New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC GSEC Exam - Topic 3 Question 53 Discussion

Actual exam question for GIAC's GSEC exam
Question #: 53
Topic #: 3
[All GSEC Questions]

An email system administrator deploys a configuration blocking all inbound and outbound executable files due to security concerns.

What Defense in Depth approach is being used?

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

0/2000 characters
Clorinda
3 months ago
I agree with Glenn, it's all about uniformity in protection.
upvoted 0 times
...
Jacqueline
3 months ago
Wait, blocking all executables? That seems extreme.
upvoted 0 times
...
Natalie
3 months ago
Definitely a smart move for security!
upvoted 0 times
...
Reena
4 months ago
I think it's more about Protected Enclaves, right?
upvoted 0 times
...
Glenn
4 months ago
Sounds like a classic case of Uniform Protection.
upvoted 0 times
...
Keneth
4 months ago
I think the answer could be "Information Centric" since it focuses on the data being protected. But I remember there were nuances in each approach that make it tricky.
upvoted 0 times
...
Paz
4 months ago
I feel like this is about "Uniform Protection," but I might be mixing it up with another concept. It's hard to keep all these terms straight sometimes.
upvoted 0 times
...
Alesia
4 months ago
This question reminds me of a practice test where we discussed blocking threats at different layers. I think it might be "Protected Enclaves," but I'm not completely confident.
upvoted 0 times
...
Bev
5 months ago
I remember studying Defense in Depth, but I'm not entirely sure which approach this falls under. It seems like it could be related to protecting data, but I can't recall the specifics.
upvoted 0 times
...
Ernest
5 months ago
The key here is that the admin is using multiple security measures to protect the system. Blocking executable files is a good example of the Uniform Protection approach in Defense in Depth. I feel good about this one.
upvoted 0 times
...
Lino
5 months ago
I'm a bit confused by the wording of the question. Is there something specific I'm missing about the different Defense in Depth approaches? I want to make sure I get this right.
upvoted 0 times
...
Melodie
5 months ago
Okay, I got this. Blocking executable files is a way to create protected enclaves and add multiple layers of security. I'm confident this is the right answer.
upvoted 0 times
...
Lakeesha
5 months ago
This one seems pretty straightforward. Blocking all inbound and outbound executable files is a classic example of the Defense in Depth approach.
upvoted 0 times
...
Cruz
5 months ago
Hmm, I'm not too sure about this one. I'll have to think it through carefully to make sure I understand the different Defense in Depth approaches.
upvoted 0 times
...
Brunilda
5 months ago
Ah, I see now. The key is to perform the tests with notice to the organization. That way, they're prepared and can help me out if needed.
upvoted 0 times
...
Denise
5 months ago
This kind of question seems familiar. I think we discussed unsupported protocols in a previous practice exam.
upvoted 0 times
...
Ashlyn
1 year ago
I think it could also be Information Centric, as the focus is on protecting the data itself.
upvoted 0 times
...
Verda
1 year ago
Information Centric, huh? I bet they're just trying to keep us from downloading the latest cat video compilations.
upvoted 0 times
Trinidad
1 year ago
B: Yeah, it's better to be safe than sorry when it comes to security measures.
upvoted 0 times
...
Youlanda
1 year ago
A: Maybe they're just trying to prevent any potential malware from getting into the system.
upvoted 0 times
...
...
Martina
1 year ago
But blocking executable files is more about protecting the system as a whole, so Uniform Protection makes sense.
upvoted 0 times
...
Jarod
1 year ago
Uniform Protection? More like 'Uniformly Frustrating' if you ask me.
upvoted 0 times
Johana
1 year ago
D) Information Centric
upvoted 0 times
...
Reid
1 year ago
A) Protected Enclaves
upvoted 0 times
...
...
Alonso
1 year ago
I disagree, I believe it is Protected Enclaves.
upvoted 0 times
...
Una
2 years ago
Vector Oriented? Sounds like a superhero move - 'Blocking files with the power of directionality!'
upvoted 0 times
Vicki
1 year ago
Yeah, that makes sense. It's all about focusing on the data itself for security.
upvoted 0 times
...
Rupert
1 year ago
I think the correct answer is D) Information Centric.
upvoted 0 times
...
Rolland
1 year ago
Haha, that does sound like a superhero move!
upvoted 0 times
...
Maira
1 year ago
D) Information Centric
upvoted 0 times
...
Arthur
1 year ago
C) Vector Oriented
upvoted 0 times
...
Matthew
1 year ago
B) Uniform Protection
upvoted 0 times
...
Dorcas
1 year ago
A) Protected Enclaves
upvoted 0 times
...
...
Linette
2 years ago
Blocking all executable files? Looks like the admin is on a mission to make our inboxes as fun as a blank spreadsheet.
upvoted 0 times
Shanda
1 year ago
D) Information Centric
upvoted 0 times
...
Samira
1 year ago
C) Vector Oriented
upvoted 0 times
...
Kiley
1 year ago
B) Uniform Protection
upvoted 0 times
...
Corrina
2 years ago
A) Protected Enclaves
upvoted 0 times
...
...
Martina
2 years ago
I think the approach being used is Uniform Protection.
upvoted 0 times
...

Save Cancel