Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = getmirror

Pass the GIAC Security Certification: GASF GCED Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam GCED Premium Access

View all detail and faqs for the GCED exam


747 Students Passed

85% Average Score

90% Same Questions
Viewing page 3 out of 3 pages
Viewing questions 21-30 out of questions
Questions # 21:

At the start of an investigation on a Windows system, the lead handler executes the following commands after inserting a USB drive. What is the purpose of this command? C:\ >dir / s / a dhsra d: \ > a: \ IRCD.txt

Options:

A.

To create a file on the USB drive that contains a listing of the C: drive

B.

To show hidden and archived files on the C: drive and copy them to the USB drive

C.

To copy a forensic image of the local C: drive onto the USB drive

D.

To compare a list of known good hashes on the USB drive to files on the local C: drive

Questions # 22:

A company wants to allow only company-issued devices to attach to the wired and wireless networks. Additionally, devices that are not up-to-date with OS patches need to be isolated from the rest of the network until they are updated. Which technology standards or protocols would meet these requirements?

Options:

A.

802.1x and Network Access Control

B.

Kerberos and Network Access Control

C.

LDAP and Authentication, Authorization and Accounting (AAA)

D.

802.11i and Authentication, Authorization and Accounting (AAA)

Questions # 23:

In an 802.1x deployment, which of the following would typically be considered a Supplicant?

Options:

A.

A network switch

B.

A perimeter firewall

C.

A RADIUS server

D.

A client laptop

Questions # 24:

To detect worms and viruses buried deep within a network packet payload, Gigabytes worth of traffic content entering and exiting a network must be checked with which of the following technologies?

Options:

A.

Proxy matching

B.

Signature matching

C.

Packet matching

D.

Irregular expression matching

E.

Object matching

Questions # 25:

What is the most common read-only SNMP community string usually called?

Options:

A.

private

B.

mib

C.

open

D.

public

Questions # 26:

An incident response team is handling a worm infection among their user workstations. They created an IPS signature to detect and block worm activity on the border IPS, then removed the worm’s artifacts or workstations triggering the rule. Despite this action, worm activity continued for days after. Where did the incident response team fail?

Options:

A.

The team did not adequately apply lessons learned from the incident

B.

The custom rule did not detect all infected workstations

C.

They did not receive timely notification of the security event

D.

The team did not understand the worm’s propagation method

Viewing page 3 out of 3 pages
Viewing questions 21-30 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.