New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC GISP Exam - Topic 2 Question 5 Discussion

Actual exam question for GIAC's GISP exam
Question #: 5
Topic #: 2
[All GISP Questions]

Which of the following steps can be taken to protect laptops and data they hold?

Each correct answer represents a complete solution. Choose all that apply.

Show Suggested Answer Hide Answer
Suggested Answer: A, B, C, D

Contribute your Thoughts:

0/2000 characters
Lashandra
4 months ago
Hardening the OS is a great step, don't skip it!
upvoted 0 times
...
Cristen
4 months ago
Really? I doubt slot locks are that effective.
upvoted 0 times
...
Jospeh
4 months ago
I totally agree, encrypting data is essential!
upvoted 0 times
...
Aimee
4 months ago
Keeping an inventory is super important.
upvoted 0 times
...
Eladia
5 months ago
Slot locks are a must for security!
upvoted 0 times
...
Lavonna
5 months ago
Encrypting sensitive data seems like a must-have, but I wonder if there are any downsides to it that I might have missed.
upvoted 0 times
...
Cassi
5 months ago
I feel like hardening the operating system is definitely important, but I can't recall all the specific steps involved.
upvoted 0 times
...
Ceola
5 months ago
Keeping an inventory of laptops sounds familiar; I remember practicing that in a case study about asset management.
upvoted 0 times
...
Adela
5 months ago
I think using slot locks is a good idea, but I'm not sure if it's enough on its own to protect the data.
upvoted 0 times
...
Erick
5 months ago
Hmm, this one seems straightforward. I think the key is to focus on the role of the project board and what they should be receiving in terms of reports and information.
upvoted 0 times
...
Jospeh
5 months ago
Hmm, I'm a bit confused by the wording of this question. I'll need to read through it a few times to make sure I understand what it's asking.
upvoted 0 times
...
Dick
5 months ago
Okay, let's see here. I think the key is to prioritize the response and make sure critical systems are protected. Option C of prioritizing, reporting, and investigating seems like a solid approach. Gotta act quickly but also thoroughly document everything.
upvoted 0 times
...
Kristian
5 months ago
Hmm, I'm a bit unsure about this one. The options seem similar, and I'm not sure which one best describes the purpose of an information security policy. I'll have to think this through carefully.
upvoted 0 times
...

Save Cancel