New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC GCCC Exam - Topic 7 Question 60 Discussion

Actual exam question for GIAC's GCCC exam
Question #: 60
Topic #: 7
[All GCCC Questions]

Why is it important to enable event log storage on a system immediately after it is installed?

Show Suggested Answer Hide Answer
Suggested Answer: B

Contribute your Thoughts:

0/2000 characters
Dawne
3 months ago
I’m not sure about all this, is logging really that important?
upvoted 0 times
...
Louisa
3 months ago
Wait, D? Root kits out of the box? That’s wild!
upvoted 0 times
...
Chaya
3 months ago
C seems kinda irrelevant, not really the point here.
upvoted 0 times
...
Marylou
4 months ago
B makes sense too, gotta track abnormal behavior!
upvoted 0 times
...
Elin
4 months ago
Definitely A! Restoring to a good state is crucial.
upvoted 0 times
...
Elise
4 months ago
I vaguely recall something about root kits, but I don't think that's the primary reason for event logging. It feels like it's more about monitoring and incident response.
upvoted 0 times
...
Rosio
4 months ago
I feel like option C about comparing performance with other systems might not be the main reason for enabling logs right away. It seems more about security.
upvoted 0 times
...
Lasandra
4 months ago
I remember a practice question about incident response where logging helped differentiate between normal and abnormal behavior. That seems really important!
upvoted 0 times
...
Paulina
5 months ago
I think enabling event log storage is crucial for tracking any suspicious activity, but I'm not sure if it's mainly for restoring to a good state or for analyzing behavior.
upvoted 0 times
...
Leonie
5 months ago
I'm a bit confused by the wording of the question. Let me re-read it carefully and see if I can eliminate any of the options.
upvoted 0 times
...
Jaime
5 months ago
Enabling event log storage right away is crucial for monitoring and troubleshooting. Option B looks like the best choice here.
upvoted 0 times
...
Kattie
5 months ago
Hmm, not sure about this one. I'll need to think through the options and consider the security implications of event log storage.
upvoted 0 times
...
Ines
5 months ago
This seems like a straightforward security question. I'll focus on the importance of logging and incident response.
upvoted 0 times
...
Eveline
5 months ago
This seems like a pretty straightforward Scrum question. I'm pretty confident I can handle this one.
upvoted 0 times
...
Alecia
1 year ago
I'd say B is the way to go. Separate the normal from the abnormal - that's the key to incident response.
upvoted 0 times
...
Xenia
1 year ago
Haha, C? That's like comparing apples to oranges. Event logs are for security, not performance.
upvoted 0 times
...
Angelo
1 year ago
D is the one. Identifying rootkits is the top priority when setting up a new system.
upvoted 0 times
Dahlia
1 year ago
D) To identify root kits included on the system out of the box
upvoted 0 times
...
Truman
1 year ago
D) To identify root kits included on the system out of the box
upvoted 0 times
...
Magda
1 year ago
B) To create the ability to separate abnormal behavior from normal behavior during an incident
upvoted 0 times
...
Ammie
1 year ago
A) To allow system to be restored to a known good state if it is compromised
upvoted 0 times
...
Nan
1 year ago
B) To create the ability to separate abnormal behavior from normal behavior during an incident
upvoted 0 times
...
Lewis
1 year ago
A) To allow system to be restored to a known good state if it is compromised
upvoted 0 times
...
...
Jeannetta
1 year ago
I'd go with A. Restoring the system to a known good state is the best way to handle a compromise.
upvoted 0 times
Arlie
1 year ago
A and B both seem like important reasons to enable event log storage immediately.
upvoted 0 times
...
Arlie
1 year ago
I think B is also important, separating abnormal behavior can help in identifying incidents.
upvoted 0 times
...
Arlie
1 year ago
I agree, restoring to a known good state is crucial in case of a compromise.
upvoted 0 times
...
...
Niesha
1 year ago
I think enabling event log storage is crucial for security purposes, so I would go with option A as well.
upvoted 0 times
...
Wilda
1 year ago
Definitely B. Logging events is crucial to detect and investigate any suspicious activity on the system.
upvoted 0 times
Tonette
1 year ago
Definitely B. Logging events is crucial to detect and investigate any suspicious activity on the system.
upvoted 0 times
...
Cathern
1 year ago
B) To create the ability to separate abnormal behavior from normal behavior during an incident
upvoted 0 times
...
Matt
1 year ago
A) To allow system to be restored to a known good state if it is compromised
upvoted 0 times
...
...
Alayna
1 year ago
B) To create the ability to separate abnormal behavior from normal behavior during an incident
upvoted 0 times
...
Flo
1 year ago
A) To allow system to be restored to a known good state if it is compromised
upvoted 0 times
...

Save Cancel