Summer Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpm65

GCCC GIAC Critical Controls Certification (GCCC) Questions and Answers

Questions 4

During a security audit which test should result in a source packet failing to reach its intended destination?

Options:

A.

A new connection request from the Internet is sent to a host on the company ’s internal net work

B.

A packet originating from the company’s DMZ is sent to a host on the company’s internal network

C.

A new connection request from the internet is sent to the company’s DNS server

D.

A packet originating from the company’s internal network is sent to the company’s DNS server

Buy Now
Questions 5

Which of the following statements is appropriate in an incident response report?

Options:

A.

There had been a storm on September 27th that may have caused a power surge

B.

The registry entry was modified on September 29th at 22:37

C.

The attacker may have been able to access the systems due to missing KB2965111

D.

The backup process may have failed at 2345 due to lack of available bandwidth

Buy Now
Questions 6

What type of Unified Modelling Language (UML) diagram is used to show dependencies between logical groupings in a system?

Options:

A.

Package diagram

B.

Deployment diagram

C.

Class diagram

D.

Use case diagram

Buy Now
Questions 7

How often should the security awareness program be communicated to employees?

Options:

A.

Continuously

B.

Annually

C.

Monthly

D.

At orientation and review times

Buy Now
Questions 8

Which approach is recommended by the CIS Controls for performing penetration tests?

Options:

A.

Document a single vulnerability per system

B.

Utilize a single attack vector at a time

C.

Complete intrusive tests on test systems

D.

Execute all tests during network maintenance windows

Buy Now
Questions 9

Which activity increases the risk of a malware infection?

Options:

A.

Charging a smartphone using a computer USB port

B.

Editing webpages with a Linux system

C.

Reading email using a plain text email client

D.

Online banking in Incognito mode

Buy Now
Questions 10

An organization is implementing a control for the Account Monitoring and Control CIS Control, and have set the Account Lockout Policy as shown below. What is the risk presented by these settings?

GCCC Question 10

Options:

A.

Brute-force password attacks could be more effective.

B.

Legitimate users could be unable to access resources.

C.

Password length and complexity will be automatically reduced.

D.

Once accounts are locked, they cannot be unlocked.

Buy Now
Questions 11

Which of the following baselines is considered necessary to implement the Boundary Defense CIS Control?

Options:

A.

Multi-Factor Authentication Standard

B.

Network Traffic/Service Baseline

C.

Network Device Configuration Baselines

D.

Network Information Flow

Buy Now
Questions 12

Which of the following is used to prevent spoofing of e-mail addresses?

Options:

A.

Sender Policy Framework

B.

DNS Security Extensions

C.

Public-Key Cryptography

D.

Simple Mail Transfer Protocol

Buy Now
Questions 13

What is the relationship between a service and its associated port?

Options:

A.

A service closes a port after a period of inactivity

B.

A service relies on the port to select the protocol

C.

A service sets limits on the volume of traffic sent through the port

D.

A service opens the port and listens for network traffic

Buy Now
Exam Code: GCCC
Exam Name: GIAC Critical Controls Certification (GCCC)
Last Update: Jul 2, 2025
Questions: 93

PDF + Testing Engine

$57.75  $164.99

Testing Engine

$43.75  $124.99
buy now GCCC testing engine

PDF (Q&A)

$36.75  $104.99
buy now GCCC pdf
dumpsmate guaranteed to pass
24/7 Customer Support

DumpsMate's team of experts is always available to respond your queries on exam preparation. Get professional answers on any topic of the certification syllabus. Our experts will thoroughly satisfy you.

Site Secure

mcafee secure

TESTED 03 Jul 2025