New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC GSEC Exam - Topic 1 Question 54 Discussion

Actual exam question for GIAC's GSEC exam
Question #: 54
Topic #: 1
[All GSEC Questions]

Training an organization on possible phishing attacks would be included under which NIST Framework Core guidelines?

Show Suggested Answer Hide Answer
Suggested Answer: G

Contribute your Thoughts:

0/2000 characters
Keneth
3 months ago
It's all about prevention, so Protect is spot on.
upvoted 0 times
...
Daren
3 months ago
Wow, I thought it would fall under Respond. Interesting!
upvoted 0 times
...
Gracia
3 months ago
I agree, Protect makes the most sense here.
upvoted 0 times
...
Kaitlyn
4 months ago
Not sure about that, seems more like Identify to me.
upvoted 0 times
...
Reena
4 months ago
Definitely under Protect! Training is key.
upvoted 0 times
...
Elliott
4 months ago
I definitely recall that training employees is part of "Protect." It’s all about preventing attacks before they happen!
upvoted 0 times
...
Lelia
4 months ago
I'm a bit confused. I thought "Detect" was more about identifying ongoing attacks, but training seems like it could fit there too.
upvoted 0 times
...
Vicente
4 months ago
I remember a practice question about security awareness training, and I think it was linked to "Protect." That makes sense, right?
upvoted 0 times
...
Marya
5 months ago
I think training on phishing attacks falls under "Protect," but I'm not entirely sure. It might also relate to "Identify" since it involves recognizing threats.
upvoted 0 times
...
Arlette
5 months ago
I'm pretty confident this is the Protect guideline. The goal of the training is to equip the organization to safeguard against phishing attacks, which is a key part of the Protect aspect of the framework. I'll mark that as my answer.
upvoted 0 times
...
Adelaide
5 months ago
Okay, let me see if I can break this down. Phishing attacks are a type of threat that the organization needs to be prepared for, so the Protect guidelines make sense. But the training is also about identifying potential attacks, so Detect could work too. I'll have to review the NIST Framework details to be sure.
upvoted 0 times
...
Jeanice
5 months ago
Hmm, I'm not entirely sure about this one. Is it possible it could also be under the Detect guidelines, since detecting phishing attempts is an important part of the training? I'll have to think this through a bit more.
upvoted 0 times
...
Mari
5 months ago
I think this one is pretty straightforward. Training on phishing attacks would fall under the Protect guidelines of the NIST Framework, since it's about safeguarding the organization against potential threats.
upvoted 0 times
...
Paris
5 months ago
Hmm, I'm a little unsure about this one. The options seem similar, and I want to make sure I understand the key differences between them.
upvoted 0 times
...
Irma
5 months ago
I know we discussed that Hive uses specific systems for metadata, but I can't remember if it involves ZooKeeper or not.
upvoted 0 times
...
Princess
9 months ago
Protect, eh? I bet the NIST guys came up with that one over a few beers. 'Hey, let's put phishing training under Protect, it'll really mess with the candidates!' Genius, I tell ya!
upvoted 0 times
...
Carri
9 months ago
Protect, huh? I guess the hackers are getting so good, we need to be even better at keeping them out. Or maybe the NIST guys just really like the color blue. Who knows?
upvoted 0 times
Tashia
8 months ago
Definitely, we need to be proactive in preventing cyber attacks.
upvoted 0 times
...
Kirk
8 months ago
That's why it's important to stay updated on the latest security measures.
upvoted 0 times
...
Yoko
9 months ago
I agree, hackers are always finding new ways to trick us.
upvoted 0 times
...
Carry
9 months ago
Yeah, protecting our organization from phishing attacks is crucial.
upvoted 0 times
...
...
Leonor
10 months ago
Protect? Really? I was sure it had to be Detect. But hey, I'm just a humble IT guy, what do I know about NIST frameworks?
upvoted 0 times
Ronnie
8 months ago
Yeah, training is a proactive measure to safeguard against phishing. It falls under Protect.
upvoted 0 times
...
Marlon
8 months ago
Actually, it makes sense. Protecting the organization from threats is key.
upvoted 0 times
...
Genevieve
9 months ago
I think it's Protect because training helps prevent phishing attacks.
upvoted 0 times
...
...
Skye
10 months ago
Hmm, tricky one. But I think the NIST framework is all about prevention, so Protect makes the most sense here.
upvoted 0 times
Lyla
8 months ago
Training on phishing attacks falls under the Protect category in the NIST framework.
upvoted 0 times
...
Wilda
8 months ago
Protecting the organization from phishing attacks is crucial for cybersecurity.
upvoted 0 times
...
Clay
8 months ago
I think it's important to have measures in place to protect against phishing attacks.
upvoted 0 times
...
Graham
9 months ago
I agree, Protect seems like the right choice for training on phishing attacks.
upvoted 0 times
...
...
Ryan
11 months ago
Aha, phishing training is all about protecting the organization, so the answer has to be D. Protect. Easy peasy!
upvoted 0 times
Peggy
9 months ago
Phishing attacks can be very harmful, so it's great that organizations are focusing on protecting themselves.
upvoted 0 times
...
Renea
9 months ago
Definitely, protecting against phishing is crucial for the security of the organization.
upvoted 0 times
...
Paulina
9 months ago
I agree, it's important to educate employees on how to protect the organization from phishing attacks.
upvoted 0 times
...
Elza
10 months ago
Yes, you're right! Phishing training falls under the Protect category.
upvoted 0 times
...
...
Chu
11 months ago
That makes sense. So the answer would be D) Protect, right?
upvoted 0 times
...
Jacki
11 months ago
I believe it would be under Protect, since training helps to protect the organization from cyber threats.
upvoted 0 times
...
Chu
11 months ago
I think training on phishing attacks would fall under which NIST Framework Core guideline?
upvoted 0 times
...

Save Cancel