Analyze the screenshot below. Which of the following attacks can be mitigated by these configuration settings?
A. A Denial-of-Service attack using network broadcasts
B. A Replay attack
C. An IP masquerading attack
D. A MAC Flood attack
A company estimates a loss of $2,374 per hour in sales if their website goes down. Their webserver hosting site's documented downtime was 7 hours each quarter over the last two years. Using the information, what can the analyst determine?
A. Annualized loss expectancy
B. CVSS risk score
C. Total cost of ownership
D. Qualitative risk posture
Which tool uses a Snort rules file for input and by design triggers Snort alerts?
A. snot
B. stick
C. Nidsbench
D. ftester
Network administrators are often hesitant to patch the operating systems on CISCO router and switch operating systems, due to the possibility of causing network instability, mainly because of which of the following?
A. Having to rebuild all ACLs
B. Having to replace the kernel
C. Having to re-IP the device
D. Having to rebuild ARP tables
E. Having to rebuild the routing tables
A security device processes the first packet from 10.62.34.12 destined to 10.23.10.7 and recognizes a malicious anomaly. The first packet makes it to 10.23.10.7 before the security devices sends a TCP RST to 10.62.34.12. What type of security device is this?
A. Host IDS
B. Active response
C. Intrusion prevention
D. Network access control
Why would an incident handler acquire memory on a system being investigated?
A. To determine whether a malicious DLL has been injected into an application
B. To identify whether a program is set to auto-run through a registry hook
C. To list which services are installed on they system
D. To verify which user accounts have root or admin privileges on the system
Which could be described as a Threat Vector?
A. A web server left6 unpatched and vulnerable to XSS
B. A coding error allowing remote code execution
C. A botnet that has infiltrated perimeter defenses
D. A wireless network left open for anonymous use
When an IDS system looks for a pattern indicating a known worm, what type of detection method is it using?
A. Signature-based
B. Anomaly-based
C. Statistical
D. Monitored
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only GIAC exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your GCED exam preparations and GIAC certification application, do not hesitate to visit our Vcedump.com to find your solutions here.