Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC Exam GISP Topic 5 Question 47 Discussion

Actual exam question for GIAC's GISP exam
Question #: 47
Topic #: 5
[All GISP Questions]

Which of the following types of activities can be audited for security?

Each correct answer represents a complete solution. Choose three.

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

Solange
12 hours ago
A, B, and C - Yep, can't have those pesky internet downloads and sneaky file movements going unnoticed. Security is no joke!
upvoted 0 times
...
Adelaide
5 days ago
B, C, and D - Ooh, printer access? Guess they don't want us printing out our secret plans for world domination, eh?
upvoted 0 times
...
Slyvia
7 days ago
A, B, and C - Gotta keep an eye on that sneaky file access and login activity, you know? Hackers love to get their hands on our precious data.
upvoted 0 times
...
Macy
15 days ago
I'm not sure about A, but I definitely think B, C, and D are crucial for security audits.
upvoted 0 times
...
Trevor
15 days ago
I agree with Jennifer. Network logons and logoffs, file and object access, and printer access are all important for security auditing.
upvoted 0 times
...
Jennifer
18 days ago
I think B, C, and D can be audited for security.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77