New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC GSEC Exam - Topic 7 Question 41 Discussion

Actual exam question for GIAC's GSEC exam
Question #: 41
Topic #: 7
[All GSEC Questions]

While using Wire shark to investigate complaints of users being unable to login to a web application, you come across an HTTP POST submitted through your web application. The contents of the POST are listed below. Based on what you see below, which of the following would you recommend to prevent future damage to your database?

Show Suggested Answer Hide Answer
Suggested Answer: E

Contribute your Thoughts:

0/2000 characters
Ilona
3 months ago
Not sure if HTTPS alone is enough to prevent all malware, though.
upvoted 0 times
...
Carma
3 months ago
Agree, authenticating users is a must to protect the database!
upvoted 0 times
...
Mammie
3 months ago
Wait, using SSH for a DoS attack? That doesn't make sense.
upvoted 0 times
...
Timothy
4 months ago
I think using HTTPS is crucial too, can't believe some sites still don't!
upvoted 0 times
...
Melda
4 months ago
Definitely sanitize user inputs to stop those injection attacks!
upvoted 0 times
...
Murray
4 months ago
Using HTTPS sounds good for security, but I don't think it specifically prevents injection attacks, which might be the real problem in this case.
upvoted 0 times
...
Kimberely
4 months ago
I feel like authenticating users is crucial, but it might not directly address the issue of the POST data we see here.
upvoted 0 times
...
Bethanie
4 months ago
I'm not entirely sure, but I think using SSH is more about securing connections rather than preventing database damage.
upvoted 0 times
...
Detra
5 months ago
I remember we discussed the importance of sanitizing user inputs to prevent injection attacks in our last study session. That seems relevant here.
upvoted 0 times
...
Ryan
5 months ago
HTTPS would help encrypt the communication, but it wouldn't necessarily prevent the injection attack itself. I'm leaning towards the sanitization option as the best solution here.
upvoted 0 times
...
Hillary
5 months ago
Using SSH to prevent a denial of service attack doesn't seem relevant to this question. I think the focus is on protecting the database from malicious input.
upvoted 0 times
...
Omer
5 months ago
Hmm, I'm not sure if sanitizing inputs is the best approach here. Authenticating users might be a better way to prevent hackers from accessing the database directly.
upvoted 0 times
...
Carlee
5 months ago
This looks like a classic SQL injection attack. I'd recommend sanitizing user inputs to prevent this type of injection vulnerability.
upvoted 0 times
...
Javier
5 months ago
This is a tricky one. I'm a bit confused by the different answer choices, but I think sanitizing user inputs is the most appropriate recommendation based on the information provided.
upvoted 0 times
...
Krissy
5 months ago
This is a good opportunity to showcase my knowledge of Microsoft Defender for Endpoint. I'll make sure to cover all the key security controls and response steps outlined in the Microsoft Security Best Practices.
upvoted 0 times
...
Anissa
5 months ago
Hmm, I'm a little unsure about this one. I know there are different ways to import contacts, but I'm not sure which one is not possible. I'll have to think it through.
upvoted 0 times
...
Joni
5 months ago
This is a good question to test our understanding of instructional design principles. I'll use the process of elimination to determine which assumption is not typically made.
upvoted 0 times
...
Isaiah
9 months ago
Using Wireshark to catch a hacker in the act? That's some real 'CSI: Cybercrime' stuff right there.
upvoted 0 times
...
Kent
10 months ago
HTTPS won't help with SQL injection. What is this, amateur hour? B is the only way to go.
upvoted 0 times
Myrtie
8 months ago
Definitely, using ssh won't help with SQL injection. B is the way to go.
upvoted 0 times
...
Carman
8 months ago
Yeah, sanitizing user inputs is crucial to protect the database.
upvoted 0 times
...
Chanel
8 months ago
I agree, B is the best option to prevent injection attacks.
upvoted 0 times
...
...
Tesha
10 months ago
Authenticating users is a good idea, but it won't stop SQL injection. Gotta go with B to protect that database.
upvoted 0 times
Nicolette
8 months ago
Definitely, B is the way to go to protect against SQL injection.
upvoted 0 times
...
Lemuel
9 months ago
C) Authenticate users to prevent hackers from using your database
upvoted 0 times
...
Hermila
10 months ago
B) Sanitize user inputs to prevent injection attacks
upvoted 0 times
...
...
Gayla
10 months ago
Using SSH to prevent a denial of service attack? That's not even close to the right solution here. B is the clear choice.
upvoted 0 times
...
Dannie
10 months ago
I would also consider C) Authenticate users to prevent hackers from using your database as an additional layer of security.
upvoted 0 times
...
Angelica
10 months ago
I agree with Hector, preventing injection attacks is crucial for database security.
upvoted 0 times
...
Freida
11 months ago
That POST request looks like a classic SQL injection attack. Sanitizing user inputs would definitely be the way to go to prevent that.
upvoted 0 times
Linette
9 months ago
C) Authenticate users to prevent hackers from using your database
upvoted 0 times
...
Tish
9 months ago
B) Sanitize user inputs to prevent injection attacks
upvoted 0 times
...
Glory
9 months ago
A) Use ssh to prevent a denial of service attack
upvoted 0 times
...
...
Hector
11 months ago
I think B) Sanitize user inputs to prevent injection attacks would be the best option.
upvoted 0 times
...

Save Cancel