New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC GISF Exam - Topic 4 Question 42 Discussion

Actual exam question for GIAC's GISF exam
Question #: 42
Topic #: 4
[All GISF Questions]

You work as a security manager for Qualxiss Inc. Your Company involves OODA loop for resolvingand deciding over company issues. You have detected a security breach issue in your company.Which of the following procedures regarding the breach is involved in the observe phase of theOODA loop?

Show Suggested Answer Hide Answer
Suggested Answer: A

Contribute your Thoughts:

0/2000 characters
Anika
3 months ago
Totally agree with D, learning from history is key!
upvoted 0 times
...
Mary
3 months ago
Wait, are we really considering past breaches? That feels off.
upvoted 0 times
...
Josephine
3 months ago
C seems more like the act phase, not observe.
upvoted 0 times
...
Tran
4 months ago
I think A is more relevant here.
upvoted 0 times
...
Angella
4 months ago
Definitely D, past breaches can give us insights!
upvoted 0 times
...
Ellsworth
4 months ago
I guess observing would involve looking at past incidents, but I’m not confident if that’s the best choice here.
upvoted 0 times
...
Jamal
4 months ago
I practiced a similar question, and I feel like deciding based on a hypothesis fits more with the decide phase, not observe.
upvoted 0 times
...
Novella
4 months ago
I'm not entirely sure, but I remember that following security guidelines is more about the act of responding rather than observing.
upvoted 0 times
...
Denny
5 months ago
I think the observe phase is all about gathering information, so maybe considering previous experiences of security breaches could be relevant?
upvoted 0 times
...
Olive
5 months ago
The observe phase is all about gathering information, so I'm leaning towards option D as the best answer here.
upvoted 0 times
...
Darrin
5 months ago
I'm a bit confused by the OODA loop and how it relates to security breaches. I'll need to review my notes before answering this.
upvoted 0 times
...
Merissa
5 months ago
Okay, let's see - the question is asking about the observe phase, so I need to focus on that. I think option D is the best answer.
upvoted 0 times
...
Mike
5 months ago
Hmm, the OODA loop is a new concept for me. I'll need to think this through carefully.
upvoted 0 times
...
Lindsey
5 months ago
This question seems straightforward, I'm pretty confident I can figure it out.
upvoted 0 times
...
Diego
5 months ago
Okay, I think I've got it. The HTTP job entry is designed specifically for downloading files from a website, so that's the best choice here. I'll mark that as my answer.
upvoted 0 times
...
Corazon
5 months ago
Hmm, I'm not sure which tier would be the best fit here. I'll need to review the details of each tier and do some calculations to determine the most cost-effective option.
upvoted 0 times
...
Samira
5 months ago
Hmm, this is a tricky one. I'll need to think carefully about the differences between the statements to determine which one is false.
upvoted 0 times
...
Caitlin
2 years ago
That's a good point, having a hypothesis can guide our next steps in resolving the breach.
upvoted 0 times
...
Helene
2 years ago
I believe deciding an activity based on a hypothesis could also be helpful in the observe phase.
upvoted 0 times
...
Vi
2 years ago
Yes, following the guidelines is important to ensure we are handling the breach correctly.
upvoted 0 times
...
Tien
2 years ago
But should we also follow the company security guidelines during the observe phase?
upvoted 0 times
...
Caitlin
2 years ago
I agree with Vi, analyzing past breaches can help us understand the current situation better.
upvoted 0 times
...
Vi
2 years ago
I think in the observe phase, we should consider previous experiences of security breaches.
upvoted 0 times
...

Save Cancel