Exam Details

  • Exam Code
    :GCED
  • Exam Name
    :GIAC Certified Enterprise Defender Practice Test
  • Certification
    :GIAC Information Security
  • Vendor
    :GIAC
  • Total Questions
    :88 Q&As
  • Last Updated
    :May 14, 2024

GIAC GIAC Information Security GCED Questions & Answers

  • Question 31:

    What does the following WMIC command accomplish?

    process where name='malicious.exe' delete

    A. Removes the `malicious.exe' process form the Start menu and Run registry key

    B. Stops current process handles associated with the process named `malicious.exe'

    C. Removes the executable `malicious.exe' from the file system

    D. Stops the `malicious.exe' process from running and being restarted at the next reboot

  • Question 32:

    An analyst wants to see a grouping of images that may be contained in a pcap file. Which tool natively meets this need?

    A. Scapy

    B. NetworkMiner

    C. TCPReplay

    D. Wireshark

  • Question 33:

    Which of the following is considered a preventative control in operational security?

    A. Smoke Sensors

    B. Fire Suppressant

    C. Voltage Regulators

    D. Vibration Alarms

  • Question 34:

    Which command is the Best choice for creating a forensic backup of a Linux system?

    A. Run form a bootable CD: tar cvzf image.tgz /

    B. Run from compromised operating system: tar cvzf image.tgz /

    C. Run from compromised operating system: dd if=/ dev/hda1 of=/mnt/backup/hda1.img

    D. Run from a bootable CD: dd if=/dev/hda1 of=/mnt/backup/hda1.img

  • Question 35:

    Which action would be the responsibility of the First Responder once arriving at the scene of a suspected incident as part of a Computer Security Incident Response Plan (CSIRP)?

    A. Making the decision of whether or not to notify law enforcement on behalf of the organization.

    B. Performing timeline creation on the system files in order to identify and remove discovered malware.

    C. Copying critical data from suspected systems to known good systems so productivity is not affected by the investigation.

    D. Conducting initial interviews and identifying the systems involved in the suspected incident.

  • Question 36:

    A company classifies data using document footers, labeling each file with security labels "Public", "Pattern", or "Company Proprietary". A new policy forbids sending "Company Proprietary" files via email. Which control could help security analysis identify breaches of this policy?

    A. Monitoring failed authentications on a central logging device

    B. Enforcing TLS encryption for outbound email with attachments

    C. Blocking email attachments that match the hashes of the company's classification templates

    D. Running custom keyword scans on outbound SMTP traffic from the mail server

  • Question 37:

    Although the packet listed below contained malware, it freely passed through a layer 3 switch. Why didn't the switch detect the malware in this packet?

    A. The packet was part of a fragmentation attack

    B. The data portion of the packet was encrypted

    C. The entire packet was corrupted by the malware

    D. It didn't look deeply enough into the packet

  • Question 38:

    In an 802.1x deployment, which of the following would typically be considered a Supplicant?

    A. A network switch

    B. A perimeter firewall

    C. A RADIUS server

    D. A client laptop

  • Question 39:

    You have been tasked with searching for Alternate Data Streams on the following collection of Windows partitions; 2GB FAT16, 6GB FAT32, and 4GB NTFS. How many total Gigabytes and partitions will you need to search?

    A. 4GBs of data, the NTFS partition only.

    B. 12GBs of data, the FAT16, FAT32, and NTFS partitions.

    C. 6GBs of data, the FAT32 partition only.

    D. 10GBs of data, both the FAT32 and NTFS partitions.

  • Question 40:

    What piece of information would be recorded by the first responder as part of the initial System Description?

    A. Copies of log files

    B. System serial number

    C. List of system directories

    D. Hash of each hard drive

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only GIAC exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your GCED exam preparations and GIAC certification application, do not hesitate to visit our Vcedump.com to find your solutions here.