Cyber Monday 2024! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC Exam GCCC Topic 5 Question 53 Discussion

Actual exam question for GIAC's GCCC exam
Question #: 53
Topic #: 5
[All GCCC Questions]

An organization is implementing an application software security control their custom-written code that provides web---based database access to sales partners. Which action will help mitigate the risk of the application being compromised?

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

Matthew
4 months ago
I'd go with option C. Gotta love those custom IDS signatures - they're like the cybersecurity version of a secret handshake.
upvoted 0 times
Marjory
2 months ago
Logging connection requests is also important to monitor any suspicious activity from outside hosts.
upvoted 0 times
...
Loren
3 months ago
It's important to have a strong defense in place, especially when dealing with web-based database access.
upvoted 0 times
...
Maile
3 months ago
I agree, having signatures for their IDS tailored to their web application can provide better protection.
upvoted 0 times
...
Albina
3 months ago
Option C sounds like a good choice. Custom IDS signatures can definitely help detect specific attacks.
upvoted 0 times
...
...
France
4 months ago
I personally think option D is the way to go.
upvoted 0 times
...
Curtis
4 months ago
Sharing the source code with sales partners? Yeah, that's a great idea if they want to be the next target of a data breach. Hard pass on option A.
upvoted 0 times
...
Brandon
4 months ago
Option B is the right choice. Securing the high-risk assets on the same network is crucial to prevent the whole system from being compromised.
upvoted 0 times
Shanda
3 months ago
Logging the connection requests is also important to track any suspicious activity from outside hosts.
upvoted 0 times
...
Ashton
3 months ago
Agreed, securing those assets will help prevent any potential compromise of the system.
upvoted 0 times
...
Malcom
3 months ago
Option B is definitely the way to go. We need to protect those high-risk assets.
upvoted 0 times
...
...
Paris
5 months ago
I agree with Hailey, option C seems like the most logical choice.
upvoted 0 times
...
Daryl
5 months ago
I don't know, man. Logging connection requests from outside hosts seems like the easiest and most straightforward solution to me. Why overcomplicate things?
upvoted 0 times
...
Chantay
5 months ago
Option C is definitely the way to go. Creating custom IDS signatures is the best way to protect against targeted attacks on their web app.
upvoted 0 times
Carmen
4 months ago
User 2
upvoted 0 times
...
Joaquin
5 months ago
User 1
upvoted 0 times
...
...
Hailey
5 months ago
I disagree, I believe option C is more effective.
upvoted 0 times
...
Shawna
5 months ago
I think option B is the best choice.
upvoted 0 times
...

Save Cancel