Try 12 GIAC Certified Incident Handler (GCIH) sample questions and practice-test preview prompts on triage, containment, evidence handling, malware indicators, escalation, recovery, and post-incident review.
GIAC Certified Incident Handler (GCIH) is an incident-response route for candidates who need to identify attacks, triage alerts, contain compromised systems, preserve evidence, communicate clearly, and move from response to recovery.
Use this page to preview the kind of incident-handling decisions a GCIH practice route should test. The questions below are original IT Mastery sample questions, not official GIAC exam questions.
Topic: triage
An endpoint alert shows credential dumping behavior, an unusual parent process, and outbound connections to a newly seen domain. What is the best triage step?
Best answer: C
Explanation: Multiple indicators across process behavior and network activity justify escalation. Triage should preserve evidence and follow the response procedure.
Topic: containment
A workstation is suspected of active malware communication. What containment approach is usually safest?
Best answer: A
Explanation: Containment should reduce ongoing harm while preserving useful evidence. The exact action depends on procedure and business impact.
Topic: evidence handling
Why should responders document timestamps, actions taken, and evidence sources during an incident?
Best answer: D
Explanation: Incident documentation helps responders understand scope and sequence. It also supports handoff, reporting, and lessons learned.
Topic: malware indicators
Several hosts run a new executable from a user-writable directory shortly after receiving the same email attachment. What does this most likely indicate?
Best answer: B
Explanation: Execution from user-writable paths after a common attachment is suspicious. The team should connect endpoint and email evidence.
Topic: command-and-control
Which pattern is most suspicious for command-and-control activity?
Best answer: C
Explanation: Repeated beaconing to rare infrastructure can indicate C2. Timing, destination reputation, payload size, and host context matter.
Topic: log correlation
An attacker may have used stolen credentials. Which evidence combination is most useful?
Best answer: A
Explanation: Credential incidents require correlation across identity, endpoint, privilege, and resource-access evidence to determine scope.
Topic: phishing response
A phishing email reached several users, and one user clicked. What should the response team do?
Best answer: D
Explanation: Phishing response should address both delivered messages and affected users. The team should protect accounts and preserve indicators for detection.
Topic: lateral movement
A compromised endpoint authenticates to multiple servers it has never accessed before. What should responders suspect?
Best answer: B
Explanation: New authentication paths from a compromised host can indicate lateral movement. Responders should review credentials, host activity, and target systems.
Topic: communication
During a major incident, why should external communications be coordinated through the incident process?
Best answer: C
Explanation: Incident communication must be accurate and coordinated. Uncontrolled statements can create legal, regulatory, or customer-trust problems.
Topic: recovery
After containing ransomware on several systems, what should happen before reconnecting restored hosts?
Best answer: A
Explanation: Recovery should not reintroduce the same compromise path. Clean restores, root-cause fixes, credential hygiene, and monitoring are essential.
Topic: lessons learned
What is the main purpose of a post-incident review?
Best answer: D
Explanation: Lessons learned should improve future detection, response, communication, and prevention. The goal is operational improvement, not blame.
Topic: severity
Which incident should usually receive higher severity?
Best answer: B
Explanation: Administrator compromise can affect many systems and data sets. Severity should reflect impact, privilege, spread, and confidence.
| If you miss… | Drill this next |
|---|---|
| first-response questions | triage, evidence preservation, and escalation thresholds |
| containment questions | isolation, business impact, and procedure-driven actions |
| attacker-behavior questions | phishing, credential theft, C2, and lateral movement |
| recovery questions | root-cause correction, clean restore, credential rotation, and monitoring |