the correct setting.
upvoted 0 times
...
Verda
5 months ago
This one seems pretty straightforward. The Authorizing Official is the advisor, so I'll go with option C.
upvoted 0 times
...

Save Cancel