Pass4itsure > GIAC > GIAC Information Security > GCED > GCED Online Practice Questions and Answers

GCED Online Practice Questions and Answers

Questions 4

Which tool uses a Snort rules file for input and by design triggers Snort alerts?

A. snot

B. stick

C. Nidsbench

D. ftester

Buy Now
Questions 5

A company estimates a loss of $2,374 per hour in sales if their website goes down. Their webserver hosting site's documented downtime was 7 hours each quarter over the last two years. Using the information, what can the analyst determine?

A. Annualized loss expectancy

B. CVSS risk score

C. Total cost of ownership

D. Qualitative risk posture

Buy Now
Questions 6

Which of the following attacks would use ".." notation as part of a web request to access restricted files and directories, and possibly execute code on the web server?

A. URL directory

B. HTTP header attack

C. SQL injection

D. IDS evasion

E. Cross site scripting

Buy Now
Questions 7

Why might an administrator not be able to delete a file using the Windows del command without specifying additional command line switches?

A. Because it has the read-only attribute set

B. Because it is encrypted

C. Because it has the nodel attribute set

D. Because it is an executable file

Buy Now
Questions 8

Which command tool can be used to change the read-only or hidden setting of the file in the screenshot?

A. attrib

B. type

C. tasklist

D. dir

Buy Now
Questions 9

Requiring background checks for employees who access protected data is an example of which type of data loss control?

A. Mitigation

B. Prevention

C. Monitoring

D. Identification

Buy Now
Questions 10

Which of the following is best defined as "anything that has the potential to target known or existing vulnerabilities in a system?"

A. Vector

B. Gateway

C. Threat

D. Exploit

Buy Now
Questions 11

Which command is the Best choice for creating a forensic backup of a Linux system?

A. Run form a bootable CD: tar cvzf image.tgz /

B. Run from compromised operating system: tar cvzf image.tgz /

C. Run from compromised operating system: dd if=/ dev/hda1 of=/mnt/backup/hda1.img

D. Run from a bootable CD: dd if=/dev/hda1 of=/mnt/backup/hda1.img

Buy Now
Questions 12

The security team wants to detect connections that can compromise credentials by sending them in plaintext across the wire. Which of the following rules should they enable on their IDS sensor?

A. alert tcp any 22 < > any 22 (msg:SSH connection; class type:misc-attack;sid: 122:rev:1;)

B. alert tcp any any < > any 6000: (msg:X-Windows session; flow:from_server,established;nocase;classtype:misc-attack;sid:101;rev:1;)

C. alert tcp any 23 < > any 23 (msg:Telnet shell; class type:misc-attack;sid:100; rev:1;)

D. alert udp any any < > any 5060 (msg:VOIP message; classtype:misc-attack;sid:113; rev:2;)

Buy Now
Questions 13

What would the output of the following command help an incident handler determine? cscript manage-bde . wsf –status

A. Whether scripts can be run from the command line

B. Which processes are running on the system

C. When the most recent system reboot occurred

D. Whether the drive has encryption enabled

Buy Now
Exam Code: GCED
Exam Name: GIAC Certified Enterprise Defender Practice Test
Last Update: Apr 20, 2024
Questions: 88
10%OFF Coupon Code: SAVE10

PDF (Q&A)

$45.99

VCE

$49.99

PDF + VCE

$59.99