Certbus > GIAC > GIAC Certifications > GCED > GCED Online Practice Questions and Answers

GCED Online Practice Questions and Answers

Questions 4

Before re-assigning a computer to a new employee, what data security technique does the IT department use to make sure no data is left behind by the previous user?

A. Fingerprinting

B. Digital watermarking

C. Baselining

D. Wiping

Browse 88 Q&As
Questions 5

What is the most common read-only SNMP community string usually called?

A. private

B. mib

C. open

D. public

Browse 88 Q&As
Questions 6

Throughout the week following a new IPS deployment, nearly every user on the protected subnet submits helpdesk tickets regarding network performance and not being able to access several critical resources. What is the most likely reason for the performance issues?

A. The incoming traffic is overflowing the device's TAP buffer

B. The in-line TAP experienced a hardware failure

C. The IPS sensor was changed from test mode to production mode

D. The IPS sensor was powered off or moved out of band

Browse 88 Q&As
Questions 7

Which Windows CLI tool can identify the command-line options being passed to a program at startup?

A. netstat

B. attrib

C. WMIC

D. Tasklist

Browse 88 Q&As
Questions 8

Which of the following would be included in a router configuration standard?

A. Names of employees with access rights

B. Access list naming conventions

C. Most recent audit results

D. Passwords for management access

Browse 88 Q&As
Questions 9

Which Windows tool would use the following command to view a process: process where name='suspect_malware.exe'list statistics

A. TCPView

B. Tasklist

C. WMIC

D. Netstat

Browse 88 Q&As
Questions 10

Which of the following would be used in order to restrict software form performing unauthorized operations, such as invalid access to memory or invalid calls to system access?

A. Perimeter Control

B. User Control

C. Application Control

D. Protocol Control

E. Network Control

Browse 88 Q&As
Questions 11

Which of the following is a major problem that attackers often encounter when attempting to develop or use a kernel mode rootkit?

A. Their effectiveness depends on the specific applications used on the target system.

B. They tend to corrupt the kernel of the target system, causing it to crash.

C. They are unstable and are easy to identify after installation

D. They are highly dependent on the target OS.

Browse 88 Q&As
Exam Code: GCED
Exam Name: GIAC Certified Enterprise Defender (GCED)
Last Update: Mar 13, 2025
Questions: 88 Q&As

PDF

$49.99

VCE

$55.99

PDF + VCE

$65.99