100+ Free OSIR Practice Questions
Pass your OffSec Incident Responder (OSIR, IR-200) exam on the first try — instant access, no signup required.
Which Linux artifact is the canonical place to find authentication events such as successful and failed logins on Debian/Ubuntu?
Explore More OffSec Certifications
Continue into nearby exams from the same family. Each card keeps practice questions, study guides, flashcards, videos, and articles in one place.
Key Facts: OSIR Exam
8 hrs
Practical Duration
OffSec OSIR Exam Guide
50/70
Passing Score
OffSec (Phase 1 + Phase 2)
$1,749
Learn One Bundle
OffSec IR-200 starting price
13
Course Modules
IR-200 syllabus
3 yrs
Certification Validity
OffSec policy (since 2023)
200-level
Difficulty
Foundational defensive cert
OSIR is OffSec's foundational defensive certification, earned by passing the IR-200 8-hour proctored hands-on incident response exam (Phase 1: 4 x 10 pts; Phase 2: 2 x 15 pts; pass at 50 of 70) plus a 24-hour report. The Learn One bundle starts at $1,749 and includes 13 modules, the Challenge Lab, and 2 exam attempts. Our 100 free OSIR practice questions are conceptual knowledge checks across NIST 800-61, MITRE ATT&CK, Volatility, Splunk, and Windows/Linux forensic artifacts; they do not replicate the practical exam. The credential is valid for 3 years.
Sample OSIR Practice Questions
Try these sample questions to test your OSIR exam readiness. Each question includes a detailed explanation. Start the interactive quiz above for the full 100+ question experience with AI tutoring.
1Which definition of a 'cybersecurity incident' best aligns with NIST SP 800-61r2?
2What are the four phases of the NIST SP 800-61r2 incident response lifecycle, in order?
3Which activity belongs primarily to the Preparation phase of the NIST 800-61r2 lifecycle?
4An analyst observes a port scan from an external IP against the public-facing web server but no exploitation has occurred. NIST 800-61r2 calls this kind of signal a:
5In ITIL incident management, how does an 'incident' differ from a 'problem'?
6Which CSIRT role is typically responsible for declaring an incident, setting priorities, and authorizing major containment actions?
7Which document captures the high-level strategy, authority, and scope for an organization's incident response capability and is normally signed by senior leadership?
8Which scenario best matches the definition of an 'opportunistic' attack rather than a 'targeted' attack?
9Why do many organizations document an incident severity matrix (e.g., SEV1/SEV2/SEV3) before incidents occur?
10Which 2021 incident is the canonical case study of ransomware impact on critical infrastructure that triggered a U.S. fuel supply disruption?
About the OSIR Exam
The OffSec Incident Responder (OSIR), tied to the IR-200 course, validates foundational hands-on incident response skills: applying the NIST 800-61r2 lifecycle, mapping observed adversary behavior to MITRE ATT&CK, performing disk and memory forensics, triaging malware, investigating with Splunk SIEM, and executing containment, eradication, and recovery alongside professional communications and evidence handling.
Assessment
8-hour proctored hands-on IR practical with 2 phases (Phase 1: 4 x 10-pt exercises = 40 pts; Phase 2: 2 x 15-pt exercises = 30 pts), plus a 24-hour reporting window. Pass at 50 of 70.
Time Limit
8 hours practical + 24 hours reporting
Passing Score
50 of 70 points
Exam Fee
$1,749 (Learn One bundle includes course + 2 exam attempts) (OffSec online proctored)
OSIR Exam Content Outline
IR Overview & Lifecycle
Cyber-incident definitions, NIST 800-61r2 phases (Preparation; Detection & Analysis; Containment, Eradication & Recovery; Post-Incident Activity), ITIL incident vs problem mapping, CSIRT roles (incident commander, technical lead, comms lead, legal liaison), severity matrices, opportunistic vs targeted attacks, case studies (Colonial Pipeline, SolarWinds, NotPetya, MOVEit, MGM 2023)
Attack Techniques & Frameworks
MITRE ATT&CK tactics and techniques (T1566 Phishing, T1059 Command & Scripting, T1003 OS Credential Dumping, T1078 Valid Accounts, T1550.002 Pass the Hash), Cyber Kill Chain, Diamond Model, common incident types: ransomware, BEC, insider threat, supply chain, DDoS, APT vs commodity malware
Detection & Identification
Passive alerting (SIEM, EDR, email security), active discovery and hypothesis-driven threat hunting, IOC sweeps, false-positive triage of legitimate admin tools, attack-chain reconstruction (initial access > execution > persistence > C2 > exfiltration), impact assessment across confidentiality/integrity/availability
Digital Forensics for IR
Disk imaging (FTK Imager, dd, hardware write blockers, MD5/SHA-256 hashing, chain of custody), memory acquisition (FTK Memory, Magnet RAM Capture), Volatility 3 (pslist, psscan, netscan, malfind, dlllist, cmdline), Windows artifacts (Registry HKLM/HKCU, $MFT/$LogFile/$UsnJrnl, Prefetch, Event Logs, Sysmon, Amcache, ShimCache, ShellBags, Jump Lists), Linux artifacts (auth.log, journalctl, .bash_history, /var/log, audit.log, last/lastb, /etc/shadow), Plaso/log2timeline super timelines
Malware Triage
PE-header analysis, strings, entropy, Detect-It-Easy, PEview, CFF Explorer, hash lookups via VirusTotal, dynamic sandboxing (Cuckoo, ANY.RUN, Joe Sandbox, Hybrid Analysis), YARA rule structure (meta, strings, condition, hex strings, anchors)
SIEM Investigation (Splunk)
SPL search of Windows Event Logs (4624, 4625, 4688, 7045, 1102), transaction by host with maxspan, eval and stats count by ProcessName, dc() distinct counts, Common Information Model (CIM), ESCU correlation searches, Splunk SOAR/Phantom playbook automation, beaconing detection and blast-radius scoping
Containment, Eradication & Recovery
Network isolation and EDR host quarantine, account disable and ticket revocation, firewall blocks, DNS sinkholes, malware and rootkit removal, image rebuilds, password and key rotation, recovery validation tests, heightened-monitoring window, post-incident hardening (patching, phishing-resistant MFA, network segmentation, Credential Guard, admin tiering)
Communication & Evidence
Executive summaries and stakeholder updates, regulatory notifications (GDPR 72-hour, HIPAA 60-day, U.S. state breach laws), OFAC sanctions screening for ransomware payments, chain-of-custody documentation (who/what/when/where/how, hashes, signatures), original vs working copy handling, RFC 3227 order of volatility, post-incident lessons-learned and after-action reports
How to Pass the OSIR Exam
What You Need to Know
- Passing score: 50 of 70 points
- Assessment: 8-hour proctored hands-on IR practical with 2 phases (Phase 1: 4 x 10-pt exercises = 40 pts; Phase 2: 2 x 15-pt exercises = 30 pts), plus a 24-hour reporting window. Pass at 50 of 70.
- Time limit: 8 hours practical + 24 hours reporting
- Exam fee: $1,749 (Learn One bundle includes course + 2 exam attempts)
Keys to Passing
- Complete 500+ practice questions
- Score 80%+ consistently before scheduling
- Focus on highest-weighted sections
- Use our AI tutor for tough concepts
OSIR Study Tips from Top Performers
Frequently Asked Questions
Is the OSIR exam multiple choice?
No. OSIR is an 8-hour proctored hands-on incident response practical conducted via private VPN, followed by a 24-hour reporting window. Our 100 free practice questions are conceptual knowledge checks (NIST 800-61, MITRE ATT&CK, Volatility, Splunk, Windows/Linux artifacts) and do not replicate the exam scenario.
What is the OSIR passing score and structure?
You need 50 of 70 points. The exam has two phases: Phase 1 contains four exercise questions worth 10 points each (40 points total) and Phase 2 contains two exercise questions worth 15 points each (30 points total). Each exercise tests an end-to-end IR skill against the provided lab environment.
How long is the OSIR exam?
The practical portion is 8 hours, immediately followed by a 24-hour window to submit a professional incident report. Time management within the 8 hours is the candidate's responsibility — there are no scheduled breaks.
How much does OSIR cost?
The IR-200 Learn One bundle starts at $1,749 and includes the 13-module course, the Challenge Lab, and 2 exam attempts. Pricing is set by OffSec and may vary by region.
Which tools should I focus on for OSIR?
Focus on Splunk (SPL, transaction, stats, eval, CIM, SOAR/Phantom playbooks), Volatility 3 (pslist, psscan, netscan, malfind, cmdline, dlllist), Windows artifact parsers (Prefetch, Amcache, ShimCache, ShellBags, $MFT, Event Logs, Sysmon), Plaso/log2timeline, FTK Imager, and YARA. Hands-on practice in the IR-200 lab environment is essential.
How does OSIR compare to OSDA?
OSDA (SOC-200) focuses on detection in an Elastic SIEM with a 23h45m simulation. OSIR (IR-200) focuses on full-lifecycle incident response with Splunk and an 8-hour practical plus 24-hour report. OSDA leans toward SOC analyst skills; OSIR leans toward incident handler / DFIR analyst skills. Many candidates take both for a complete blue-team profile.
Does OSIR expire?
Yes. Since 2023 OffSec certifications are valid for 3 years. Maintain by retaking the exam or earning OffSec continuing-education credits per current policy.