Certbus > GIAC > GIAC Information Security > GCED > GCED Online Practice Questions and Answers

GCED Online Practice Questions and Answers

Questions 4

When an IDS system looks for a pattern indicating a known worm, what type of detection method is it using?

A. Signature-based

B. Anomaly-based

C. Statistical

D. Monitored

Browse 88 Q&As
Questions 5

Network administrators are often hesitant to patch the operating systems on CISCO router and switch operating systems, due to the possibility of causing network instability, mainly because of which of the following?

A. Having to rebuild all ACLs

B. Having to replace the kernel

C. Having to re-IP the device

D. Having to rebuild ARP tables

E. Having to rebuild the routing tables

Browse 88 Q&As
Questions 6

Monitoring the transmission of data across the network using a man-in-the-middle attack presents a threat against which type of data?

A. At-rest

B. In-transit

C. Public

D. Encrypted

Browse 88 Q&As
Questions 7

Why would the pass action be used in a Snort configuration file?

A. The pass action simplifies some filtering by specifying what to ignore.

B. The pass action passes the packet onto further rules for immediate analysis.

C. The pass action serves as a placeholder in the snort configuration file for future rule updates.

D. Using the pass action allows a packet to be passed to an external process.

E. The pass action increases the number of false positives, better testing the rules.

Browse 88 Q&As
Questions 8

On which layer of the OSI Reference Model does the FWSnort utility function?

A. Physical Layer

B. Data Link Layer

C. Transport Layer

D. Session Layer

E. Application Layer

Browse 88 Q&As
Questions 9

Which command tool can be used to change the read-only or hidden setting of the file in the screenshot?

A. attrib

B. type

C. tasklist

D. dir

Browse 88 Q&As
Questions 10

Who is ultimately responsible for approving methods and controls that will reduce any potential risk to an organization?

A. Senior Management

B. Data Owner

C. Data Custodian

D. Security Auditor

Browse 88 Q&As
Questions 11

Michael, a software engineer, added a module to a banking customer's code. The new module deposits small amounts of money into his personal bank account. Michael has access to edit the code, but only code reviewers have the ability to commit modules to production. The code reviewers have a backlog of work, and are often willing to trust the software developers' testing and confidence in the code.

Which technique is Michael most likely to engage to implement the malicious code?

A. Denial of Service

B. Race Condition

C. Phishing

D. Social Engineering

Browse 88 Q&As
Questions 12

A company wants to allow only company-issued devices to attach to the wired and wireless networks. Additionally, devices that are not up-to-date with OS patches need to be isolated from the rest of the network until they are updated. Which technology standards or protocols would meet these requirements?

A. 802.1x and Network Access Control

B. Kerberos and Network Access Control

C. LDAP and Authentication, Authorization and Accounting (AAA)

D. 802.11i and Authentication, Authorization and Accounting (AAA)

Browse 88 Q&As
Questions 13

What is the most common read-only SNMP community string usually called?

A. private

B. mib

C. open

D. public

Browse 88 Q&As
Questions 14

Which of the following is an operational security control that is used as a prevention mechanism?

A. Labeling of assets

B. Heat detectors

C. Vibration alarms

D. Voltage regulators

Browse 88 Q&As
Questions 15

Throughout the week following a new IPS deployment, nearly every user on the protected subnet submits helpdesk tickets regarding network performance and not being able to access several critical resources. What is the most likely reason for the performance issues?

A. The incoming traffic is overflowing the device's TAP buffer

B. The in-line TAP experienced a hardware failure

C. The IPS sensor was changed from test mode to production mode

D. The IPS sensor was powered off or moved out of band

Browse 88 Q&As
Questions 16

Enabling port security prevents which of the following?

A. Using vendors other than Cisco for switching equipment as they don't offer port security

B. Spoofed MAC addresses from being used to cause a Denial of Service condition

C. Legitimate MAC addresses from being used to cause a Denial of Service condition

D. Network Access Control systems from functioning properly

Browse 88 Q&As
Questions 17

Which of the following would be used in order to restrict software form performing unauthorized operations, such as invalid access to memory or invalid calls to system access?

A. Perimeter Control

B. User Control

C. Application Control

D. Protocol Control

E. Network Control

Browse 88 Q&As
Questions 18

What is the BEST sequence of steps to remove a bot from a system?

A. Terminate the process, remove autoloading traces, delete any malicious files

B. Delete any malicious files, remove autoloading traces, terminate the process

C. Remove autoloading traces, delete any malicious files, terminate the process

D. Delete any malicious files, terminate the process, remove autoloading traces

Browse 88 Q&As
Exam Code: GCED
Exam Name: GIAC Certified Enterprise Defender Practice Test
Last Update: Apr 30, 2024
Questions: 88 Q&As

PDF

$45.99

VCE

$49.99

PDF + VCE

$59.99