Exam Details

  • Exam Code
    :GCED
  • Exam Name
    :GIAC Certified Enterprise Defender Practice Test
  • Certification
    :GIAC Information Security
  • Vendor
    :GIAC
  • Total Questions
    :88 Q&As
  • Last Updated
    :May 14, 2024

GIAC GIAC Information Security GCED Questions & Answers

  • Question 41:

    Which type of attack could be used to obtain IOS router configuration files without a valid user password?

    A. ARP cache poisoning

    B. CDP sniffing

    C. SNMP man in the middle

    D. TFTP brute force

  • Question 42:

    How would an attacker use the following configuration settings?

    A. A client based HIDS evasion attack

    B. A firewall based DDoS attack

    C. A router based MITM attack

    D. A switch based VLAN hopping attack

  • Question 43:

    What is the most common read-only SNMP community string usually called?

    A. private

    B. mib

    C. open

    D. public

  • Question 44:

    What would a penetration tester expect to access after the following metasploit payload is delivered successfully?

    Set PAYLOAD windows / shell / reverse _ tcp

    A. VNC server session on the target

    B. A netcat listener on the target

    C. A meterpreter prompt on the target

    D. A command prompt on the target

  • Question 45:

    Requiring background checks for employees who access protected data is an example of which type of data loss control?

    A. Mitigation

    B. Prevention

    C. Monitoring

    D. Identification

  • Question 46:

    Which of the following is an operational security control that is used as a prevention mechanism?

    A. Labeling of assets

    B. Heat detectors

    C. Vibration alarms

    D. Voltage regulators

  • Question 47:

    Why would a Cisco network device with the latest updates and patches have the service config setting enabled, making the device vulnerable to the TFTP Server Attack?

    A. Disabling telnet enables the setting on the network device.

    B. This setting is enabled by default in the current Cisco IOS.

    C. Allowing remote administration using SSH under the Cisco IOS also enables the setting.

    D. An attack by Cisco Global Exploiter will automatically enable the setting.

    E. This older default IOS setting was inherited from an older configuration despite the upgrade.

  • Question 48:

    In order to determine if network traffic adheres to expected usage and complies with technical standards, an organization would use a device that provides which functionality?

    A. Stateful packet filtering

    B. Signature matching

    C. Protocol anomaly detection

    D. CRC checking

    E. Forward error correction

  • Question 49:

    Which of the following tools is the most capable for removing the unwanted add-on in the screenshot below?

    A. ProcessExplorer

    B. Taskkill

    C. Paros

    D. Hijack This

  • Question 50:

    An analyst will capture traffic from an air-gapped network that does not use DNS. The analyst is looking for unencrypted Syslog data being transmitted. Which of the following is most efficient for this purpose?

    A. tcpdump –s0 –i eth0 port 514

    B. tcpdump –nnvvX –i eth0 port 6514

    C. tcpdump –nX –i eth0 port 514

    D. tcpdump –vv –i eth0 port 6514

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only GIAC exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your GCED exam preparations and GIAC certification application, do not hesitate to visit our Vcedump.com to find your solutions here.