100% Zufriedenheitsgarantie Sofort verfügbar nach Zahlung Sowohl online als auch als PDF Du bist an nichts gebunden 4.2 TrustPilot
logo-home
Prüfung

SANS GCIH Exam 2024_2025 fully solved & updated

Bewertung
-
Verkauft
-
seiten
28
Klasse
A+
Hochgeladen auf
02-10-2024
geschrieben in
2024/2025

SANS GCIH Exam 2024_2025 fully solved & updated

Hochschule
SANS
Kurs
SANS










Ups! Dein Dokument kann gerade nicht geladen werden. Versuch es erneut oder kontaktiere den Support.

Schule, Studium & Fach

Hochschule
SANS
Kurs
SANS

Dokument Information

Hochgeladen auf
2. oktober 2024
Anzahl der Seiten
28
geschrieben in
2024/2025
Typ
Prüfung
Enthält
Fragen & Antworten

Themen

Inhaltsvorschau

SANS GCIH Exam 2024/2025 fully solved &
updated




Who should make the decision of when to put a system back into production?

A) Systems administrators
B) Business team
C) Security team
D) Data owner - ANSWER-B) Business team

Which command will display ASCII and Unicode strings within a malware
sample?

A) cat
B) Get-Strings
C) strings
D) findstr - ANSWER-C) strings

Which type of system is most commonly used to investigate malware?

A) Virtual machine
B) Day-to-day host
C) Thick client
D) Production system - ANSWER-A) Virtual machine

If you believe your system has been the victim of a rootkit attack, what is the
most cost-effective form of eradication?

A) Restore the OS from the most recent backup.
B) Reformat, reinstall, and patch the system from the original media.
C) Patch and reboot the compromised system.

,D) Install applications from a different vendor. - ANSWER-B) Reformat, reinstall,
and patch the system from the original media.

What tool is used to record the state of the registry before and after malware is
executed on an analysis system?

A) Regshot
B) Ollydbg
C) Wireshark
D) Regripper - ANSWER-A) Regshot

What method could be used to ensure that an asset under investigation is not put
back into production without approval before the investigation is complete?

A) Move the asset to a different cloud data center.
B) Terminate the asset.
C) Shut off all administrative access to the cloud environment so no admins can
make changes.
D) Add an "under investigation" tag to the asset. - ANSWER-D) Add an "under
investigation" tag to the asset.

During the remediation phase of incident response, you remove a file from your
infected web server. What is the most important additional thing to do to prevent
being compromised again?

A) Determine the root cause of the attack.
B) Review your host-based firewall rules.
C) Restore the host data from backups.
D) Apply patches and harden the system. - ANSWER-A) Determine the root cause
of the attack.

Why is performing memory analysis on RAM images a staple of investigations?

A) Valuable information may exist in RAM, which might not be found on disk.
B) Speed - Evidence from a RAM image will match disk content.
C) RAM provides more consistent images than disk.
D) It's easier to look for historical information in RAM than on disk. - ANSWER-A)
Valuable information may exist in RAM, which might not be found on disk.

An investigator identifies the following POST request. Which log recorded the
activity?

, 1583050850.951 185 192.168.40.123 TCP_MISS/200 1856 POST
https://update.googleapis.com/service/update2? -ORIGINAL_DST/172.219.10.153
text/xml

A) Switch access log
B) Regshot event log
C) Proxy access log
D) Windows event log - ANSWER-C) Proxy access log

What are two basic approaches commonly employed when investigating
malware?

A) Running a penetration test and running a vulnerability scan.
B) Monitoring the environment and examining code.
C) Taking the environment offline and restoring from backups.
D) Performing a risk assessment and confirming a possible exploit type. -
ANSWER-B) Monitoring the environment and examining code.

What step should always be taken first during an incident?

A) Identifying which systems are unpatched.
B) Verifying whether an incident occurred.
C) Determining which threat intelligence feeds to query.
D) Choosing which systems to rebuild. - ANSWER-B) Verifying whether an
incident occurred.

In what way is logging API access to a cloud environment a major incident
response benefit?

A) It helps to provide detailed insight into network activity for analysis.
B) It helps to understand the scope of the breach and the actions taken by an
attacker.
C) It provides verification of breached data access.
D) It provides full packet capture visibility. - ANSWER-B) It helps to understand
the scope of the breach and the actions taken by an attacker.

API access logs include all programmatic access to cloud services, identity and
key use, and a record of attacker tactics used to exploit the cloud. These are the
most useful data for understanding the scope of a breach and the actions taken
by the attacker.

Lerne den Verkäufer kennen

Seller avatar
Bewertungen des Ansehens basieren auf der Anzahl der Dokumente, die ein Verkäufer gegen eine Gebühr verkauft hat, und den Bewertungen, die er für diese Dokumente erhalten hat. Es gibt drei Stufen: Bronze, Silber und Gold. Je besser das Ansehen eines Verkäufers ist, desto mehr kannst du dich auf die Qualität der Arbeiten verlassen.
BRAINSCAPE1 Chamberlain College Nursing
Profil betrachten
Folgen Sie müssen sich einloggen, um Studenten oder Kursen zu folgen.
Verkauft
126
Mitglied seit
1 Jahren
Anzahl der Follower
14
Dokumente
11145
Zuletzt verkauft
1 Jahren vor
download to pass in your exam

**Profile: Exam and Flashcards Sales**. **Introduction:** Welcome to my profile! I specialize in providing comprehensive exam and flashcard resources tailored to meet your educational needs. With a dedication to quality and effectiveness, I aim to assist students in achieving their academic goals with ease and confide**Services Offered:** 1. **Exam Materials:**- I offer a wide range of exam materials for various subjects and levels, including standardized tests such as SAT, ACT, GRE, GMAT, TOEFL, and more- These materials are meticulously crafted to cover all exam topics comprehensively, ensuring thorough preparation and confidence on test day. 2. **Flashcards:** - My collection of flashcards is designed to facilitate efficient learning and retention of key concepts. - Each set of flashcards is carefully curated to highlight essential information, making studying more manageable and effective. **Why Choose Me:** 1. **Quality Assurance:** - I prioritize quality in all my products, ensuring accuracy, relevance, and reliability. - Every exam material and flashcard set undergoes rigorous review and updating to reflect the latest changes in curriculum and exam formats. 2. **User-Friendly Resources:** - My resources are user-friendly, featuring clear formatting, concise explanations, and intuitive organization to enhance the learning experience. - Whether you're a visual learner or prefer text-based study aids, my materials cater to diverse learning preferences. 3. **Affordability:** - I believe that access to quality educational resources should not be cost-prohibitive. Thus, I offer competitive pricing without compromising on quality.

Mehr lesen Weniger lesen
4.4

20 rezensionen

5
12
4
5
3
2
2
0
1
1

Kürzlich von dir angesehen.

Warum sich Studierende für Stuvia entscheiden

on Mitstudent*innen erstellt, durch Bewertungen verifiziert

Geschrieben von Student*innen, die bestanden haben und bewertet von anderen, die diese Studiendokumente verwendet haben.

Nicht zufrieden? Wähle ein anderes Dokument

Kein Problem! Du kannst direkt ein anderes Dokument wählen, das besser zu dem passt, was du suchst.

Bezahle wie du möchtest, fange sofort an zu lernen

Kein Abonnement, keine Verpflichtungen. Bezahle wie gewohnt per Kreditkarte oder Sofort und lade dein PDF-Dokument sofort herunter.

Student with book image

“Gekauft, heruntergeladen und bestanden. So einfach kann es sein.”

Alisha Student

Häufig gestellte Fragen