Cyber Monday Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

GIAC GCED - GIAC Certified Enterprise Defender

Page: 3 / 3
Total 88 questions

You have been tasked with searching for Alternate Data Streams on the following collection of Windows partitions; 2GB FAT16, 6GB FAT32, and 4GB NTFS. How many total Gigabytes and partitions will you need to search?

A.

4GBs of data, the NTFS partition only.

B.

12GBs of data, the FAT16, FAT32, and NTFS partitions.

C.

6GBs of data, the FAT32 partition only.

D.

10GBs of data, both the FAT32 and NTFS partitions.

Which type of attack could be used to obtain IOS router configuration files without a valid user password?

A.

ARP cache poisoning

B.

CDP sniffing

C.

SNMP man in the middle

D.

TFTP brute force

An incident response team investigated a database breach, and determined it was likely the result of an internal user who had a default password in place. The password was changed. A week later, they discover another loss of database records. The database admin provides logs that indicate the attack came from the front-end web interface. Where did the incident response team fail?

A.

They did not eradicate tools left behind by the attacker

B.

They did not properly identify the source of the breach

C.

They did not lock the account after changing the password

D.

They did not patch the database server after the event

When running a Nmap UDP scan, what would the following output indicate?

A.

The port may be open on the system or blocked by a firewall

B.

The router in front of the host accepted the request and sent a reply

C.

An ICMP unreachable message was received indicating an open port

D.

An ACK was received in response to the initial probe packet

To detect worms and viruses buried deep within a network packet payload, Gigabytes worth of traffic content entering and exiting a network must be checked with which of the following technologies?

A.

Proxy matching

B.

Signature matching

C.

Packet matching

D.

Irregular expression matching

E.

Object matching

Requiring criminal and financial background checks for new employees is an example of what type of security control?

A.

Detective Support Control

B.

Detective Operational Control

C.

Detective Technical Control

D.

Detective Management Control