New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC GCCC Exam - Topic 7 Question 76 Discussion

Actual exam question for GIAC's GCCC exam
Question #: 76
Topic #: 7
[All GCCC Questions]

An organization has implemented a control for Controlled Use of Administrative Privilege. The control requires users to enter a password from their own user account before being allowed elevated privileges, and that no client applications (e.g. web browsers, e-mail clients) can be run with elevated privileges. Which of the following actions will validate this control is implemented properly?

Show Suggested Answer Hide Answer
Suggested Answer: B

Contribute your Thoughts:

0/2000 characters
Ligia
2 months ago
I agree with A, it's the most straightforward way to validate.
upvoted 0 times
...
Mayra
2 months ago
C is irrelevant here, doesn't relate to the control at all.
upvoted 0 times
...
Francene
2 months ago
A is definitely the best choice. Log entries tell the whole story!
upvoted 0 times
...
Eladia
3 months ago
B seems useful too, but not as direct as A.
upvoted 0 times
...
Louis
3 months ago
Wait, can you really trust log entries? They can be tampered with!
upvoted 0 times
...
Rolande
3 months ago
I might be overthinking it, but I wonder if we need to combine multiple methods to really validate that the control is working as intended.
upvoted 0 times
...
Ivette
3 months ago
I feel like forcing the root account to be accessible only from the console is more about securing the root account itself, not directly related to validating the control we have here.
upvoted 0 times
...
Catrice
4 months ago
I remember a practice question about running scripts to monitor processes. That seems like a good way to ensure no unauthorized applications are running with elevated privileges.
upvoted 0 times
...
Gilma
4 months ago
I think checking the log entries is important because it shows who accessed elevated privileges, but I'm not sure if that's enough to validate the control.
upvoted 0 times
...
Lavelle
4 months ago
I've got a good feeling about this one. Option A seems like the most straightforward way to validate the control, by checking the logs to ensure privilege use matches authorized users. I'll go with that.
upvoted 0 times
...
Aja
4 months ago
I'm a little confused by this question. The options don't seem to directly address the specific control requirements mentioned. I'll need to re-read the question and think about how each option relates to validating that the control is implemented properly.
upvoted 0 times
...
Elizabeth
4 months ago
Okay, let me break this down. The control requires users to enter their own password for elevated privileges, and no client apps can run with elevated privileges. I think option A about checking the logs might be the best approach to validate that.
upvoted 0 times
...
Michell
4 months ago
Hmm, I'm a bit unsure about this one. The question is asking about validating the control, but the options don't seem to directly address that. I'll need to think carefully about how each option relates to the control requirements.
upvoted 0 times
...
Stephaine
5 months ago
This seems like a straightforward question about validating a specific control. I think I'll start by carefully reading through the options and considering which one best matches the requirements described in the question.
upvoted 0 times
...
Teddy
5 months ago
Hah, force the root account to only be accessible from the system console? What is this, the 90s? We're way past that level of security these days.
upvoted 0 times
...
King
5 months ago
I think option A is the best way to validate the control.
upvoted 0 times
...
Lili
6 months ago
Running a script to identify processes with admin privileges is a good idea too. That could catch any sneaky apps trying to run under the radar.
upvoted 0 times
...
Rory
6 months ago
I agree, checking the logs is the way to go. That way we can see if any unauthorized users are accessing the admin privileges.
upvoted 0 times
Frank
5 months ago
A) Check the log entries to match privilege use with access from authorized users.
upvoted 0 times
...
...
Beata
6 months ago
The log entries seem like the best way to validate the control. We need to see who is actually using the elevated privileges.
upvoted 0 times
Cary
5 months ago
A) That's a good point. The log entries will show us exactly who is using the elevated privileges.
upvoted 0 times
...
Cora
5 months ago
B) Run a script at intervals to identify processes running with administrative privilege.
upvoted 0 times
...
Samira
5 months ago
A) Check the log entries to match privilege use with access from authorized users.
upvoted 0 times
...
...

Save Cancel