Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC Exam GCED Topic 9 Question 56 Discussion

Actual exam question for GIAC's GCED exam
Question #: 56
Topic #: 9
[All GCED Questions]

Why would a Cisco network device with the latest updates and patches have the service config setting enabled, making the device vulnerable to the TFTP Server Attack?

Show Suggested Answer Hide Answer
Suggested Answer: A

A company needs to classify its information as a key step in valuing it and knowing where to focus its protection.

Rotation of duties and separation of duties are both key elements in reducing the scope of information access and the ability to conceal malicious behavior.

Separation of duties helps minimize ''empire building'' within a company, keeping one individual from controlling a great deal of information, reducing the insider threat.

Security awareness programs can help other employees notice the signs of an insider attack and thus reduce the insider threat.

Detection is a reactive method and only occurs after an attack occurs. Only preventative methods can stop or limit an attack.


Contribute your Thoughts:

Sharmaine
8 days ago
I think the correct answer is E. An older default setting from a previous IOS version could still be enabled, even after upgrading to the latest version. Cisco has done a great job with security, but sometimes legacy configurations can cause issues.
upvoted 0 times
...
Rosamond
18 days ago
Maybe the older default IOS setting was inherited from an older configuration despite the upgrade.
upvoted 0 times
...
Elke
21 days ago
But disabling telnet could also enable the setting on the network device.
upvoted 0 times
...
Dianne
22 days ago
I think the setting is enabled by default in the current Cisco IOS.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77