New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC GCCC Exam - Topic 5 Question 59 Discussion

Actual exam question for GIAC's GCCC exam
Question #: 59
Topic #: 5
[All GCCC Questions]

An Internet retailer's database was recently exploited by a foreign criminal organization via a remote attack. The initial exploit resulted in immediate root-level access. What could have been done to prevent this level of access being given to the intruder upon successful exploitation?

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

0/2000 characters
Georgeanna
3 months ago
Blocking unnecessary services is crucial too!
upvoted 0 times
...
Brice
3 months ago
Wait, how did they even get root access in the first place?
upvoted 0 times
...
William
3 months ago
I thought anti-virus was enough, but maybe not?
upvoted 0 times
...
Jame
4 months ago
Totally agree, D is the way to go.
upvoted 0 times
...
Cherri
4 months ago
Lowering database privileges is a must!
upvoted 0 times
...
Eleonore
4 months ago
I feel like updated anti-virus software is important, but I'm not sure it would have stopped a remote attack that gained root access. Option C might not be the best choice here.
upvoted 0 times
...
Bernadine
4 months ago
I practiced a question similar to this, and I think host integrity monitoring could help detect intrusions early. But I'm not convinced it's a complete solution like option D.
upvoted 0 times
...
Claribel
4 months ago
I'm not entirely sure, but I think blocking unnecessary services with a firewall could reduce attack vectors. Maybe option A is relevant here?
upvoted 0 times
...
Felicidad
5 months ago
I remember discussing the importance of running services with the least privilege principle. It seems like option D could really help prevent root access.
upvoted 0 times
...
Markus
5 months ago
Configuring the DMZ firewall to block unnecessary services seems like the most straightforward solution here. I'll make sure to explain my reasoning clearly.
upvoted 0 times
...
Elfrieda
5 months ago
Okay, I've got a strategy for this. I think configuring the database to run with lower privileges is the key to preventing this level of access.
upvoted 0 times
...
Brett
5 months ago
Hmm, I'm a bit unsure about this. I'll need to review the material on network security and database configurations to make sure I understand the best approach.
upvoted 0 times
...
Candida
5 months ago
This is a tricky one. I'll need to think carefully about the different security measures that could have prevented the intruder from gaining root-level access.
upvoted 0 times
...
Jesus
5 months ago
I'm feeling pretty confident about this one. Installing host integrity monitoring software would have been a great way to detect and prevent the initial exploit.
upvoted 0 times
...
Jillian
5 months ago
The national radio campaign sounds like an expensive option that might not be the best fit for a small club. I'm leaning more towards the one-month free trial or the refer-a-friend scheme - those seem like good ways to get new members in the door.
upvoted 0 times
...
Corrie
10 months ago
Gotta love it when the 'experts' leave the database wide open for the bad guys. D all the way!
upvoted 0 times
Owen
8 months ago
C) Install updated anti-virus software
upvoted 0 times
...
Cortney
9 months ago
B) Install host integrity monitoring software
upvoted 0 times
...
Tarra
9 months ago
A) Configure the DMZ firewall to block unnecessary service
upvoted 0 times
...
...
Virgina
10 months ago
Hah, I bet the IT team is kicking themselves for not setting the database to run with lower privileges. Rookie mistake!
upvoted 0 times
Corrie
8 months ago
D) Configure the database to run with lower privileges
upvoted 0 times
...
Ria
8 months ago
B) Install host integrity monitoring software
upvoted 0 times
...
Xenia
9 months ago
A) Configure the DMZ firewall to block unnecessary service
upvoted 0 times
...
...
Berry
10 months ago
I'm going with D as well. Running the database with lower privileges is a critical security practice that could have stopped this attack in its tracks.
upvoted 0 times
Delisa
9 months ago
C) Install updated anti-virus software
upvoted 0 times
...
Erasmo
9 months ago
B) Install host integrity monitoring software
upvoted 0 times
...
Shala
9 months ago
A) Configure the DMZ firewall to block unnecessary service
upvoted 0 times
...
...
Dong
10 months ago
A) Configuring the DMZ firewall is a good idea, but it wouldn't have prevented the initial root-level access. We need to focus on the database itself.
upvoted 0 times
Jules
9 months ago
A) Configuring the DMZ firewall is a good idea, but it wouldn't have prevented the initial root-level access. We need to focus on the database itself.
upvoted 0 times
...
Toshia
10 months ago
D) Configuring the database to run with lower privileges would have limited the intruder's access and prevented root-level access.
upvoted 0 times
...
Mitsue
10 months ago
B) Installing host integrity monitoring software could have detected the unauthorized access and prevented further exploitation.
upvoted 0 times
...
...
Junita
10 months ago
But wouldn't installing host integrity monitoring software also help in detecting and preventing such attacks?
upvoted 0 times
...
Audria
10 months ago
I agree with Keshia, that would have prevented the intruder from gaining root-level access.
upvoted 0 times
...
Alex
11 months ago
D) Configure the database to run with lower privileges seems like the best option here. Limiting the access rights of the database can really help contain the damage from such an exploit.
upvoted 0 times
Ryan
9 months ago
D) Configure the database to run with lower privileges
upvoted 0 times
...
Ashton
9 months ago
C) Install updated anti-virus software
upvoted 0 times
...
Johnetta
10 months ago
B) Install host integrity monitoring software
upvoted 0 times
...
Lizette
10 months ago
A) Configure the DMZ firewall to block unnecessary service
upvoted 0 times
...
Reita
10 months ago
User 2
upvoted 0 times
...
Hollis
10 months ago
User 1
upvoted 0 times
...
...
Keshia
11 months ago
We should have configured the DMZ firewall to block unnecessary services.
upvoted 0 times
...

Save Cancel