100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4.2 TrustPilot
logo-home
Examen

SANS GICSP Exam 2026 Questions and Answers

Puntuación
-
Vendido
-
Páginas
70
Grado
A+
Subido en
21-10-2025
Escrito en
2025/2026

SANS GICSP Exam 2026 Questions and Answers

Institución
A-IPC
Grado
A-IPC











Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
A-IPC
Grado
A-IPC

Información del documento

Subido en
21 de octubre de 2025
Número de páginas
70
Escrito en
2025/2026
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

SANS GICSP Exam 2026 Questions and
Answers

Access Control Models - Correct answer-Information Flow

Non Interference




Confidentiality of Stored Information

- Bell-LaPadula (Mandatory Access Control)

- Access Matrix (Read, Write or Execute or R/W/X)

- Take-Grant (Rights = Create, Revoke, Take and Grant




Integrity of Stored Information

- Biba Integrity Model (Bell-LaPadula upside down)

- Clark-Wilson



©COPYRIGHT 2025, ALL RIGHTS RESERVED 1

,Mandatory Access Control (MAC) - Correct answer-Permissions to objects are

managed centrally by an administrator. Is an access policy determined by the

system, rather than by the owner. Organizations use this in multilevel systems that

process highly sensitive data such as classified govt or military.




Examples: 1) Rule-based, 2) Lattice Model

Discretionary Access Control (DAC) - Correct answer-Is an access policy

determined by the owner of a file (or other resource). The owner decides who's

allowed access to a file and what privileges they have.

Role Based Access Control (RBAC) - Correct answer-A method of implementing

discretionary access controls in which access decisions are based on group

membership, according to organization or functional roles.

LDAP - Lightweight Directory Access Protocol - Correct answer-An Internet

Protocol (IP) and data storage model that supports authentication and directory

functions. It is a remote access authentication protocol. Vendors = Microsoft Active

Directory, CA eTrust Directory, Apache Directory Server, Novell eDirectory, IBM

SecureWay and Tivoli Directory Server, Sun Directlry Server. OpenLDAP and

tinyldap open source versions.

©COPYRIGHT 2025, ALL RIGHTS RESERVED 2

,User Account - Correct answer-Allows a user to authenticate to system services

and be granted authorization to access them; however, authentication does not

imply authorization.

Service Account - Correct answer-Is an account that a service on your computer

uses to run under and access resources. This should not be a user's personal

account. Can also be an account that is used for a scheduled task (e.g., batch job

account) or an account that is used in a script that is run outside of a specific user's

context. (Ref GIAC White Paper)

Default Account - Correct answer-System login account predefined in a

manufactured system to permit initial access when system is first put into service.

(pciscanner)

Guest Account - Correct answer-For users who don't have a permanent account on

your computer or domain. It allows people to use your computer without having

access to personal files. Per MSFT cannot install software or hardware, change

settings, or create a password. (MSFT)

Account expiration - Correct answer-A time limit that is applied to the life of an

account, so that it can be used only for a predetermined period of time. (MSFT)




©COPYRIGHT 2025, ALL RIGHTS RESERVED 3

, Access Control List (ACL) - Correct answer-List of subjects (including groups,

machines, processes*) that are authorized to access a particular object. Typically,

the types of access are read, write, execute, append, modify, delete and create.

(Harris) (*NIST)

Access Reconciliation - Correct answer-The action of making accounts consistent.

A process used to compare two sets of records to ensure the data are in agreement

and are accurate.

Configuration Control - Correct answer-Process of controlling modifications to

hardware, firmware, software and documentation to protect the information system

against improper modification prior to, during, and after system implementation.

(NIST)

Baseline Configuration - Correct answer-A set of specifications for a system that

has been formally reviewed and agreed on at a given point in time, and which can

be changed only through change control procedures. Used as a basis for future

builds, releases, and/or changes. (NIST)

Baseline - Correct answer-A process that identifies a consistent basis for an

organization's security architecture, taking into account system-specific

parameters, such as different operating systems. (Dummies)


©COPYRIGHT 2025, ALL RIGHTS RESERVED 4
$12.79
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor
Seller avatar
TutorJessica

Conoce al vendedor

Seller avatar
TutorJessica Yale University
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
4
Miembro desde
2 meses
Número de seguidores
0
Documentos
5082
Última venta
1 semana hace
TUTOR JESSICA

Welcome to my store, here you will come across tutor verified study materials you may need for your exam preparation.

0.0

0 reseñas

5
0
4
0
3
0
2
0
1
0

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes