Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free GIAC GCED Practice Exam with Questions & Answers

Questions 1

A company estimates a loss of $2,374 per hour in sales if their website goes down. Their webserver hosting site’s documented downtime was 7 hours each quarter over the last two years. Using the information, what can the analyst determine?

Options:
A.

Annualized loss expectancy

B.

CVSS risk score

C.

Total cost of ownership

D.

Qualitative risk posture

GIAC GCED Premium Access
Questions 2

Following a Digital Forensics investigation, which of the following should be included in the final forensics report?

Options:
A.

An executive summary that includes a list of all forensic procedures performed.

B.

A summary of the verified facts of the incident and the analyst’s unverified opinions.

C.

A summary of the incident and recommended disciplinary actions to apply internally.

D.

An executive summary that includes high level descriptions of the overall findings.

Questions 3

If a Cisco router is configured with the “service config” configuration statement, which of the following tools could be used by an attacker to apply a new router configuration?

Options:
A.

TFTPD

B.

Hydra

C.

Ettercap

D.

Yersinia

Questions 4

What is the BEST sequence of steps to remove a bot from a system?

Options:
A.

Terminate the process, remove autoloading traces, delete any malicious files

B.

Delete any malicious files, remove autoloading traces, terminate the process

C.

Remove autoloading traces, delete any malicious files, terminate the process

D.

Delete any malicious files, terminate the process, remove autoloading traces

Questions 5

Which type of media should the IR team be handling as they seek to understand the root cause of an incident?

Options:
A.

Restored media from full backup of the infected host

B.

Media from the infected host, copied to the dedicated IR host

C.

Original media from the infected host

D.

Bit-for-bit image from the infected host

Questions 6

The matrix in the screen shot below would be created during which process?

GCED Question 6

Options:
A.

Risk Assessment

B.

System Hardening

C.

Data Classification

D.

Vulnerability Scanning

Questions 7

How does an Nmap connect scan work?

Options:
A.

It sends a SYN, waits for a SYN/ACK, then sends a RST.

B.

It sends a SYN, waits for a ACK, then sends a RST.

C.

It sends a SYN, waits for a ACK, then sends a SYN/ACK.

D.

It sends a SYN, waits for a SYN/ACK, then sends a ACK

Questions 8

What piece of information would be recorded by the first responder as part of the initial System Description?

Options:
A.

Copies of log files

B.

System serial number

C.

List of system directories

D.

Hash of each hard drive

Questions 9

What does the following WMIC command accomplish?

process where name=’malicious.exe’ delete

Options:
A.

Removes the ‘malicious.exe’ process form the Start menu and Run registry key

B.

Stops current process handles associated with the process named ‘malicious.exe’

C.

Removes the executable ‘malicious.exe’ from the file system

D.

Stops the ‘malicious.exe’ process from running and being restarted at the next reboot

Questions 10

What is the most common read-only SNMP community string usually called?

Options:
A.

private

B.

mib

C.

open

D.

public