New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC GPEN Exam - Topic 9 Question 54 Discussion

Actual exam question for GIAC's GPEN exam
Question #: 54
Topic #: 9
[All GPEN Questions]

You work as a Computer Hacking Forensic Investigator for SecureNet Inc. You want to investigate Cross-Site Scripting attack on your company's Website. Which of the following methods of investigation can you use to accomplish the task?

Each correct answer represents a complete solution. Choose all that apply.

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

0/2000 characters
Ceola
3 months ago
Wait, can Wireshark really pinpoint the source like that?
upvoted 0 times
...
Alline
3 months ago
D is a must for tracking down that malicious traffic!
upvoted 0 times
...
Chana
3 months ago
C sounds useful, but is it really necessary?
upvoted 0 times
...
Ty
4 months ago
A and B are solid choices!
upvoted 0 times
...
Mozell
4 months ago
Definitely check the web server logs!
upvoted 0 times
...
Rosita
4 months ago
Wireshark could definitely help capture traffic, but I wonder if it’s too complex for this specific scenario. I need to double-check my notes on that.
upvoted 0 times
...
Nieves
4 months ago
Using a web proxy sounds familiar, but I can't recall if it directly relates to XSS investigations. I might need to think that one through.
upvoted 0 times
...
Audra
4 months ago
I remember practicing with web server logs in a similar question; it seems like a solid method to track down suspicious activity.
upvoted 0 times
...
Lenora
5 months ago
I think reviewing the source of HTML emails could be useful, but I'm not entirely sure if it's the best first step for a Cross-Site Scripting attack.
upvoted 0 times
...
Cathrine
5 months ago
This question is testing our knowledge of web security and forensics. I think the key is to look for any suspicious activity or communication, whether that's in email, web server logs, or network traffic. Gotta be thorough to catch that cross-site scripting attack!
upvoted 0 times
...
Rosendo
5 months ago
Okay, I've got this. Reviewing email sources for embedded scripts, looking at web server logs, using a web proxy, and capturing traffic with Wireshark - those are all solid techniques to investigate a cross-site scripting attack. I feel confident I can apply these methods effectively.
upvoted 0 times
...
Rodolfo
5 months ago
Hmm, I'm a bit unsure about this one. I know cross-site scripting is a common web vulnerability, but I'm not super familiar with the forensic investigation process. I'll need to think through the different methods carefully to make sure I select the right ones.
upvoted 0 times
...
Raylene
5 months ago
This looks like a straightforward question on investigating a cross-site scripting attack. I think I can handle this - reviewing email sources, checking web server logs, and using a web proxy and Wireshark all seem like good approaches to identify the attack.
upvoted 0 times
...
Virgie
5 months ago
Ah, I know this topic well from my quality management course. A quality audit is all about identifying areas for improvement, so I'm pretty confident the right answer is B.
upvoted 0 times
...
Sabrina
10 months ago
Wait, is this a test or a spy novel? Either way, I'm game to play the part of the hacking investigator.
upvoted 0 times
Valentin
8 months ago
C) Use a Web proxy to view the Web server transactions in real time and investigate any communication with outside servers.
upvoted 0 times
...
Leonora
9 months ago
B) Look at the Web servers logs and normal traffic logging.
upvoted 0 times
...
Antonio
9 months ago
A) Review the source of any HTML-formatted e-mail messages for embedded scripts or links in the URL to the company's site.
upvoted 0 times
...
...
Tanesha
10 months ago
This is like a choose-your-own-adventure for cybersecurity nerds! I'm ready to crack the case.
upvoted 0 times
Keneth
9 months ago
C) Use a Web proxy to view the Web server transactions in real time and investigate any communication with outside servers.
upvoted 0 times
...
Erick
9 months ago
B) Look at the Web servers logs and normal traffic logging.
upvoted 0 times
...
Gaynell
10 months ago
A) Review the source of any HTML-formatted e-mail messages for embedded scripts or links in the URL to the company's site.
upvoted 0 times
...
...
Clement
10 months ago
Cross-Site Scripting, huh? Time to dust off my web forensics skills and get to work.
upvoted 0 times
...
Yasuko
10 months ago
Hmm, let's see... A, B, C, and D? Gotta love a question that keeps us on our toes!
upvoted 0 times
Catrice
10 months ago
B) Look at the Web servers logs and normal traffic logging.
upvoted 0 times
...
Elliott
10 months ago
A) Review the source of any HTML-formatted e-mail messages for embedded scripts or links in the URL to the company's site.
upvoted 0 times
...
...
Alfred
11 months ago
Wow, this is a tricky one! I'm gonna have to put on my detective hat for this one.
upvoted 0 times
...
Dante
11 months ago
Using Wireshark to capture traffic going to the server sounds like a good idea too.
upvoted 0 times
...
Natalie
11 months ago
I agree with Lonna, looking at the Web servers logs is also important.
upvoted 0 times
...
Lonna
11 months ago
I think we should review the source of any HTML-formatted e-mail messages.
upvoted 0 times
...

Save Cancel