Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free GIAC GCED Practice Exam with Questions & Answers | Set: 2

Questions 11

Which command is the Best choice for creating a forensic backup of a Linux system?

Options:
A.

Run form a bootable CD: tar cvzf image.tgz /

B.

Run from compromised operating system: tar cvzf image.tgz /

C.

Run from compromised operating system: dd if=/ dev/hda1 of=/mnt/backup/hda1.img

D.

Run from a bootable CD: dd if=/dev/hda1 of=/mnt/backup/hda1.img

GIAC GCED Premium Access
Questions 12

Which Unix administration tool is designed to monitor configuration changes to Cisco, Extreme and Foundry infrastructure devices?

Options:
A.

SNMP

B.

Netflow

C.

RANCID

D.

RMON

Questions 13

How does data classification help protect against data loss?

Options:
A.

DLP systems require classification in order to protect data

B.

Data at rest is easier to protect than data in transit

C.

Digital watermarks can be applied to sensitive data

D.

Resources and controls can be appropriately allocated

Questions 14

An outside vulnerability assessment reveals that users have been routinely accessing Gmail from work for over a year, a clear violation of this organization’s security policy. The users report “it just started working one day”. Later, a network administrator admits he meant to unblock Gmail for just his own IP address, but he made a mistake in the firewall rule.

Which security control failed?

Options:
A.

Access control

B.

Authentication

C.

Auditing

D.

Rights management

Questions 15

Which of the following applies to newer versions of IOS that decrease their attack surface?

Options:
A.

Telnet cannot be enabled or used

B.

The Cisco Discovery Protocol has been removed

C.

More services are disabled by default

D.

Two-factor authentication is default required

Questions 16

The security team wants to detect connections that can compromise credentials by sending them in plaintext across the wire. Which of the following rules should they enable on their IDS sensor?

Options:
A.

alert tcp any 22 < > any 22 (msg:SSH connection; class type:misc-attack;sid: 122:rev:1;)

B.

alert tcp any any < > any 6000: (msg:X-Windows session; flow:from_server,established;nocase;classtype:misc-attack;sid:101;rev:1;)

C.

alert tcp any 23 < > any 23 (msg:Telnet shell; class type:misc-attack;sid:100; rev:1;)

D.

alert udp any any < > any 5060 (msg:VOIP message; classtype:misc-attack;sid:113; rev:2;)

Questions 17

Which tool keeps a backup of all deleted items, so that they can be restored later if need be?

Options:
A.

ListDLLs

B.

Yersinia

C.

Ettercap

D.

ProcessExplorer

E.

Hijack This

Questions 18

When running a Nmap UDP scan, what would the following output indicate?

GCED Question 18

Options:
A.

The port may be open on the system or blocked by a firewall

B.

The router in front of the host accepted the request and sent a reply

C.

An ICMP unreachable message was received indicating an open port

D.

An ACK was received in response to the initial probe packet

Questions 19

What information would the Wireshark filter in the screenshot list within the display window?

GCED Question 19

Options:
A.

Only HTTP traffic to or from IP address 192.168.1.12 that is also destined for port 80

B.

Only traffic to or from IP address 192.168.1.12 and destined for port 80

C.

Only traffic with a source address of 192.168.1.12 to or from port 80

D.

Only traffic with a destination address of 192.168.1.12 to or from port 80

Questions 20

What would a penetration tester expect to access after the following metasploit payload is delivered successfully?

Set PAYLOAD windows / shell / reverse _ tcp

Options:
A.

VNC server session on the target

B.

A netcat listener on the target

C.

A meterpreter prompt on the target

D.

A command prompt on the target