New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC GSEC Exam - Topic 9 Question 48 Discussion

Actual exam question for GIAC's GSEC exam
Question #: 48
Topic #: 9
[All GSEC Questions]

When should you create the initial database for a Linux file integrity checker?

Show Suggested Answer Hide Answer
Suggested Answer: E

Contribute your Thoughts:

0/2000 characters
Gregg
3 months ago
Totally agree with C, prevention is key!
upvoted 0 times
...
Darrin
3 months ago
I thought it should be done during setup, not after.
upvoted 0 times
...
Kasandra
3 months ago
Wait, why would you create it after a compromise? That's risky!
upvoted 0 times
...
Elli
4 months ago
I think A makes sense too, but C is better.
upvoted 0 times
...
Marylin
4 months ago
C is definitely the right choice.
upvoted 0 times
...
Alfreda
4 months ago
I thought we discussed that setting it up during an attack is definitely a no-go, but I can't remember the specifics of when the right time is.
upvoted 0 times
...
Gilberto
4 months ago
I feel like creating the database after a system has been compromised is too late, but I can't recall the exact reasoning behind it.
upvoted 0 times
...
Salome
4 months ago
I remember practicing a question like this, and I think it was emphasized that you want to have the database ready before any potential issues arise.
upvoted 0 times
...
Jacki
5 months ago
I think the initial database should be created before a system is compromised, but I'm not entirely sure if that's the best time.
upvoted 0 times
...
Valentin
5 months ago
This is a tricky one, but I think the key is to create the initial database before the system has been compromised. That way, you can use it to detect any unauthorized changes. I'll go with option C.
upvoted 0 times
...
Ruby
5 months ago
I'm a little confused on the timing here. Should the database be created before or after a compromise? I want to make sure I understand this properly before answering.
upvoted 0 times
...
Verdell
5 months ago
Okay, let's see. The goal is to have a baseline to compare against, so I think the answer is before the system is patched or compromised. That way, you can detect any changes. I'll go with option A.
upvoted 0 times
...
Tiara
5 months ago
Hmm, I'm a bit unsure about this one. I know file integrity checkers are important, but I'm not sure when the best time is to create the initial database. I'll have to think this through carefully.
upvoted 0 times
...
Cordell
5 months ago
This seems like a straightforward question. I'd say the initial database should be created before the system has been compromised, so I'll go with option C.
upvoted 0 times
...
Geraldo
5 months ago
I'm feeling pretty confident about this one. If the dock is locked and the base station can't get clock signals, it would go into a holdover state to maintain timing until the clock source is restored. The other options don't seem to fit the scenario described.
upvoted 0 times
...
Jutta
5 months ago
I'm pretty confident on this one. The key is that the company bills monthly in advance, but the first project is recognized at the end of May. So the proper entry would be to debit Unearned Revenue and credit Revenue. That's option B.
upvoted 0 times
...
Vincent
5 months ago
Okay, I've got this. The key is that command runners can only do what they've been given access to, so I'll select the options that match that.
upvoted 0 times
...
Audra
5 months ago
I'm pretty confident the answer is C. The "Check" phase is where you monitor and measure the processes and compare them against the business continuity policy, so that's the one that assesses the effectiveness of the BCMS.
upvoted 0 times
...
Rosenda
10 months ago
Haha, Bernadine's comment is spot on! 'During an attack' - might as well just throw the whole system out and start over.
upvoted 0 times
Dorethea
9 months ago
C) Before a system has been compromised
upvoted 0 times
...
Hassie
10 months ago
A) Before a system is patched
upvoted 0 times
...
...
Bernadine
10 months ago
Option D is just silly. During an attack? That's like trying to fix a leaky faucet while the house is on fire.
upvoted 0 times
...
Pilar
11 months ago
I agree with Elouise. Creating the initial database beforehand is crucial for effective file integrity monitoring.
upvoted 0 times
Jamal
9 months ago
D) During an attack
upvoted 0 times
...
Stefania
9 months ago
I always create the initial database before any potential compromise.
upvoted 0 times
...
Casie
9 months ago
C) Before a system has been compromised
upvoted 0 times
...
Gladys
10 months ago
A) Before a system is patched
upvoted 0 times
...
...
Elouise
11 months ago
Option C seems like the logical choice. You want to establish a baseline before any potential compromise, not after.
upvoted 0 times
...
Edmond
11 months ago
Creating the database during an attack would be too late, so I think the answer is C.
upvoted 0 times
...
Golda
11 months ago
I agree with Daniel, it's important to have the database ready beforehand.
upvoted 0 times
...
Daniel
11 months ago
I think we should create the initial database before a system is compromised.
upvoted 0 times
...

Save Cancel