New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC GCIH Exam - Topic 8 Question 19 Discussion

Actual exam question for GIAC's GCIH exam
Question #: 19
Topic #: 8
[All GCIH Questions]

Which of the following are countermeasures to prevent unauthorized database access attacks?

Each correct answer represents a complete solution. Choose all that apply.

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

0/2000 characters
Antonio
3 months ago
Wait, can you really prevent attacks just by encrypting sessions?
upvoted 0 times
...
Lawana
3 months ago
I totally agree with input sanitization!
upvoted 0 times
...
Ruthann
3 months ago
Removing all stored procedures? That sounds risky.
upvoted 0 times
...
Sanjuana
4 months ago
Strong firewall rules are definitely needed.
upvoted 0 times
...
Regenia
4 months ago
Session encryption is a must!
upvoted 0 times
...
Erasmo
4 months ago
I feel like session encryption and input sanitization are both important, but I’m not convinced about removing stored procedures. That doesn’t seem right.
upvoted 0 times
...
Albina
4 months ago
Input sanitization sounds familiar, but I can't recall if it's specifically for preventing unauthorized access or just for general security.
upvoted 0 times
...
Gregg
4 months ago
I remember practicing a question about firewalls, and I think applying strong firewall rules is definitely a valid option here.
upvoted 0 times
...
Jordan
5 months ago
I think session encryption is definitely a good countermeasure, but I'm not entirely sure about removing all stored procedures. That seems a bit extreme.
upvoted 0 times
...
Glendora
5 months ago
I'm confident I know the answer to this one. Session encryption, firewall rules, and input sanitization are the key countermeasures to prevent unauthorized database access.
upvoted 0 times
...
Margarita
5 months ago
Removing stored procedures? I don't think that's a good idea. I'll focus on the more secure options like encryption and input validation.
upvoted 0 times
...
Jestine
5 months ago
Okay, I've got this. Session encryption, firewall rules, and input sanitization are definitely the way to go for preventing unauthorized database access.
upvoted 0 times
...
Alexis
5 months ago
Hmm, I'm a bit unsure about this one. I'll need to review my notes on database security to make sure I get this right.
upvoted 0 times
...
Fletcher
5 months ago
This is a tricky one, but I think I can handle it. Let me think through the options carefully.
upvoted 0 times
...
Tamesha
5 months ago
I think the answer is going to be something like 'ExceptionDetail'. That seems like the most logical way to get the current exception type and save it to the data item.
upvoted 0 times
...
Tatum
5 months ago
Yeah, I agree with Sarah. A singular matrix means the system of equations is underdetermined, so there won't be a unique solution. That's gotta be the reason why this could be an issue for the linear least squares model.
upvoted 0 times
...
Ilene
5 months ago
This seems like a straightforward accounting question about reporting changes in inventory valuation methods. I'll carefully review the options and think through the accounting principles involved.MikeS: Hmm, I'm a bit unsure about this one. The wording is a bit tricky, and I want to make sure I understand the difference between the "individual item" and "aggregate" approaches. Let me re-read the question and options closely.SarahP: Okay, I think I've got this. The key is that the change in approach is a change in accounting principle, so it should be reported as a retrospective adjustment to retained earnings, per option A. The other options don't seem to match the requirements.TomH: I'm feeling a bit lost on this one. Inventory valuation methods can get pretty complex, and I'm not totally clear on the implications of this change. I'll have to think it through step-by-step to make sure I select the right answer.
upvoted 0 times
...
Oliva
10 months ago
I'm just here for the free donuts. Oh, and the session encryption, of course. Can't have those hackers stealing my jelly-filled.
upvoted 0 times
Georgiann
9 months ago
C) Applying strong firewall rules
upvoted 0 times
...
Marion
9 months ago
A) Session encryption
upvoted 0 times
...
...
Jerry
10 months ago
Applying strong firewall rules is a must, but I'm also a big fan of using unicorn tears as a database security measure. Totally bulletproof.
upvoted 0 times
Ma
8 months ago
Yeah, I heard they're pretty effective against hackers.
upvoted 0 times
...
Elbert
8 months ago
Unicorn tears? That's a new one!
upvoted 0 times
...
Aja
9 months ago
D) Input sanitization
upvoted 0 times
...
Aileen
9 months ago
C) Applying strong firewall rules
upvoted 0 times
...
Yong
9 months ago
A) Session encryption
upvoted 0 times
...
...
Yoko
10 months ago
Removing stored procedures? Seriously? That's like cutting off your own arm to avoid a paper cut. Stick to the real solutions, people.
upvoted 0 times
Ezekiel
9 months ago
C) Applying strong firewall rules
upvoted 0 times
...
Nakisha
10 months ago
A) Session encryption
upvoted 0 times
...
...
Selma
10 months ago
Session encryption and input sanitization are definitely the way to go. Gotta keep those pesky hackers out of the database!
upvoted 0 times
...
Ronny
10 months ago
I'm not sure about removing all stored procedures. But I think A, C, and D are definitely important for security.
upvoted 0 times
...
Lynelle
11 months ago
I agree with Lawrence. Session encryption, strong firewall rules, and input sanitization can prevent unauthorized access.
upvoted 0 times
...
Lawrence
11 months ago
I think A, C, and D are countermeasures.
upvoted 0 times
...

Save Cancel