Weekend Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple70

Pass the GIAC Security Certification: GASF GCED Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam GCED Premium Access

View all detail and faqs for the GCED exam


408 Students Passed

97% Average Score

93% Same Questions
Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions
Questions # 1:

What is needed to be able to use taskkill to end a process on remote system?

Options:

A.

Svchost.exe running on the remote system

B.

Domain login credentials

C.

Port 445 open

D.

Windows 7 or higher on both systems

Questions # 2:

Why would a Cisco network device with the latest updates and patches have the service config setting enabled, making the device vulnerable to the TFTP Server Attack?

Options:

A.

Disabling telnet enables the setting on the network device.

B.

This setting is enabled by default in the current Cisco IOS.

C.

Allowing remote administration using SSH under the Cisco IOS also enables the setting.

D.

An attack by Cisco Global Exploiter will automatically enable the setting.

E.

This older default IOS setting was inherited from an older configuration despite the upgrade.

Questions # 3:

A legacy server on the network was breached through an OS vulnerability with no patch available. The server is used only rarely by employees across several business units. The theft of information from the server goes unnoticed until the company is notified by a third party that sensitive information has been posted on the Internet. Which control was the first to fail?

Options:

A.

Security awareness

B.

Access control

C.

Data classification

D.

Incident response

Questions # 4:

What does the following WMIC command accomplish?

process where name=’malicious.exe’ delete

Options:

A.

Removes the ‘malicious.exe’ process form the Start menu and Run registry key

B.

Stops current process handles associated with the process named ‘malicious.exe’

C.

Removes the executable ‘malicious.exe’ from the file system

D.

Stops the ‘malicious.exe’ process from running and being restarted at the next reboot

Questions # 5:

A security device processes the first packet from 10.62.34.12 destined to 10.23.10.7 and recognizes a malicious anomaly. The first packet makes it to 10.23.10.7 before the security devices sends a TCP RST to 10.62.34.12. What type of security device is this?

Options:

A.

Host IDS

B.

Active response

C.

Intrusion prevention

D.

Network access control

Questions # 6:

What attack was indicated when the IDS system picked up the following text coming from the Internet to the web server?

select user, password from user where user= “jdoe” and password= ‘myp@55!’ union select “text”,2 into outfile “/tmp/file1.txt” - - ’

Options:

A.

Remote File Inclusion

B.

URL Directory Traversal

C.

SQL Injection

D.

Binary Code in HTTP Headers

Questions # 7:

Which tasks would a First Responder perform during the Identification phase of Incident Response?

Options:

A.

Verify the root cause of the incident and apply any missing security patches.

B.

Install or reenable host-based firewalls and anti-virus software on suspected systems.

C.

Search for sources of data and information that may be valuable in confirming and containing an incident.

D.

Disconnect network communications and search for malicious executables or processes.

Questions # 8:

Before re-assigning a computer to a new employee, what data security technique does the IT department use to make sure no data is left behind by the previous user?

Options:

A.

Fingerprinting

B.

Digital watermarking

C.

Baselining

D.

Wiping

Questions # 9:

Which command is the Best choice for creating a forensic backup of a Linux system?

Options:

A.

Run form a bootable CD: tar cvzf image.tgz /

B.

Run from compromised operating system: tar cvzf image.tgz /

C.

Run from compromised operating system: dd if=/ dev/hda1 of=/mnt/backup/hda1.img

D.

Run from a bootable CD: dd if=/dev/hda1 of=/mnt/backup/hda1.img

Questions # 10:

How would an attacker use the following configuration settings?

Question # 10

Options:

A.

A client based HIDS evasion attack

B.

A firewall based DDoS attack

C.

A router based MITM attack

D.

A switch based VLAN hopping attack

Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.