Free GIAC GCED Questions
-
-
Page: 1/18
Total 88 Questions
Question No 1
When an IDS system looks for a pattern indicating a known worm, what type of detection method is it using?
Question No 2
Why would an incident handler acquire memory on a system being investigated?
Question No 3
Which could be described as a Threat Vector?
Question No 4
A security device processes the first packet from 10.62.34.12 destined to 10.23.10.7 and recognizes a malicious anomaly. The first packet makes it to 10.23.10.7 before the security devices sends a TCP RST to 10.62.34.12. What type of security device is this?
Question No 5
Which tool uses a Snort rules file for input and by design triggers Snort alerts?
-
Page: 1/18
Total 88 Questions
-