Exam Details

  • Exam Code
    :GCED
  • Exam Name
    :GIAC Certified Enterprise Defender Practice Test
  • Certification
    :GIAC Information Security
  • Vendor
    :GIAC
  • Total Questions
    :88 Q&As
  • Last Updated
    :May 14, 2024

GIAC GIAC Information Security GCED Questions & Answers

  • Question 81:

    Analyze the screenshot below. Which of the following attacks can be mitigated by these configuration settings?

    A. A Denial-of-Service attack using network broadcasts

    B. A Replay attack

    C. An IP masquerading attack

    D. A MAC Flood attack

  • Question 82:

    A company estimates a loss of $2,374 per hour in sales if their website goes down. Their webserver hosting site's documented downtime was 7 hours each quarter over the last two years. Using the information, what can the analyst determine?

    A. Annualized loss expectancy

    B. CVSS risk score

    C. Total cost of ownership

    D. Qualitative risk posture

  • Question 83:

    Which tool uses a Snort rules file for input and by design triggers Snort alerts?

    A. snot

    B. stick

    C. Nidsbench

    D. ftester

  • Question 84:

    Network administrators are often hesitant to patch the operating systems on CISCO router and switch operating systems, due to the possibility of causing network instability, mainly because of which of the following?

    A. Having to rebuild all ACLs

    B. Having to replace the kernel

    C. Having to re-IP the device

    D. Having to rebuild ARP tables

    E. Having to rebuild the routing tables

  • Question 85:

    A security device processes the first packet from 10.62.34.12 destined to 10.23.10.7 and recognizes a malicious anomaly. The first packet makes it to 10.23.10.7 before the security devices sends a TCP RST to 10.62.34.12. What type of security device is this?

    A. Host IDS

    B. Active response

    C. Intrusion prevention

    D. Network access control

  • Question 86:

    Why would an incident handler acquire memory on a system being investigated?

    A. To determine whether a malicious DLL has been injected into an application

    B. To identify whether a program is set to auto-run through a registry hook

    C. To list which services are installed on they system

    D. To verify which user accounts have root or admin privileges on the system

  • Question 87:

    Which could be described as a Threat Vector?

    A. A web server left6 unpatched and vulnerable to XSS

    B. A coding error allowing remote code execution

    C. A botnet that has infiltrated perimeter defenses

    D. A wireless network left open for anonymous use

  • Question 88:

    When an IDS system looks for a pattern indicating a known worm, what type of detection method is it using?

    A. Signature-based

    B. Anomaly-based

    C. Statistical

    D. Monitored

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only GIAC exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your GCED exam preparations and GIAC certification application, do not hesitate to visit our Vcedump.com to find your solutions here.