GCIH Practice Questions: Incident Response and Cyber Investigation Domain
Test your GCIH knowledge with 10 practice questions from the Incident Response and Cyber Investigation domain. Includes detailed explanations and answers.
GCIH Practice Questions
Master the Incident Response and Cyber Investigation Domain
Test your knowledge in the Incident Response and Cyber Investigation domain with these 10 practice questions. Each question is designed to help you prepare for the GCIH certification exam with detailed explanations to reinforce your learning.
Question 1
You receive an alert about potential malware on a workstation. What is the best first step in handling this incident?
Show Answer & Explanation
Correct Answer: B
Explanation: Isolating the workstation from the network (B) is the best first step as it prevents the potential spread of malware while allowing for further investigation. Shutting down the workstation (A) can result in loss of volatile data. Running a full antivirus scan (C) should be done after isolation. Checking event logs (D) is useful but should follow network isolation to prevent further compromise.
Question 2
You suspect a data exfiltration attempt on your network. Which tool would provide the most immediate insights into this activity?
Show Answer & Explanation
Correct Answer: B
Explanation: Wireshark (B) is the best tool for capturing and analyzing network traffic, allowing you to identify unusual data flows indicating exfiltration. Sysinternals Suite (A) is more suited for system-level analysis, not network traffic. Nmap (C) is for network scanning, not traffic analysis. Metasploit (D) is used for penetration testing, not monitoring or analysis.
Question 3
You are the incident handler for an organization that has just detected unusual outbound traffic from a server. What is the best first step to take in response to this incident?
Show Answer & Explanation
Correct Answer: C
Explanation: The best first step is to isolate the server from the network (Option C) to prevent further data exfiltration or spread of the threat. Shutting down the server (Option A) may destroy volatile data, and conducting a full forensic analysis (Option B) is time-consuming and not an immediate containment step. Notifying all employees (Option D) is not a first response action.
Question 4
During an incident response, you receive an alert about potential data exfiltration through a specific server. What is the most effective initial action to take?
Show Answer & Explanation
Correct Answer: D
Explanation: The most effective initial action in this scenario is to isolate the server from the network (Option D) to prevent further data exfiltration and contain the incident. Shutting down the server (Option A) might result in loss of volatile data that could be crucial for the investigation. Capturing network traffic (Option B) and reviewing server logs (Option C) are important but should be done after containment to ensure that the threat is not actively causing more damage.
Question 5
During an incident response investigation, you suspect that a compromised system is being used for data exfiltration through a covert channel. You find evidence of Netcat being used on the system. Which of the following Netcat commands would most likely indicate a reverse shell used for data exfiltration?
Show Answer & Explanation
Correct Answer: B
Explanation: Option B represents a reverse shell initiated by the compromised system, connecting back to the attacker's machine at IP address 192.168.1.100 on port 4444 and executing /bin/bash. This is a common method for establishing a covert channel for data exfiltration. Option A is a listener command, which is not used for initiating a reverse connection. Option C is a simple TCP connection that doesn't execute a shell. Option D is a listener that writes incoming data to a file, not a reverse shell.
Question 6
You are the first responder to a suspected malware infection on a workstation. What is the best first step you should take?
Show Answer & Explanation
Correct Answer: A
Explanation: Isolating the workstation from the network is the best first step as it prevents the potential spread of malware to other systems while preserving the current state for further analysis. Deleting files (Option B) could destroy evidence. Running a full antivirus scan (Option C) is useful but should be done after isolation to prevent further spread. Rebooting in safe mode (Option D) could alter the system state and is not an immediate containment action.
Question 7
An incident handler is tasked with identifying the source of a DDoS attack. Which tool would be most effective for this task?
Show Answer & Explanation
Correct Answer: A
Explanation: Wireshark (A) is effective for capturing and analyzing network traffic, which is crucial in identifying the source of a DDoS attack. Nmap (B) is used for network scanning, not traffic analysis. Snort (C) is an IDS and can detect attacks but is not primarily used for identifying sources. Exiftool (D) is used for metadata extraction from files and is irrelevant in this context.
Question 8
You receive an alert about a possible data breach involving sensitive customer data. What should be your first priority?
Show Answer & Explanation
Correct Answer: C
Explanation: Containing the breach to prevent further data loss is the first priority. This action helps to limit the impact of the breach. Informing customers (Option A) is important but should occur after containment and confirmation. Starting a forensic investigation (Option B) is crucial but should follow containment to ensure the breach does not worsen. Notifying law enforcement (Option D) is typically done after confirming the breach and assessing its scope.
Question 9
After identifying suspicious network traffic, what is the most effective initial tool-based action to investigate further?
Show Answer & Explanation
Correct Answer: C
Explanation: Capturing and analyzing packets using Wireshark (Option C) is the most effective initial tool-based action to investigate suspicious network traffic. It allows for detailed inspection of the traffic to identify potential threats. Using Nmap (Option A) and setting up a honeypot (Option D) are more proactive measures that do not directly address the immediate analysis need. Deploying a SIEM (Option B) is a long-term strategy and not an immediate action.
Question 10
An alert indicates possible unauthorized access to a critical database. What is the most effective initial action?
Show Answer & Explanation
Correct Answer: B
Explanation: Reviewing database access logs (Option B) is the most effective initial action to identify any unauthorized access patterns. Changing passwords (Option A) or shutting down the server (Option C) are premature without understanding the situation. Informing the administrator (Option D) is not a direct response action.
Ready to Accelerate Your GCIH Preparation?
Join thousands of professionals who are advancing their careers through expert certification preparation with FlashGenius.
- ✅ Unlimited practice questions across all GCIH domains
- ✅ Full-length exam simulations with real-time scoring
- ✅ AI-powered performance tracking and weak area identification
- ✅ Personalized study plans with adaptive learning
- ✅ Mobile-friendly platform for studying anywhere, anytime
- ✅ Expert explanations and study resources
Already have an account? Sign in here
About GCIH Certification
The GCIH certification validates your expertise in incident response and cyber investigation and other critical domains. Our comprehensive practice questions are carefully crafted to mirror the actual exam experience and help you identify knowledge gaps before test day.
🧠 More GCIH Practice Tests?
- GCIH Network and Log Investigations – Practice Questions
- GCIH Memory and Malware Investigation – Practice Questions
- GCIH Incident Response and Cyber Investigation – Practice Questions