Spring Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

GCCC GIAC Critical Controls Certification (GCCC) Questions and Answers

Questions 4

Executive management approved the storage of sensitive data on smartphones and tablets as long as they were encrypted. Later a vulnerability was announced at an information security conference that allowed attackers to bypass the device’s authentication process, making the data accessible. The smartphone manufacturer said it would take six months for the vulnerability to be fixed and distributed through the cellular carriers. Four months after the vulnerability was announced, an employee lost his tablet and the sensitive information became public.

What was the failure that led to the information being lost?

Options:

A.

There was no risk acceptance review after the risk changed

B.

The employees failed to maintain their devices at the most current software version

C.

Vulnerability scans were not done to identify the devices that we at risk

D.

Management had not insured against the possibility of the information being lost

Buy Now
Questions 5

An organization has failed a test for compliance with a policy of continual detection and removal of malicious software on its network. Which of the following errors is the root cause?

Options:

A.

A host ran malicious software that exploited a vulnerability for which there was no patch

B.

The security console alerted when a host anti-virus ran whitelisted software

C.

The intrusion prevention system failed to update to the newest signature list

D.

A newly discovered vulnerability was not detected by the intrusion detection system

Buy Now
Questions 6

An organization has implemented a policy to detect and remove malicious software from its network. Which of the following actions is focused on correcting rather than preventing attack?

Options:

A.

Configuring a firewall to only allow communication to whitelisted hosts and ports

B.

Using Network access control to disable communication by hosts with viruses

C.

Disabling autorun features on all workstations on the network

D.

Training users to recognize potential phishing attempts

Buy Now
Questions 7

When evaluating the Wireless Access Control CIS Control, which of the following systems needs to be tested?

Options:

A.

Log management system

B.

802.1x authentication systems

C.

Data classification and access baselines

D.

PII data scanner

Buy Now
Questions 8

An organization has implemented a control for Controlled Use of Administrative Privileges. They are collecting audit data for each login, logout, and location for the root account of their MySQL server, but they are unable to attribute each of these logins to a specific user. What action can they take to rectify this?

Options:

A.

Force the root account to only be accessible from the system console.

B.

Turn on SELinux and user process accounting for the MySQL server.

C.

Force user accounts to use ‘sudo’ f or privileged use.

D.

Blacklist client applications from being run in privileged mode.

Buy Now
Questions 9

Which of the following is necessary to automate a control for Inventory and Control of Hardware Assets?

Options:

A.

A method of device scanning

B.

A centralized time server

C.

An up-to-date hardening guide

D.

An inventory of unauthorized assets

Buy Now
Questions 10

What is the relationship between a service and its associated port?

Options:

A.

A service closes a port after a period of inactivity

B.

A service relies on the port to select the protocol

C.

A service sets limits on the volume of traffic sent through the port

D.

A service opens the port and listens for network traffic

Buy Now
Questions 11

How does an organization ' s hardware inventory support the control for secure configurations?

Options:

A.

It provides a list of managed devices that should be secured

B.

It provides a list of unauthorized devices on the network

C.

It provides the MAC addresses for insecure network adapters

D.

It identifies the life cycle of manufacturer support for hardware devices

Buy Now
Questions 12

What is a recommended defense for the CIS Control for Application Software Security?

Options:

A.

Keep debugging code in production web applications for quick troubleshooting

B.

Limit access to the web application production environment to just the developers

C.

Run a dedicated vulnerability scanner against backend databases

D.

Display system error messages for only non-kernel related events

Buy Now
Questions 13

How often should the security awareness program be communicated to employees?

Options:

A.

Continuously

B.

Annually

C.

Monthly

D.

At orientation and review times

Buy Now
Questions 14

Kenya is a system administrator for SANS. Per the recommendations of the CIS Controls she has a dedicated host (kenya- adminbox / 10.10.10.10) for any administrative tasks. She logs into the dedicated host with her domain admin credentials. Which of the following connections should not exist from kenya-adminbox?

GCCC Question 14

Options:

A.

10.10.245.3389

B.

Mail.jane.org.25

C.

Firewall_charon.jane.org.22

D.

10.10.10.33.443

Buy Now
Questions 15

A global corporation has major data centers in Seattle, New York, London and Tokyo. Which of the following is the correct approach from an intrusion detection and event correlation perspective?

Options:

A.

Configure all data center systems to use local time

B.

Configure all data center systems to use GMT time

C.

Configure all systems to use their default time settings

D.

Synchronize between Seattle and New York, and use local time for London and Tokyo

Buy Now
Questions 16

Which of the following is used to prevent spoofing of e-mail addresses?

Options:

A.

Sender Policy Framework

B.

DNS Security Extensions

C.

Public-Key Cryptography

D.

Simple Mail Transfer Protocol

Buy Now
Questions 17

Below is a screenshot from a deployed next-generation firewall. These configuration settings would be a defensive measure for which CIS Control?

GCCC Question 17

Options:

A.

Controlled Access Based on the Need to Know

B.

Limitation and Control of Network Ports, Protocols and Services

C.

Email and Web Browser Protections

D.

Secure Configuration for Network Devices, such as Firewalls, Routers and Switches.

Buy Now
Questions 18

A security incident investigation identified the following modified version of a legitimate system file on a compromised client:

C:\Windows\System32\winxml.dll Addition Jan. 16, 2014 4:53:11 PM

The infection vector was determined to be a vulnerable browser plug-in installed by the user. Which of the organization’s CIS Controls failed?

Options:

A.

Application Software Security

B.

Inventory and Control of Software Assets

C.

Maintenance, Monitoring, and Analysis of Audit Logs

D.

Inventory and Control of Hardware Assets

Buy Now
Questions 19

What type of Unified Modelling Language (UML) diagram is used to show dependencies between logical groupings in a system?

Options:

A.

Package diagram

B.

Deployment diagram

C.

Class diagram

D.

Use case diagram

Buy Now
Questions 20

Which of the following items would be used reactively for incident response?

Options:

A.

A schedule for creating and storing backup

B.

A phone tree used to contact necessary personnel

C.

A script used to verify patches are installed on systems

D.

An IPS rule that prevents web access from international locations

Buy Now
Questions 21

As part of a scheduled network discovery scan, what function should the automated scanning tool perform?

Options:

A.

Uninstall listening services that have not been used since the last scheduled scan

B.

Compare discovered ports and services to a known baseline to report deviations

C.

Alert the incident response team on ports and services added since the last scan

D.

Automatically close ports and services not included in the current baseline

Buy Now
Questions 22

Which type of scan is best able to determine if user workstations are missing any important patches?

Options:

A.

A network vulnerability scan using aggressive scanning

B.

A source code scan

C.

A port scan using banner grabbing

D.

A web application/database scan

E.

A vulnerability scan using valid credentials

Buy Now
Questions 23

After installing a software package on several workstations, an administrator discovered the software opened network port TCP 23456 on each workstation. The port is part of a software management function that is not needed on corporate workstations. Which actions would best protect the computers with the software package installed?

Options:

A.

Document the port number and request approval from a change control group

B.

Redirect traffic to and from the software management port to a non-default port

C.

Block TCP 23456 at the network perimeter firewall

D.

Determine which service controls the software management function and opens the port, and disable it

Buy Now
Questions 24

John is implementing a commercial backup solution for his organization. Which of the following steps should be on the configuration checklist?

Options:

A.

Enable encryption if it ’s not enabled by default

B.

Disable software-level encryption to increase speed of transfer

C.

Develop a unique encryption scheme

Buy Now
Questions 25

Allied services have recently purchased NAC devices to detect and prevent non-company owned devices from attaching to their internal wired and wireless network. Corporate devices will be automatically added to the approved device list by querying Active Directory for domain devices. Non-approved devices will be placed on a protected VLAN with no network access. The NAC also offers a web portal that can be integrated with Active Directory to allow for employee device registration which will not be utilized in this deployment. Which of the following recommendations would make NAC installation more secure?

Options:

A.

Enforce company configuration standards for personal mobile devices

B.

Configure Active Directory to push an updated inventory to the NAC daily

C.

Disable the web portal device registration service

D.

Change the wireless password following the NAC implementation

Buy Now
Questions 26

The settings in the screenshot would be configured as part of which CIS Control?

GCCC Question 26

Options:

A.

Application Software Security

B.

Inventory and Control of Hardware Assets

C.

Account Monitoring and Control

D.

Controlled Use of Administrative Privileges

Buy Now
Questions 27

An Internet retailer ' s database was recently exploited by a foreign criminal organization via a remote attack. The initial exploit resulted in immediate root-level access. What could have been done to prevent this level of access being given to the intruder upon successful exploitation?

Options:

A.

Configure the DMZ firewall to block unnecessary service

B.

Install host integrity monitoring software

C.

Install updated anti-virus software

D.

Configure the database to run with lower privileges

Buy Now
Exam Code: GCCC
Exam Name: GIAC Critical Controls Certification (GCCC)
Last Update: Apr 30, 2026
Questions: 93

PDF + Testing Engine

$63.52  $181.49

Testing Engine

$50.57  $144.49
buy now GCCC testing engine

PDF (Q&A)

$43.57  $124.49
buy now GCCC pdf