New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GAQM CPEH-001 Exam - Topic 5 Question 85 Discussion

Actual exam question for GAQM's CPEH-001 exam
Question #: 85
Topic #: 5
[All CPEH-001 Questions]

An IT security engineer notices that the company's web server is currently being hacked. What should the engineer do next?

Show Suggested Answer Hide Answer
Suggested Answer: D

Technically, a buffer overflow is a problem with the program's internal implementation.


Contribute your Thoughts:

0/2000 characters
Ashleigh
3 months ago
Restarting won't solve the hack, just a temporary band-aid.
upvoted 0 times
...
Timmy
3 months ago
Wait, can you really just unplug it? Seems risky.
upvoted 0 times
...
Stefan
3 months ago
Counterattacks can backfire, not a good idea.
upvoted 0 times
...
Teri
4 months ago
Definitely agree, recording info is crucial too!
upvoted 0 times
...
Margarita
4 months ago
I think unplugging the server is a quick fix.
upvoted 0 times
...
Anisha
4 months ago
Restarting the server might stop the attack temporarily, but it could also lose valuable evidence. I’m leaning towards option C.
upvoted 0 times
...
Jesusita
4 months ago
Launching a counterattack sounds risky and could lead to legal issues. I feel like we should focus on gathering data first.
upvoted 0 times
...
Na
4 months ago
I remember a practice question where we had to analyze the situation before reacting. Recording information seems crucial to understand the attack better.
upvoted 0 times
...
Luther
5 months ago
I think unplugging the network connection might be a good immediate response, but I'm not sure if that's the best first step.
upvoted 0 times
...
Gearldine
5 months ago
Performing a system restart could be a good idea, but I'm worried that might cause us to lose important data or evidence. I think recording the attack details is the safest and most responsible option.
upvoted 0 times
...
Tora
5 months ago
Launching a counterattack? I don't know, that seems a bit risky. We should focus on containing the damage and gathering evidence rather than escalating the situation.
upvoted 0 times
...
Yvette
5 months ago
Hmm, I'm not sure about that. Unplugging the network connection might be the quickest way to stop the attack and prevent further damage. But I'll need to think it through a bit more.
upvoted 0 times
...
Lauran
5 months ago
I think the best approach here is to record as much information as possible from the attack. That way, we can analyze it later and figure out how to prevent similar attacks in the future.
upvoted 0 times
...
Denna
5 months ago
Okay, let's think this through step-by-step. The key is figuring out which codec will resolve the issue with the message waiting light not lighting up.
upvoted 0 times
...
Stephanie
5 months ago
Hmm, I'm a bit unsure about this one. The options seem similar, so I'll need to really think through how each one demonstrates communication as a two-way process.
upvoted 0 times
...
Tiffiny
10 months ago
Restarting the server? Ah, the classic 'have you tried turning it off and on again?' approach. Bold move!
upvoted 0 times
Bulah
9 months ago
B) Determine the origin of the attack and launch a counterattack.
upvoted 0 times
...
Lashon
9 months ago
C) Record as much information as possible from the attack.
upvoted 0 times
...
Shasta
9 months ago
A) Unplug the network connection on the company's web server.
upvoted 0 times
...
...
Micaela
10 months ago
Yes, yes, record everything! Might as well live-stream it on Twitch while we're at it.
upvoted 0 times
...
Ryann
10 months ago
A counterattack? Are we living in a spy movie now? Nah, gotta play it safe and gather intel.
upvoted 0 times
...
Celestina
11 months ago
But shouldn't we also gather information to understand how the hack occurred?
upvoted 0 times
...
Naomi
11 months ago
Unplugging the server? That's like throwing a bucket of water at a forest fire. Gotta think this through!
upvoted 0 times
Dustin
10 months ago
B) Determine the origin of the attack and launch a counterattack.
upvoted 0 times
...
Lezlie
10 months ago
C) Record as much information as possible from the attack.
upvoted 0 times
...
Tanja
10 months ago
A) Unplug the network connection on the company's web server.
upvoted 0 times
...
...
Kate
11 months ago
I think option A is the best choice to prevent further damage.
upvoted 0 times
...
Nada
11 months ago
We need to take immediate action to stop the hack.
upvoted 0 times
...

Save Cancel