Summer Special Sale - Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 575363r9

Welcome To DumpsPedia

GCCC Sample Questions Answers

Questions 4

Which activity increases the risk of a malware infection?

Options:

A.

Charging a smartphone using a computer USB port

B.

Editing webpages with a Linux system

C.

Reading email using a plain text email client

D.

Online banking in Incognito mode

Buy Now
Questions 5

Scan 1 was taken on Monday. Scan 2 was taken of the same network on Wednesday. Which of the following findings is accurate based on the information contained in the scans?

Options:

A.

The host located at 192.168.177.7 is no longer on the network

B.

The host with MAC Address D8:50:E6:9F:EE:60 is no longer on the network

C.

The host located at 192.168.177.21 is a new host on the network

D.

The host with MAC Address D8:50:E6:9F:EE:60 had an IP address change

Buy Now
Questions 6

Which type of scan is best able to determine if user workstations are missing any important patches?

Options:

A.

A network vulnerability scan using aggressive scanning

B.

A source code scan

C.

A port scan using banner grabbing

D.

A web application/database scan

E.

A vulnerability scan using valid credentials

Buy Now
Questions 7

When evaluating the Wireless Access Control CIS Control, which of the following systems needs to be tested?

Options:

A.

Log management system

B.

802.1x authentication systems

C.

Data classification and access baselines

D.

PII data scanner

Buy Now
Questions 8

An organization is implementing a control for the Account Monitoring and Control CIS Control, and have set the Account Lockout Policy as shown below. What is the risk presented by these settings?

Options:

A.

Brute-force password attacks could be more effective.

B.

Legitimate users could be unable to access resources.

C.

Password length and complexity will be automatically reduced.

D.

Once accounts are locked, they cannot be unlocked.

Buy Now
Questions 9

John a network administrator at Northeast High School. Faculty have been complaining that although they can detect and authenticate to the faculty wireless network, they are unable to connect. While troubleshooting, John discovers that the wireless network server is out of DHCP addresses due to a large number of unauthorized student devices connecting to the network. Which course of action would be an effective temporary stopgap to secure the network until a permanent solution can be found?

Options:

A.

Limit access to allowed MAC addresses

B.

Increase the size of the DHCP pool

C.

Change the password immediately

D.

Shorten the DHCP lease time

Buy Now
Questions 10

Based on the data shown below.

Which wireless access point has the manufacturer default settings still in place?

Options:

A.

Starbucks

B.

Linksys

C.

Hhonors

D.

Interwebz

Buy Now
Questions 11

Which of the following best describes the CIS Controls?

Options:

A.

Technical, administrative, and policy controls based on research provided by the SANS Institute

B.

Technical controls designed to provide protection from the most damaging attacks based on current threat data

C.

Technical controls designed to augment the NIST 800 series

D.

Technical, administrative, and policy controls based on current regulations and security best practices

Buy Now
Questions 12

Dragonfly Industries requires firewall rules to go through a change management system before they are configured. Review the change management log. Which of the following lines in your firewall ruleset has expired and should be removed from the configuration?

Options:

A.

access-list outbound permit tcp host 10.1.1.7 any eq smtp

B.

access-list outbound deny tcp any host 74.125.228.2 eq www

C.

access-list inbound permit tcp 8.8.0.0 0.0.0.255 10.10.12.252 eq 8080

D.

access-list inbound permit tcp host 8.8.207.97 host 10.10.12.100 eq ssh

Buy Now
Questions 13

Which of the following is used to prevent spoofing of e-mail addresses?

Options:

A.

Sender Policy Framework

B.

DNS Security Extensions

C.

Public-Key Cryptography

D.

Simple Mail Transfer Protocol

Buy Now
Questions 14

Which of the following should be used to test antivirus software?

Options:

A.

FIPS 140-2

B.

Code Red

C.

Heartbleed

D.

EICAR

Buy Now
Questions 15

An organization is implementing a control for the Limitation and Control of Network Ports, Protocols, and Services CIS Control. Which action should they take when they discover that an application running on a web server is no longer needed?

Options:

A.

Uninstall the application providing the service

B.

Turn the service off in the host configuration files

C.

Block the protocol for the unneeded service at the firewall

D.

Create an access list on the router to filter traffic to the host

Buy Now
Questions 16

Which of the following actions produced the output seen below?

Options:

A.

An access rule was removed from firewallrules.txt

B.

An access rule was added to firewallrules2.txt

C.

An access rule was added to firewallrules.txt

D.

An access rule was removed from firewallrules2.txt

Buy Now
Questions 17

An auditor is validating the policies and procedures for an organization with respect to a control for Data Recovery. The organization’s control states they will completely back up critical servers weekly, with incremental backups every four hours. Which action will best verify success of the policy?

Options:

A.

Verify that the backup media cannot be read without the encryption key

B.

Check the backup logs from the critical servers and verify there are no errors

C.

Select a random file from a critical server and verify it is present in a backup set

D.

Restore the critical server data from backup and see if data is missing

Buy Now
Questions 18

During a security audit which test should result in a source packet failing to reach its intended destination?

Options:

A.

A new connection request from the Internet is sent to a host on the company ’s internal net work

B.

A packet originating from the company’s DMZ is sent to a host on the company’s internal network

C.

A new connection request from the internet is sent to the company’s DNS server

D.

A packet originating from the company’s internal network is sent to the company’s DNS server

Buy Now
Questions 19

How can the results of automated network configuration scans be used to improve the security of the network?

Options:

A.

Reports can be sent to the CIO for performance benchmarks

B.

Results can be provided to network engineers as actionable feedback

C.

Scanners can correct network configurations issues

D.

Results can be included in audit evidence failures

Buy Now
Questions 20

Given the audit finding below, which CIS Control was being measured?

Options:

A.

Controlled Access Based on the Need to Know

B.

Controlled Use of Administrative Privilege

C.

Limitation and Control of Network Ports, Protocols and Services

D.

Secure Configurations for Hardware and Software on Laptops, Workstations, and Servers

E.

Inventory and Control of Hardware Assets

Buy Now
Questions 21

An organization has implemented a policy to continually detect and remove malware from its network. Which of the following is a detective control needed for this?

Options:

A.

Host-based firewall sends alerts when packets are sent to a closed port

B.

Network Intrusion Prevention sends alerts when RST packets are received

C.

Network Intrusion Detection devices sends alerts when signatures are updated

D.

Host-based anti-virus sends alerts to a central security console

Buy Now
Questions 22

What is the relationship between a service and its associated port?

Options:

A.

A service closes a port after a period of inactivity

B.

A service relies on the port to select the protocol

C.

A service sets limits on the volume of traffic sent through the port

D.

A service opens the port and listens for network traffic

Buy Now
Questions 23

Which of the following is a benefit of stress-testing a network?

Options:

A.

To determine device behavior in a DoS condition.

B.

To determine bandwidth needs for the network.

C.

To determine the connectivity of the network

D.

To determine the security configurations of the network

Buy Now
Questions 24

Which of the following is necessary for implementing and automating the Continuous Vulnerability Assessment and Remediation CIS Control?

Options:

A.

Software Whitelisting System

B.

System Configuration Enforcement System

C.

Patch Management System

D.

Penetration Testing System

Buy Now
Questions 25

Which of the following items would be used reactively for incident response?

Options:

A.

A schedule for creating and storing backup

B.

A phone tree used to contact necessary personnel

C.

A script used to verify patches are installed on systems

D.

An IPS rule that prevents web access from international locations

Buy Now
Questions 26

An organization has implemented a control for penetration testing and red team exercises conducted on their network. They have compiled metrics showing the success of the penetration testing (Penetration Tests), as well as the number of actual adversary attacks they have sustained (External Attacks). Assess the metrics below and determine the appropriate interpretation with respect to this control.

Options:

A.

The blue team is adequately protecting the network

B.

There are too many internal penetration tests being conducted

C.

The methods the red team is using are not effectively testing the network

D.

The red team is improving their capability to measure network security

Buy Now
Questions 27

What is a recommended defense for the CIS Control for Application Software Security?

Options:

A.

Keep debugging code in production web applications for quick troubleshooting

B.

Limit access to the web application production environment to just the developers

C.

Run a dedicated vulnerability scanner against backend databases

D.

Display system error messages for only non-kernel related events

Buy Now
Exam Code: GCCC
Exam Name: GIAC Critical Controls Certification (GCCC)
Last Update: Sep 15, 2025
Questions: 93
$66  $164.99
$50  $124.99
$42  $104.99
buy now GCCC