Decide Fast & Get 50% Flat Discount on This SPECIAL OFFER | Limited Time Offer - Ends In COUPON CODE: SAVE50%

Free GIAC GCED Questions

    1. Page: 1/18
      Total 88 Questions
    Question No 1
    When an IDS system looks for a pattern indicating a known worm, what type of detection method is it using?
    Choose the Choices:


    Question No 2
    Why would an incident handler acquire memory on a system being investigated?
    Choose the Choices:


    Question No 3
    Which could be described as a Threat Vector?
    Choose the Choices:


    Question No 4
    A security device processes the first packet from 10.62.34.12 destined to 10.23.10.7 and recognizes a malicious anomaly. The first packet makes it to 10.23.10.7 before the security devices sends a TCP RST to 10.62.34.12. What type of security device is this?
    Choose the Choices:


    Question No 5
    Which tool uses a Snort rules file for input and by design triggers Snort alerts?
    Choose the Choices:



    1. Page: 1/18
      Total 88 Questions