Independence Day Deal! Unlock 25% OFF Today – Limited-Time Offer - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC Exam GPEN Topic 9 Question 54 Discussion

Actual exam question for GIAC's GPEN exam
Question #: 54
Topic #: 9
[All GPEN Questions]

You work as a Computer Hacking Forensic Investigator for SecureNet Inc. You want to investigate Cross-Site Scripting attack on your company's Website. Which of the following methods of investigation can you use to accomplish the task?

Each correct answer represents a complete solution. Choose all that apply.

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

Sabrina
2 months ago
Wait, is this a test or a spy novel? Either way, I'm game to play the part of the hacking investigator.
upvoted 0 times
Valentin
9 days ago
C) Use a Web proxy to view the Web server transactions in real time and investigate any communication with outside servers.
upvoted 0 times
...
Leonora
12 days ago
B) Look at the Web servers logs and normal traffic logging.
upvoted 0 times
...
Antonio
1 months ago
A) Review the source of any HTML-formatted e-mail messages for embedded scripts or links in the URL to the company's site.
upvoted 0 times
...
...
Tanesha
2 months ago
This is like a choose-your-own-adventure for cybersecurity nerds! I'm ready to crack the case.
upvoted 0 times
Keneth
20 days ago
C) Use a Web proxy to view the Web server transactions in real time and investigate any communication with outside servers.
upvoted 0 times
...
Erick
1 months ago
B) Look at the Web servers logs and normal traffic logging.
upvoted 0 times
...
Gaynell
1 months ago
A) Review the source of any HTML-formatted e-mail messages for embedded scripts or links in the URL to the company's site.
upvoted 0 times
...
...
Clement
2 months ago
Cross-Site Scripting, huh? Time to dust off my web forensics skills and get to work.
upvoted 0 times
...
Yasuko
2 months ago
Hmm, let's see... A, B, C, and D? Gotta love a question that keeps us on our toes!
upvoted 0 times
Catrice
1 months ago
B) Look at the Web servers logs and normal traffic logging.
upvoted 0 times
...
Elliott
1 months ago
A) Review the source of any HTML-formatted e-mail messages for embedded scripts or links in the URL to the company's site.
upvoted 0 times
...
...
Alfred
2 months ago
Wow, this is a tricky one! I'm gonna have to put on my detective hat for this one.
upvoted 0 times
...
Dante
2 months ago
Using Wireshark to capture traffic going to the server sounds like a good idea too.
upvoted 0 times
...
Natalie
3 months ago
I agree with Lonna, looking at the Web servers logs is also important.
upvoted 0 times
...
Lonna
3 months ago
I think we should review the source of any HTML-formatted e-mail messages.
upvoted 0 times
...

Save Cancel