100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4,6 TrustPilot
logo-home
Examen

SANS GCIH (SEC504) EXAM QUESTIONS AND ANSWERS 100% PASS

Puntuación
-
Vendido
-
Páginas
56
Grado
A+
Subido en
02-02-2025
Escrito en
2024/2025

SANS GCIH (SEC504) EXAM QUESTIONS AND ANSWERS 100% PASS Who should make the decision of when to put a system back into production? A) Systems administrators B) Business team C) Security team D) Data owner - B) Business team Which command will display ASCII and Unicode strings within a malware sample? A) cat B) Get-Strings C) strings 2Brittie Donald, All Rights Reserved © 2025 D) findstr - C) strings Which type of system is most commonly used to investigate malware? A) Virtual machine B) Day-to-day host C) Thick client D) Production system - A) Virtual machine If you believe your system has been the victim of a rootkit attack, what is the most cost- effective form of eradication? A) Restore the OS from the most recent backup. B) Reformat, reinstall, and patch the system from the original media. C) Patch and reboot the compromised system. D) Install applications from a different vendor. - B) Reformat, reinstall, and patch the system from the original media. What tool is used to record the state of the registry before and after malware is executed on an analysis system? 3Brittie Donald, All Rights Reserved © 2025 A) Regshot B) Ollydbg C) Wireshark D) Regripper - A) Regshot What method could be used to ensure that an asset under investigation is not put back into production without approval before the investigation is complete? A) Move the asset to a different cloud data center. B) Terminate the asset. C) Shut off all administrative access to the cloud environment so no admins can make changes. D) Add an "under investigation" tag to the asset. - D) Add an "under investigation" tag to the asset. During the remediation phase of incident response, you remove a file from your infected web server. What is the most important additional thing to do to prevent being compromised again? 4Brittie Donald, All Rights Reserved © 2025 A) Determine the root cause of the attack. B) Review your host-based firewall rules. C) Restore the host data from backups. D) Apply patches and harden the system. - A) Determine the root cause of the attack. Why is performing memory analysis on RAM images a staple of investigations? A) Valuable information may exist in RAM, which might not be found on disk. B) Speed - Evidence from a RAM image will match

Mostrar más Leer menos
Institución
SANS GCIH
Grado
SANS GCIH











Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
SANS GCIH
Grado
SANS GCIH

Información del documento

Subido en
2 de febrero de 2025
Número de páginas
56
Escrito en
2024/2025
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

SANS GCIH (SEC504) EXAM
QUESTIONS AND ANSWERS 100%
PASS

Who should make the decision of when to put a system back into production?




A) Systems administrators


B) Business team


C) Security team


D) Data owner - ✔✔B) Business team


Which command will display ASCII and Unicode strings within a malware sample?




A) cat


B) Get-Strings


C) strings




Brittie Donald, All Rights Reserved © 2025 1

,D) findstr - ✔✔C) strings


Which type of system is most commonly used to investigate malware?




A) Virtual machine


B) Day-to-day host


C) Thick client


D) Production system - ✔✔A) Virtual machine


If you believe your system has been the victim of a rootkit attack, what is the most cost-

effective form of eradication?




A) Restore the OS from the most recent backup.


B) Reformat, reinstall, and patch the system from the original media.


C) Patch and reboot the compromised system.


D) Install applications from a different vendor. - ✔✔B) Reformat, reinstall, and patch

the system from the original media.


What tool is used to record the state of the registry before and after malware is executed

on an analysis system?




Brittie Donald, All Rights Reserved © 2025 2

,A) Regshot


B) Ollydbg


C) Wireshark


D) Regripper - ✔✔A) Regshot


What method could be used to ensure that an asset under investigation is not put back

into production without approval before the investigation is complete?




A) Move the asset to a different cloud data center.


B) Terminate the asset.


C) Shut off all administrative access to the cloud environment so no admins can make

changes.


D) Add an "under investigation" tag to the asset. - ✔✔D) Add an "under investigation"

tag to the asset.


During the remediation phase of incident response, you remove a file from your

infected web server. What is the most important additional thing to do to prevent being

compromised again?




Brittie Donald, All Rights Reserved © 2025 3

, A) Determine the root cause of the attack.


B) Review your host-based firewall rules.


C) Restore the host data from backups.


D) Apply patches and harden the system. - ✔✔A) Determine the root cause of the

attack.


Why is performing memory analysis on RAM images a staple of investigations?




A) Valuable information may exist in RAM, which might not be found on disk.


B) Speed - Evidence from a RAM image will match disk content.


C) RAM provides more consistent images than disk.


D) It's easier to look for historical information in RAM than on disk. - ✔✔A) Valuable

information may exist in RAM, which might not be found on disk.


An investigator identifies the following POST request. Which log recorded the activity?




1583050850.951 185 192.168.40.123 TCP_MISS/200 1856 POST

https://update.googleapis.com/service/update2? -ORIGINAL_DST/172.219.10.153

text/xml




Brittie Donald, All Rights Reserved © 2025 4
$12.99
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
BrittieDonald Howard Community College
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
409
Miembro desde
2 año
Número de seguidores
162
Documentos
21019
Última venta
3 horas hace
BrittieDonald Study Solutions.

Get Help in Your Due Online and Actual Exams, Assignments with Well Researched and Up-to date Study Materials for Guaranteed Success

3.5

92 reseñas

5
42
4
13
3
7
2
5
1
25

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes