CISSP Exam QuestionsBrowse all questions from this exam

CISSP Exam - Question 124


A database server for a financial application is scheduled for production deployment. Which of the following controls will BEST prevent tampering?

Show Answer
Correct Answer: D

The best control to prevent tampering with a database server for a financial application in production deployment is logging and monitoring. This control ensures that all activities on the database are continuously recorded and analyzed, allowing for the detection of unauthorized access or changes. Timely alerts and reviews of these logs can help prevent and respond to tampering incidents effectively. While data validation and sanitization are important for ensuring data accuracy and security, they do not prevent tampering directly. Service accounts removal helps in reducing unnecessary access but does not actively monitor for tampering.

Discussion

12 comments
Sign in to comment
franbarproOption: B
Oct 15, 2022

Input validation is the answer to alot of application attacks/issues. OWASP Top 10.

jackdryan
May 12, 2023

B is correct

YesPleaseOption: C
Dec 11, 2023

Answer C) Service accounts removal This is the only option that will actually prevent anything from happening. The following do not PREVENT anything. A. Data sanitization: involves purposely, permanently deleting, or destroying data from a storage device, to ensure it cannot be recovered. B. Data validation: is the process of checking the accuracy, integrity, and structure of data before it's used in a business operation. D. Logging and monitoring

deedenOption: D
Aug 7, 2024

Scenario: You code is in Dev environment and about to be deployed to Prod. How to ensure your code isn't changed in any way in any way prior to deployment? It has to be some form of FIM tool which could periodically compare the hash and alert for any mismatch (suspected tampering).

SangSang
Jan 16, 2025

Logging and Monitoring is NOT a preventive control

dev46Option: B
Sep 23, 2022

C & D has nothing to do with tampering A is about sanitization/ clearning

kptest12Option: B
Oct 11, 2022

https://www.youtube.com/watch?v=ydjDrIZyOIk

Rollizo
Sep 30, 2022

Input validation (also known as data validation) => this can protects new database deployment

HughJassole
Jun 25, 2023

C. Remove service accounts. The question states that a DB server is being moved to prod, and they don't want someone to mess with it now that it's in production, so it needs to be locked down. "Remove all access to your database (except for your own personal domain account). Literally, each and all accounts." https://softwareengineering.stackexchange.com/questions/369645/preventing-in-database-record-tampering

Bach1968Option: B
Jul 6, 2023

Data validation (option B). Data validation involves implementing checks and controls to ensure the integrity and accuracy of data.

GuardianAngelOption: B
Feb 13, 2024

Answer is Data validation: sql injection is possible becuase the data being input from a web form is not validated before it reaches the database by using regular expressions to check for special characters and limiting the number of characters the field (ultimately the parameter(variable)) that is passed to the database to be processed --- AND hopefully, the database is using stored procedures that have parameters to accept the data input instead of a method that is extremely vulnerable like the website using inline sql statements on the form

ElDirecOption: D
Jul 28, 2024

I think we are trying to avoid tampering with the SERVER, consequently avoiding tampering with the DB. Nowhere in the question it states it will be taking input from a customer. This might be a transaction logging DB, not necesarily one connected to a web server. I think Logging and monitoring is the better answer, as it can help detect and respond to any unauthorized attempts, such as modifying or deleting existing data

Dtony66Option: C
Jan 9, 2025

Service accounts are where the majority of attacks occur from.

ServerBrainOption: C
Mar 15, 2025

Key word is 'prevent',