Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = getmirror

Pass the GIAC Security Certification: GASF GCED Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam GCED Premium Access

View all detail and faqs for the GCED exam


747 Students Passed

85% Average Score

90% Same Questions
Viewing page 2 out of 3 pages
Viewing questions 11-20 out of questions
Questions # 11:

Which statement below is the MOST accurate about insider threat controls?

Options:

A.

Classification of information assets helps identify data to protect.

B.

Security awareness programs have a minimal impact on reducing the insider threat.

C.

Both detective and preventative controls prevent insider attacks.

D.

Rotation of duties makes an insider threat more likely.

E.

Separation of duties encourages one employee to control a great deal of information.

Questions # 12:

If a Cisco router is configured with the “service config” configuration statement, which of the following tools could be used by an attacker to apply a new router configuration?

Options:

A.

TFTPD

B.

Hydra

C.

Ettercap

D.

Yersinia

Questions # 13:

Which control would BEST help detect a potential insider threat?

Options:

A.

Mandatory approval process for executive and administrative access requests.

B.

Providing the same access to all employees and monitoring sensitive file access.

C.

Multiple scheduled log reviews of all employee access levels throughout the year

D.

Requiring more than one employee to be trained on each task or job duty.

Questions # 14:

On which layer of the OSI Reference Model does the FWSnort utility function?

Options:

A.

Physical Layer

B.

Data Link Layer

C.

Transport Layer

D.

Session Layer

E.

Application Layer

Questions # 15:

When running a Nmap UDP scan, what would the following output indicate?

Question # 15

Options:

A.

The port may be open on the system or blocked by a firewall

B.

The router in front of the host accepted the request and sent a reply

C.

An ICMP unreachable message was received indicating an open port

D.

An ACK was received in response to the initial probe packet

Questions # 16:

You are responding to an incident involving a Windows server on your company’s network. During the investigation you notice that the system downloaded and installed two files, iexplorer.exe and iexplorer.sys. Based on the behavior of the system you suspect that these files are part of a rootkit. If this is the case what is the likely purpose of the .sys file?

Options:

A.

It is a configuration file used to open a backdoor

B.

It is a logfile used to collect usernames and passwords

C.

It is a device driver used to load the rootkit

D.

It is an executable used to configure a keylogger

Questions # 17:

Which of the following would be included in a router configuration standard?

Options:

A.

Names of employees with access rights

B.

Access list naming conventions

C.

Most recent audit results

D.

Passwords for management access

Questions # 18:

Which tool uses a Snort rules file for input and by design triggers Snort alerts?

Options:

A.

snot

B.

stick

C.

Nidsbench

D.

ftester

Questions # 19:

When an IDS system looks for a pattern indicating a known worm, what type of detection method is it using?

Options:

A.

Signature-based

B.

Anomaly-based

C.

Statistical

D.

Monitored

Questions # 20:

Why would an incident handler acquire memory on a system being investigated?

Options:

A.

To determine whether a malicious DLL has been injected into an application

B.

To identify whether a program is set to auto-run through a registry hook

C.

To list which services are installed on they system

D.

To verify which user accounts have root or admin privileges on the system

Viewing page 2 out of 3 pages
Viewing questions 11-20 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.