Weekend Sale - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dm70dm

GCED GIAC Certified Enterprise Defender Questions and Answers

Questions 4

What should happen before acquiring a bit-for-bit copy of suspect media during incident response?

Options:

A.

Encrypt the original media to protect the data

B.

Create a one-way hash of the original media

C.

Decompress files on the original media

D.

Decrypt the original media

Buy Now
Questions 5

When identifying malware, what is a key difference between a Worm and a Bot?

Options:

A.

A Worm gets instructions from an external control channel like an IRC server.

B.

A Worm, unlike a Bot, is installed silently as an add-on to a legitimate program.

C.

A Bot, unlike a Worm, is frequently spread through email attachments.

D.

A Bot gets instructions from an external control channel like an IRC server.

Buy Now
Questions 6

What is the most common read-only SNMP community string usually called?

Options:

A.

private

B.

mib

C.

open

D.

public

Buy Now
Questions 7

What piece of information would be recorded by the first responder as part of the initial System Description?

Options:

A.

Copies of log files

B.

System serial number

C.

List of system directories

D.

Hash of each hard drive

Buy Now
Questions 8

Enabling port security prevents which of the following?

Options:

A.

Using vendors other than Cisco for switching equipment as they don’t offer port security

B.

Spoofed MAC addresses from being used to cause a Denial of Service condition

C.

Legitimate MAC addresses from being used to cause a Denial of Service condition

D.

Network Access Control systems from functioning properly

Buy Now
Questions 9

What would a penetration tester expect to access after the following metasploit payload is delivered successfully?

Set PAYLOAD windows / shell / reverse _ tcp

Options:

A.

VNC server session on the target

B.

A netcat listener on the target

C.

A meterpreter prompt on the target

D.

A command prompt on the target

Buy Now
Questions 10

When an IDS system looks for a pattern indicating a known worm, what type of detection method is it using?

Options:

A.

Signature-based

B.

Anomaly-based

C.

Statistical

D.

Monitored

Buy Now
Questions 11

From a security perspective, how should the Root Bridge be determined in a Spanning Tree Protocol (STP) environment?

Options:

A.

Manually selected and defined by the network architect or engineer.

B.

Defined by selecting the highest Bridge ID to be the root bridge.

C.

Automatically selected by the Spanning Tree Protocol (STP).

D.

All switch interfaces become root bridges in an STP environment.

Buy Now
Questions 12

When running a Nmap UDP scan, what would the following output indicate?

GCED Question 12

Options:

A.

The port may be open on the system or blocked by a firewall

B.

The router in front of the host accepted the request and sent a reply

C.

An ICMP unreachable message was received indicating an open port

D.

An ACK was received in response to the initial probe packet

Buy Now
Questions 13

On which layer of the OSI Reference Model does the FWSnort utility function?

Options:

A.

Physical Layer

B.

Data Link Layer

C.

Transport Layer

D.

Session Layer

E.

Application Layer

Buy Now
Exam Code: GCED
Exam Name: GIAC Certified Enterprise Defender
Last Update: Jun 30, 2025
Questions: 88

PDF + Testing Engine

$49.5  $164.99

Testing Engine

$37.5  $124.99
buy now GCED testing engine

PDF (Q&A)

$31.5  $104.99
buy now GCED pdf
dumpsmate guaranteed to pass
24/7 Customer Support

DumpsMate's team of experts is always available to respond your queries on exam preparation. Get professional answers on any topic of the certification syllabus. Our experts will thoroughly satisfy you.

Site Secure

mcafee secure

TESTED 05 Jul 2025