Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

GIAC GCED - GIAC Certified Enterprise Defender

Page: 1 / 3
Total 88 questions

Which of the following attacks would use “..” notation as part of a web request to access restricted files and directories, and possibly execute code on the web server?

A.

URL directory

B.

HTTP header attack

C.

SQL injection

D.

IDS evasion

E.

Cross site scripting

A security device processes the first packet from 10.62.34.12 destined to 10.23.10.7 and recognizes a malicious anomaly. The first packet makes it to 10.23.10.7 before the security devices sends a TCP RST to 10.62.34.12. What type of security device is this?

A.

Host IDS

B.

Active response

C.

Intrusion prevention

D.

Network access control

Which tool uses a Snort rules file for input and by design triggers Snort alerts?

A.

snot

B.

stick

C.

Nidsbench

D.

ftester

Which of the following would be used in order to restrict software form performing unauthorized operations, such as invalid access to memory or invalid calls to system access?

A.

Perimeter Control

B.

User Control

C.

Application Control

D.

Protocol Control

E.

Network Control

An analyst will capture traffic from an air-gapped network that does not use DNS. The analyst is looking for unencrypted Syslog data being transmitted. Which of the following is most efficient for this purpose?

A.

tcpdump –s0 –i eth0 port 514

B.

tcpdump –nnvvX –i eth0 port 6514

C.

tcpdump –nX –i eth0 port 514

D.

tcpdump –vv –i eth0 port 6514

What piece of information would be recorded by the first responder as part of the initial System Description?

A.

Copies of log files

B.

System serial number

C.

List of system directories

D.

Hash of each hard drive

Which of the following is an SNMPv3 security feature that was not provided by earlier versions of the protocol?

A.

Authentication based on RSA key pairs

B.

The ability to change default community strings

C.

AES encryption for SNMP network traffic

D.

The ability to send SNMP traffic over TCP ports

From a security perspective, how should the Root Bridge be determined in a Spanning Tree Protocol (STP) environment?

A.

Manually selected and defined by the network architect or engineer.

B.

Defined by selecting the highest Bridge ID to be the root bridge.

C.

Automatically selected by the Spanning Tree Protocol (STP).

D.

All switch interfaces become root bridges in an STP environment.

Although the packet listed below contained malware, it freely passed through a layer 3 switch. Why didn’t the switch detect the malware in this packet?

A.

The packet was part of a fragmentation attack

B.

The data portion of the packet was encrypted

C.

The entire packet was corrupted by the malware

D.

It didn’t look deeply enough into the packet

Which could be described as a Threat Vector?

A.

A web server left6 unpatched and vulnerable to XSS

B.

A coding error allowing remote code execution

C.

A botnet that has infiltrated perimeter defenses

D.

A wireless network left open for anonymous use