GSOMY鯉J^好待、GSOM駅}鹿巓岑するように、GSOMY鯉^苧は堕sの嶷勣な何蛍である。GSOMY鯉^苧があれば、堕sは麿の繁の堕sより朕羨つようになります。 F壓、GSOMY鯉^苧の岑兆業がますます互くなっています。 GSOMY鯉^苧で祥のC氏をやしたい栽は、GIAC GSOMのトレ`ニングY創をごEください。 GIAC Security Operations Manager J協 GSOM Y} (Q31-Q36):| # 31
Which of the following is an essential aspect of the preparation phase in the incident response cycle?
Response:
A. Negotiating with the attackers
B. Conducting a detailed risk assessment
C. Recovering data from backup systems
D. Taking legal action against cyber attackers
屎盾B
| # 32
How should a SOC utilize threat intelligence to improve proactive detection?
Response:
A. Using threat intelligence once, then discarding it for being outdated
B. Only focusing on intelligence that pertains to high-profile organizations
C. By indiscriminately blocking all IP addresses found in threat intelligence feeds
D. Integrating intelligence into security tools to refine alerting mechanisms
屎盾D
| # 33
Effective SOC planning should take into account:
(Choose two)
Response:
A. The preference for automated systems over human decision-making
B. The regulatory compliance requirements affecting the organization
C. The latest trends in cybersecurity technology regardless of their relevance to the business
D. The organization,s specific threat landscape and relevant attack scenarios
屎盾B、D
| # 34
In the context of continuous improvement in SOC operations, adversarial emulation is used to:
Response:
A. Automate the generation of incident reports
B. Emulate potential attackers to test SOC responses
C. Simplify the incident response process
D. Replace real attackers in the cyber environment
屎盾B
| # 35
In orchestrating secure and efficient data collection, it is essential to:
(Choose two)
Response:
A. Ensure data integrity and confidentiality during collection and processing
B. Treat all data sources as equally critical to SOC operations
C. Align data collection practices with industry compliance requirements
D. Collect as much data as possible, regardless of its immediate relevance