Question 7

Which type of scan is best able to determine if user workstations are missing any important patches?

Correct Answer:E

Question 8

What is the relationship between a service and its associated port?

Correct Answer:D

Question 9

An organization has created a policy that allows software from an approved list of applications to be installed on workstations. Programs not on the list should not be installed. How can the organization best monitor compliance with the policy?

Correct Answer:C

Question 10

Which of the following actions would best mitigate against phishing attempts such as the example below?
GCCC dumps exhibit

Correct Answer:C

Question 11

What is the first step suggested before implementing any single CIS Control?

Correct Answer:B

Question 12

Which of the following baselines is considered necessary to implement the Boundary Defense CIS Control?

Correct Answer:D

START GCCC EXAM