Independence Day Deal! Unlock 25% OFF Today – Limited-Time Offer - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC Exam GISP Topic 5 Question 47 Discussion

Actual exam question for GIAC's GISP exam
Question #: 47
Topic #: 5
[All GISP Questions]

Which of the following types of activities can be audited for security?

Each correct answer represents a complete solution. Choose three.

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

Cordelia
1 months ago
A, B, and C - Ah, the holy trinity of security audits. Next thing you know, they'll be checking the coffee machine for any suspicious activity.
upvoted 0 times
...
Wade
1 months ago
B, C, and D - Logging in and out, files, and even the printer? Wow, they're really leaving no stone unturned in this audit. Better not be printing any love letters at work!
upvoted 0 times
Irma
6 days ago
User 3: Better watch what we print from now on.
upvoted 0 times
...
Marguerita
9 days ago
User 2: I know, they're even checking printer access.
upvoted 0 times
...
Dylan
12 days ago
User 1: Yeah, they're really thorough with this audit.
upvoted 0 times
...
...
Solange
2 months ago
A, B, and C - Yep, can't have those pesky internet downloads and sneaky file movements going unnoticed. Security is no joke!
upvoted 0 times
Fabiola
22 days ago
C) File and object access
upvoted 0 times
...
Marica
1 months ago
B) Network logons and logoffs
upvoted 0 times
...
Santos
1 months ago
A) Data downloading from the Internet
upvoted 0 times
...
...
Adelaide
2 months ago
B, C, and D - Ooh, printer access? Guess they don't want us printing out our secret plans for world domination, eh?
upvoted 0 times
Tasia
15 days ago
It makes sense to monitor all those activities to protect against potential security breaches.
upvoted 0 times
...
Peggie
26 days ago
I guess they want to make sure sensitive information isn't being printed without authorization.
upvoted 0 times
...
Kristeen
1 months ago
I didn't realize printer access was audited for security.
upvoted 0 times
...
Lashanda
2 months ago
Yeah, they're definitely keeping an eye on what we're printing.
upvoted 0 times
...
...
Slyvia
2 months ago
A, B, and C - Gotta keep an eye on that sneaky file access and login activity, you know? Hackers love to get their hands on our precious data.
upvoted 0 times
...
Macy
2 months ago
I'm not sure about A, but I definitely think B, C, and D are crucial for security audits.
upvoted 0 times
...
Trevor
2 months ago
I agree with Jennifer. Network logons and logoffs, file and object access, and printer access are all important for security auditing.
upvoted 0 times
...
Jennifer
2 months ago
I think B, C, and D can be audited for security.
upvoted 0 times
...

Save Cancel