New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC GCED Exam - Topic 2 Question 50 Discussion

Actual exam question for GIAC's GCED exam
Question #: 50
Topic #: 2
[All GCED Questions]

Which of the following is an outcome of the initial triage during incident response?

Show Suggested Answer Hide Answer
Suggested Answer: B

Contribute your Thoughts:

0/2000 characters
Katina
3 months ago
D is important, but I thought it came later in the response.
upvoted 0 times
...
Alonzo
3 months ago
Wait, are we really checking for encryption during triage?
upvoted 0 times
...
Shakira
3 months ago
C seems a bit off for initial triage.
upvoted 0 times
...
Micah
4 months ago
I think B is more critical for protecting assets.
upvoted 0 times
...
Lezlie
4 months ago
A is definitely part of the process.
upvoted 0 times
...
Alayna
4 months ago
I’m leaning towards the segmentation option, but I can’t recall if that’s specifically an outcome of the initial triage or a later step.
upvoted 0 times
...
Sabine
4 months ago
I practiced a question similar to this, and I feel like determining encryption status could be part of the assessment phase.
upvoted 0 times
...
Jacklyn
4 months ago
I remember something about network segmentation being important for protecting assets, but I'm not sure if that's part of the initial triage.
upvoted 0 times
...
Curtis
5 months ago
I think the initial triage is more about assessing the situation rather than making changes like removing accounts.
upvoted 0 times
...
Kimi
5 months ago
I'm a bit confused by the wording of the question. Can someone explain what "initial triage" means in the context of incident response?
upvoted 0 times
...
Isadora
5 months ago
Okay, let's see. I think the key here is to focus on the "initial triage" part of the question. That should help me identify the right outcome.
upvoted 0 times
...
Malcolm
5 months ago
Hmm, I'm not entirely sure about this one. The options seem similar, and I'll need to think it through carefully.
upvoted 0 times
...
Kati
5 months ago
This seems like a straightforward incident response question. I'm pretty confident I can narrow it down to the correct answer.
upvoted 0 times
...
Shay
5 months ago
Based on my understanding of incident response, I believe the correct answer is B. Segmenting the network to protect critical assets seems like a logical first step in the triage process.
upvoted 0 times
...
Maryln
5 months ago
This looks like a straightforward Kubernetes manifest creation task. I'll start by reviewing the requirements carefully and then build out the YAML file step-by-step.
upvoted 0 times
...
Matthew
1 year ago
E. Serving hot coffee and donuts to the incident response team. Can't solve cyber incidents on an empty stomach, am I right?
upvoted 0 times
Quentin
1 year ago
D) Determining whether encryption is in use on in scope systems
upvoted 0 times
...
Shannon
1 year ago
C) Resetting registry keys that vary from the baseline configuration
upvoted 0 times
...
Roosevelt
1 year ago
B) Segmentation of the network to protect critical assets
upvoted 0 times
...
Shelba
1 year ago
A) Removal of unnecessary accounts from compromised systems
upvoted 0 times
...
...
Vonda
1 year ago
I'm going with C. Resetting registry keys that vary from the baseline configuration. Restoring normalcy is the name of the game.
upvoted 0 times
...
Kanisha
1 year ago
A. Removal of unnecessary accounts from compromised systems. Gotta clean house before you can start incident response.
upvoted 0 times
Carli
1 year ago
D) Determining whether encryption is in use on in scope systems
upvoted 0 times
...
Felix
1 year ago
B) Segmentation of the network to protect critical assets
upvoted 0 times
...
Chandra
1 year ago
A) Removal of unnecessary accounts from compromised systems
upvoted 0 times
...
...
Lawrence
1 year ago
D. Determining whether encryption is in use on in scope systems. That's crucial to understand the extent of the incident.
upvoted 0 times
Leonida
1 year ago
Encryption can play a key role in protecting sensitive data during an incident.
upvoted 0 times
...
Leonida
1 year ago
It's important to prioritize actions based on the initial triage findings.
upvoted 0 times
...
Leonida
1 year ago
Agreed, knowing if encryption is in use can help assess the impact of the incident.
upvoted 0 times
...
...
Ozell
1 year ago
But wouldn't segmentation of the network to protect critical assets also be an important outcome?
upvoted 0 times
...
William
1 year ago
I believe it's about removal of unnecessary accounts from compromised systems.
upvoted 0 times
...
Anabel
1 year ago
I think it's B. Segmentation of the network to protect critical assets. That's the key outcome of the initial triage during incident response.
upvoted 0 times
Willetta
1 year ago
Determining if encryption is in use on in scope systems is essential for incident response as well.
upvoted 0 times
...
Linsey
1 year ago
Yes, that's true. Resetting registry keys to the baseline configuration is also a key outcome.
upvoted 0 times
...
Barbra
1 year ago
But what about removing unnecessary accounts from compromised systems? Wouldn't that also be important?
upvoted 0 times
...
Cora
1 year ago
I agree, segmenting the network is crucial to protect important assets.
upvoted 0 times
...
...
Ozell
1 year ago
I think the outcome of initial triage is determining whether encryption is in use on in scope systems.
upvoted 0 times
...

Save Cancel