Independence Day Deal! Unlock 25% OFF Today – Limited-Time Offer - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC Exam GISF Topic 1 Question 54 Discussion

Actual exam question for GIAC's GISF exam
Question #: 54
Topic #: 1
[All GISF Questions]

You work as an Incident handler in Mariotrixt.Inc. You have followed the Incident handling processto handle the events and incidents. You identify Denial of Service attack (DOS) from a networklinked to your internal enterprise network. Which of the following phases of the Incident handlingprocess should you follow next to handle this incident?

Show Suggested Answer Hide Answer
Suggested Answer: A

Contribute your Thoughts:

Barney
2 months ago
I heard the IT guy at Mariotrixt.Inc is a big Mario fan. Bet he's busy trying to stomp on those pesky DoS attacks!
upvoted 0 times
...
Rebeca
2 months ago
Preparation? What, did you forget to buy popcorn? Containment is the way to go, stop that DoS attack in its tracks!
upvoted 0 times
Leonard
1 days ago
Containment? Absolutely, we need to stop that DoS attack before it causes more damage.
upvoted 0 times
...
Margery
2 days ago
D) Recovery
upvoted 0 times
...
Paris
4 days ago
C) Identification
upvoted 0 times
...
Shizue
6 days ago
B) Preparation
upvoted 0 times
...
Jamal
7 days ago
Containment is the way to go, stop that DoS attack in its tracks!
upvoted 0 times
...
Tamera
8 days ago
Preparation? What, did you forget to buy popcorn?
upvoted 0 times
...
Melodie
9 days ago
D) Recovery
upvoted 0 times
...
Kayleigh
11 days ago
C) Identification
upvoted 0 times
...
Tish
16 days ago
B) Preparation
upvoted 0 times
...
Ettie
27 days ago
A) Containment
upvoted 0 times
...
Casandra
1 months ago
A) Containment
upvoted 0 times
...
...
Yuette
2 months ago
Haha, Recovery? Really? We're just getting started! I'm going with Containment too, gotta stop the bleeding first.
upvoted 0 times
Linn
21 days ago
User 4: Containment first, then we can focus on recovering from the attack.
upvoted 0 times
...
Kimbery
1 months ago
User 3: Containment it is, let's stop this attack in its tracks.
upvoted 0 times
...
Lemuel
2 months ago
User 2: Definitely, containment is key to preventing further damage.
upvoted 0 times
...
Gilma
2 months ago
User 1: I agree, we need to contain the attack before we can even think about recovery.
upvoted 0 times
...
...
Virgie
2 months ago
Wait, are you sure? I think Identification is the key here. You need to understand the nature of the attack before you can contain it.
upvoted 0 times
...
Launa
2 months ago
Containment is the obvious next step. You need to isolate the affected network and stop the attack in its tracks.
upvoted 0 times
Melvin
26 days ago
Actually, the next step after identifying a DOS attack is containment to prevent further damage.
upvoted 0 times
...
Jesusita
27 days ago
D) Recovery
upvoted 0 times
...
Xochitl
28 days ago
That's correct. Containment is crucial to stop the attack from spreading.
upvoted 0 times
...
Fallon
1 months ago
A) Containment
upvoted 0 times
...
...
Goldie
2 months ago
I believe Identification should come first to fully understand the scope of the attack.
upvoted 0 times
...
Allene
3 months ago
I agree with Kenneth, Containment is crucial to stop the attack from spreading.
upvoted 0 times
...
Kenneth
3 months ago
I think we should follow the Containment phase next.
upvoted 0 times
...

Save Cancel