Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC Exam GCIH Topic 8 Question 19 Discussion

Actual exam question for GIAC's GCIH exam
Question #: 19
Topic #: 8
[All GCIH Questions]

Which of the following are countermeasures to prevent unauthorized database access attacks?

Each correct answer represents a complete solution. Choose all that apply.

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

Oliva
3 months ago
I'm just here for the free donuts. Oh, and the session encryption, of course. Can't have those hackers stealing my jelly-filled.
upvoted 0 times
Georgiann
3 months ago
C) Applying strong firewall rules
upvoted 0 times
...
Marion
3 months ago
A) Session encryption
upvoted 0 times
...
...
Jerry
4 months ago
Applying strong firewall rules is a must, but I'm also a big fan of using unicorn tears as a database security measure. Totally bulletproof.
upvoted 0 times
Ma
2 months ago
Yeah, I heard they're pretty effective against hackers.
upvoted 0 times
...
Elbert
2 months ago
Unicorn tears? That's a new one!
upvoted 0 times
...
Aja
2 months ago
D) Input sanitization
upvoted 0 times
...
Aileen
2 months ago
C) Applying strong firewall rules
upvoted 0 times
...
Yong
3 months ago
A) Session encryption
upvoted 0 times
...
...
Yoko
4 months ago
Removing stored procedures? Seriously? That's like cutting off your own arm to avoid a paper cut. Stick to the real solutions, people.
upvoted 0 times
Ezekiel
3 months ago
C) Applying strong firewall rules
upvoted 0 times
...
Nakisha
3 months ago
A) Session encryption
upvoted 0 times
...
...
Selma
4 months ago
Session encryption and input sanitization are definitely the way to go. Gotta keep those pesky hackers out of the database!
upvoted 0 times
...
Ronny
4 months ago
I'm not sure about removing all stored procedures. But I think A, C, and D are definitely important for security.
upvoted 0 times
...
Lynelle
4 months ago
I agree with Lawrence. Session encryption, strong firewall rules, and input sanitization can prevent unauthorized access.
upvoted 0 times
...
Lawrence
4 months ago
I think A, C, and D are countermeasures.
upvoted 0 times
...

Save Cancel