Cyber Monday 2024! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC Exam GCED Topic 2 Question 50 Discussion

Actual exam question for GIAC's GCED exam
Question #: 50
Topic #: 2
[All GCED Questions]

Which of the following is an outcome of the initial triage during incident response?

Show Suggested Answer Hide Answer
Suggested Answer: B

Contribute your Thoughts:

Matthew
2 months ago
E. Serving hot coffee and donuts to the incident response team. Can't solve cyber incidents on an empty stomach, am I right?
upvoted 0 times
Quentin
8 days ago
D) Determining whether encryption is in use on in scope systems
upvoted 0 times
...
Shannon
10 days ago
C) Resetting registry keys that vary from the baseline configuration
upvoted 0 times
...
Roosevelt
11 days ago
B) Segmentation of the network to protect critical assets
upvoted 0 times
...
Shelba
21 days ago
A) Removal of unnecessary accounts from compromised systems
upvoted 0 times
...
...
Vonda
2 months ago
I'm going with C. Resetting registry keys that vary from the baseline configuration. Restoring normalcy is the name of the game.
upvoted 0 times
...
Kanisha
2 months ago
A. Removal of unnecessary accounts from compromised systems. Gotta clean house before you can start incident response.
upvoted 0 times
Carli
1 months ago
D) Determining whether encryption is in use on in scope systems
upvoted 0 times
...
Felix
1 months ago
B) Segmentation of the network to protect critical assets
upvoted 0 times
...
Chandra
1 months ago
A) Removal of unnecessary accounts from compromised systems
upvoted 0 times
...
...
Lawrence
2 months ago
D. Determining whether encryption is in use on in scope systems. That's crucial to understand the extent of the incident.
upvoted 0 times
Leonida
29 days ago
Encryption can play a key role in protecting sensitive data during an incident.
upvoted 0 times
...
Leonida
1 months ago
It's important to prioritize actions based on the initial triage findings.
upvoted 0 times
...
Leonida
2 months ago
Agreed, knowing if encryption is in use can help assess the impact of the incident.
upvoted 0 times
...
...
Ozell
2 months ago
But wouldn't segmentation of the network to protect critical assets also be an important outcome?
upvoted 0 times
...
William
2 months ago
I believe it's about removal of unnecessary accounts from compromised systems.
upvoted 0 times
...
Anabel
3 months ago
I think it's B. Segmentation of the network to protect critical assets. That's the key outcome of the initial triage during incident response.
upvoted 0 times
Willetta
2 months ago
Determining if encryption is in use on in scope systems is essential for incident response as well.
upvoted 0 times
...
Linsey
2 months ago
Yes, that's true. Resetting registry keys to the baseline configuration is also a key outcome.
upvoted 0 times
...
Barbra
2 months ago
But what about removing unnecessary accounts from compromised systems? Wouldn't that also be important?
upvoted 0 times
...
Cora
2 months ago
I agree, segmenting the network is crucial to protect important assets.
upvoted 0 times
...
...
Ozell
3 months ago
I think the outcome of initial triage is determining whether encryption is in use on in scope systems.
upvoted 0 times
...

Save Cancel