Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free GIAC GCED Practice Exam with Questions & Answers | Set: 3

Questions 21

What would be the output of the following Google search?

filetype:doc inurl:ws_ftp

Options:
A.

Websites running ws_ftp that allow anonymous logins

B.

Documents available on the ws_ftp.com domain

C.

Websites hosting the ws_ftp installation program

D.

Documents found on sites with ws_ftp in the web address

GIAC GCED Premium Access
Questions 22

Which Windows tool would use the following command to view a process:

process where name=’suspect_malware.exe’list statistics

Options:
A.

TCPView

B.

Tasklist

C.

WMIC

D.

Netstat

Questions 23

Which tool uses a Snort rules file for input and by design triggers Snort alerts?

Options:
A.

snot

B.

stick

C.

Nidsbench

D.

ftester

Questions 24

From a security perspective, how should the Root Bridge be determined in a Spanning Tree Protocol (STP) environment?

Options:
A.

Manually selected and defined by the network architect or engineer.

B.

Defined by selecting the highest Bridge ID to be the root bridge.

C.

Automatically selected by the Spanning Tree Protocol (STP).

D.

All switch interfaces become root bridges in an STP environment.

Questions 25

Which statement below is the MOST accurate about insider threat controls?

Options:
A.

Classification of information assets helps identify data to protect.

B.

Security awareness programs have a minimal impact on reducing the insider threat.

C.

Both detective and preventative controls prevent insider attacks.

D.

Rotation of duties makes an insider threat more likely.

E.

Separation of duties encourages one employee to control a great deal of information.

Questions 26

Before re-assigning a computer to a new employee, what data security technique does the IT department use to make sure no data is left behind by the previous user?

Options:
A.

Fingerprinting

B.

Digital watermarking

C.

Baselining

D.

Wiping