Cyber Monday Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmaspas7

Easiest Solution 2 Pass Your Certification Exams

GCED GIAC Certified Enterprise Defender Free Practice Exam Questions (2025 Updated)

Prepare effectively for your GIAC GCED GIAC Certified Enterprise Defender certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 1 / 2
Total 88 questions

How does data classification help protect against data loss?

A.

DLP systems require classification in order to protect data

B.

Data at rest is easier to protect than data in transit

C.

Digital watermarks can be applied to sensitive data

D.

Resources and controls can be appropriately allocated

Which type of attack could be used to obtain IOS router configuration files without a valid user password?

A.

ARP cache poisoning

B.

CDP sniffing

C.

SNMP man in the middle

D.

TFTP brute force

Which of the following is an operational security control that is used as a prevention mechanism?

A.

Labeling of assets

B.

Heat detectors

C.

Vibration alarms

D.

Voltage regulators

Which Unix administration tool is designed to monitor configuration changes to Cisco, Extreme and Foundry infrastructure devices?

A.

SNMP

B.

Netflow

C.

RANCID

D.

RMON

When identifying malware, what is a key difference between a Worm and a Bot?

A.

A Worm gets instructions from an external control channel like an IRC server.

B.

A Worm, unlike a Bot, is installed silently as an add-on to a legitimate program.

C.

A Bot, unlike a Worm, is frequently spread through email attachments.

D.

A Bot gets instructions from an external control channel like an IRC server.

Which of the following is the best way to establish and verify the integrity of a file before copying it during an investigation?

A.

Write down the file size of the file before and after copying and ensure they match

B.

Ensure that the MAC times are identical before and after copying the file

C.

Establish the chain of custody with the system description to prove it is the same image

D.

Create hash of the file before and after copying the image verifying they are identical

A company estimates a loss of $2,374 per hour in sales if their website goes down. Their webserver hosting site’s documented downtime was 7 hours each quarter over the last two years. Using the information, what can the analyst determine?

A.

Annualized loss expectancy

B.

CVSS risk score

C.

Total cost of ownership

D.

Qualitative risk posture

Why would an incident handler acquire memory on a system being investigated?

A.

To determine whether a malicious DLL has been injected into an application

B.

To identify whether a program is set to auto-run through a registry hook

C.

To list which services are installed on they system

D.

To verify which user accounts have root or admin privileges on the system

A compromised router is reconfigured by an attacker to redirect SMTP email traffic to the attacker’s server before sending packets on to their intended destinations. Which IP header value would help expose anomalies in the path outbound SMTP/Port 25 traffic takes compared to outbound packets sent to other ports?

A.

Checksum

B.

Acknowledgement number

C.

Time to live

D.

Fragment offset

Who is ultimately responsible for approving methods and controls that will reduce any potential risk to an organization?

A.

Senior Management

B.

Data Owner

C.

Data Custodian

D.

Security Auditor

The security team wants to detect connections that can compromise credentials by sending them in plaintext across the wire. Which of the following rules should they enable on their IDS sensor?

A.

alert tcp any 22 < > any 22 (msg:SSH connection; class type:misc-attack;sid: 122:rev:1;)

B.

alert tcp any any < > any 6000: (msg:X-Windows session; flow:from_server,established;nocase;classtype:misc-attack;sid:101;rev:1;)

C.

alert tcp any 23 < > any 23 (msg:Telnet shell; class type:misc-attack;sid:100; rev:1;)

D.

alert udp any any < > any 5060 (msg:VOIP message; classtype:misc-attack;sid:113; rev:2;)

How would an attacker use the following configuration settings?

A.

A client based HIDS evasion attack

B.

A firewall based DDoS attack

C.

A router based MITM attack

D.

A switch based VLAN hopping attack

Which command tool can be used to change the read-only or hidden setting of the file in the screenshot?

A.

attrib

B.

type

C.

tasklist

D.

dir

What attack was indicated when the IDS system picked up the following text coming from the Internet to the web server?

select user, password from user where user= “jdoe” and password= ‘myp@55!’ union select “text”,2 into outfile “/tmp/file1.txt” - - ’

A.

Remote File Inclusion

B.

URL Directory Traversal

C.

SQL Injection

D.

Binary Code in HTTP Headers

Requiring criminal and financial background checks for new employees is an example of what type of security control?

A.

Detective Support Control

B.

Detective Operational Control

C.

Detective Technical Control

D.

Detective Management Control

Which Windows CLI tool can identify the command-line options being passed to a program at startup?

A.

netstat

B.

attrib

C.

WMIC

D.

Tasklist

What would a penetration tester expect to access after the following metasploit payload is delivered successfully?

Set PAYLOAD windows / shell / reverse _ tcp

A.

VNC server session on the target

B.

A netcat listener on the target

C.

A meterpreter prompt on the target

D.

A command prompt on the target

What is needed to be able to use taskkill to end a process on remote system?

A.

Svchost.exe running on the remote system

B.

Domain login credentials

C.

Port 445 open

D.

Windows 7 or higher on both systems

Why would the pass action be used in a Snort configuration file?

A.

The pass action simplifies some filtering by specifying what to ignore.

B.

The pass action passes the packet onto further rules for immediate analysis.

C.

The pass action serves as a placeholder in the snort configuration file for future rule updates.

D.

Using the pass action allows a packet to be passed to an external process.

E.

The pass action increases the number of false positives, better testing the rules.

Which statement below is the MOST accurate about insider threat controls?

A.

Classification of information assets helps identify data to protect.

B.

Security awareness programs have a minimal impact on reducing the insider threat.

C.

Both detective and preventative controls prevent insider attacks.

D.

Rotation of duties makes an insider threat more likely.

E.

Separation of duties encourages one employee to control a great deal of information.

Page: 1 / 2
Total 88 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved