Independence Day Deal! Unlock 25% OFF Today – Limited-Time Offer - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC Exam GISF Topic 1 Question 54 Discussion

Actual exam question for GIAC's GISF exam
Question #: 54
Topic #: 1
[All GISF Questions]

You work as an Incident handler in Mariotrixt.Inc. You have followed the Incident handling processto handle the events and incidents. You identify Denial of Service attack (DOS) from a networklinked to your internal enterprise network. Which of the following phases of the Incident handlingprocess should you follow next to handle this incident?

Show Suggested Answer Hide Answer
Suggested Answer: A

Contribute your Thoughts:

Barney
1 months ago
I heard the IT guy at Mariotrixt.Inc is a big Mario fan. Bet he's busy trying to stomp on those pesky DoS attacks!
upvoted 0 times
...
Rebeca
2 months ago
Preparation? What, did you forget to buy popcorn? Containment is the way to go, stop that DoS attack in its tracks!
upvoted 0 times
Paris
2 days ago
C) Identification
upvoted 0 times
...
Shizue
4 days ago
B) Preparation
upvoted 0 times
...
Jamal
5 days ago
Containment is the way to go, stop that DoS attack in its tracks!
upvoted 0 times
...
Tamera
6 days ago
Preparation? What, did you forget to buy popcorn?
upvoted 0 times
...
Melodie
7 days ago
D) Recovery
upvoted 0 times
...
Kayleigh
9 days ago
C) Identification
upvoted 0 times
...
Tish
14 days ago
B) Preparation
upvoted 0 times
...
Ettie
25 days ago
A) Containment
upvoted 0 times
...
Casandra
1 months ago
A) Containment
upvoted 0 times
...
...
Yuette
2 months ago
Haha, Recovery? Really? We're just getting started! I'm going with Containment too, gotta stop the bleeding first.
upvoted 0 times
Linn
19 days ago
User 4: Containment first, then we can focus on recovering from the attack.
upvoted 0 times
...
Kimbery
1 months ago
User 3: Containment it is, let's stop this attack in its tracks.
upvoted 0 times
...
Lemuel
2 months ago
User 2: Definitely, containment is key to preventing further damage.
upvoted 0 times
...
Gilma
2 months ago
User 1: I agree, we need to contain the attack before we can even think about recovery.
upvoted 0 times
...
...
Virgie
2 months ago
Wait, are you sure? I think Identification is the key here. You need to understand the nature of the attack before you can contain it.
upvoted 0 times
...
Launa
2 months ago
Containment is the obvious next step. You need to isolate the affected network and stop the attack in its tracks.
upvoted 0 times
Melvin
24 days ago
Actually, the next step after identifying a DOS attack is containment to prevent further damage.
upvoted 0 times
...
Jesusita
25 days ago
D) Recovery
upvoted 0 times
...
Xochitl
26 days ago
That's correct. Containment is crucial to stop the attack from spreading.
upvoted 0 times
...
Fallon
1 months ago
A) Containment
upvoted 0 times
...
...
Goldie
2 months ago
I believe Identification should come first to fully understand the scope of the attack.
upvoted 0 times
...
Allene
2 months ago
I agree with Kenneth, Containment is crucial to stop the attack from spreading.
upvoted 0 times
...
Kenneth
2 months ago
I think we should follow the Containment phase next.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77