New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC GISP Exam - Topic 5 Question 47 Discussion

Actual exam question for GIAC's GISP exam
Question #: 47
Topic #: 5
[All GISP Questions]

Which of the following types of activities can be audited for security?

Each correct answer represents a complete solution. Choose three.

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

0/2000 characters
Brock
3 months ago
Yeah, printer access can be logged too, it’s a thing!
upvoted 0 times
...
Sylvia
3 months ago
Wait, can you really audit printer access? That’s new to me!
upvoted 0 times
...
Moira
3 months ago
I agree, B and C are the main ones!
upvoted 0 times
...
Lavonna
4 months ago
A seems a bit off for auditing, not sure about that.
upvoted 0 times
...
Nakita
4 months ago
Definitely B and C can be audited.
upvoted 0 times
...
Stefania
4 months ago
I vaguely remember something about printer access being less common to audit, but it might still be relevant in certain contexts.
upvoted 0 times
...
Pearly
4 months ago
File and object access sounds right to me. I remember practicing questions where that was a key focus for security audits.
upvoted 0 times
...
Belen
4 months ago
I'm not entirely sure about data downloading from the Internet. I feel like it could be relevant, but I can't recall if it's typically audited.
upvoted 0 times
...
Shoshana
5 months ago
I think network logons and logoffs are definitely something that can be audited for security. It seems like a basic requirement.
upvoted 0 times
...
Gerald
5 months ago
I'm confident that network logons and logoffs, file and object access, and printer access are all good options for security auditing. I'll select those three.
upvoted 0 times
...
Glendora
5 months ago
Okay, let me think this through. File and object access seems like a key area to audit for security. And data downloading from the internet could also be an important activity to monitor.
upvoted 0 times
...
Gertude
5 months ago
Hmm, I'm not totally sure about this one. I know network logons and logoffs are important to audit, but what other activities would be relevant?
upvoted 0 times
...
Mayra
5 months ago
This looks like a straightforward security audit question. I'll start by thinking about the different types of activities that could be monitored for security purposes.
upvoted 0 times
...
Rikki
5 months ago
This question seems straightforward. I'll carefully read through the options and select the one that best fits the description of SOAR.
upvoted 0 times
...
Callie
5 months ago
This looks like a pretty straightforward question about managing disk groups in Veritas Volume Manager. I think I can handle this one.
upvoted 0 times
...
Cordelia
10 months ago
A, B, and C - Ah, the holy trinity of security audits. Next thing you know, they'll be checking the coffee machine for any suspicious activity.
upvoted 0 times
Kenia
8 months ago
C) File and object access
upvoted 0 times
...
Kassandra
8 months ago
B) Network logons and logoffs
upvoted 0 times
...
Delila
8 months ago
A) Data downloading from the Internet
upvoted 0 times
...
...
Wade
10 months ago
B, C, and D - Logging in and out, files, and even the printer? Wow, they're really leaving no stone unturned in this audit. Better not be printing any love letters at work!
upvoted 0 times
Irma
8 months ago
User 3: Better watch what we print from now on.
upvoted 0 times
...
Marguerita
8 months ago
User 2: I know, they're even checking printer access.
upvoted 0 times
...
Dylan
9 months ago
User 1: Yeah, they're really thorough with this audit.
upvoted 0 times
...
...
Solange
10 months ago
A, B, and C - Yep, can't have those pesky internet downloads and sneaky file movements going unnoticed. Security is no joke!
upvoted 0 times
Fabiola
9 months ago
C) File and object access
upvoted 0 times
...
Marica
9 months ago
B) Network logons and logoffs
upvoted 0 times
...
Santos
10 months ago
A) Data downloading from the Internet
upvoted 0 times
...
...
Adelaide
10 months ago
B, C, and D - Ooh, printer access? Guess they don't want us printing out our secret plans for world domination, eh?
upvoted 0 times
Tasia
9 months ago
It makes sense to monitor all those activities to protect against potential security breaches.
upvoted 0 times
...
Peggie
9 months ago
I guess they want to make sure sensitive information isn't being printed without authorization.
upvoted 0 times
...
Kristeen
10 months ago
I didn't realize printer access was audited for security.
upvoted 0 times
...
Lashanda
10 months ago
Yeah, they're definitely keeping an eye on what we're printing.
upvoted 0 times
...
...
Slyvia
10 months ago
A, B, and C - Gotta keep an eye on that sneaky file access and login activity, you know? Hackers love to get their hands on our precious data.
upvoted 0 times
...
Macy
11 months ago
I'm not sure about A, but I definitely think B, C, and D are crucial for security audits.
upvoted 0 times
...
Trevor
11 months ago
I agree with Jennifer. Network logons and logoffs, file and object access, and printer access are all important for security auditing.
upvoted 0 times
...
Jennifer
11 months ago
I think B, C, and D can be audited for security.
upvoted 0 times
...

Save Cancel