GIAC GCED Exam Practice Questions (P. 4)
- Full Access (88 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #16
Michael, a software engineer, added a module to a banking customers code. The new module deposits small amounts of money into his personal bank account.
Michael has access to edit the code, but only code reviewers have the ability to commit modules to production. The code reviewers have a backlog of work, and are often willing to trust the software developers testing and confidence in the code.
Which technique is Michael most likely to engage to implement the malicious code?
Michael has access to edit the code, but only code reviewers have the ability to commit modules to production. The code reviewers have a backlog of work, and are often willing to trust the software developers testing and confidence in the code.
Which technique is Michael most likely to engage to implement the malicious code?
send
light_mode
delete
Question #17
A company wants to allow only company-issued devices to attach to the wired and wireless networks. Additionally, devices that are not up-to-date with OS patches need to be isolated from the rest of the network until they are updated. Which technology standards or protocols would meet these requirements?
- A802.1x and Network Access Control
- BKerberos and Network Access Control
- CLDAP and Authentication, Authorization and Accounting (AAA)
- D802.11i and Authentication, Authorization and Accounting (AAA)
Correct Answer:
A
A
send
light_mode
delete
Question #18
When attempting to collect data from a suspected system compromise, which of the following should generally be collected first?
- AThe network connections and open ports
- BThe contents of physical memory
- CThe current routing table
- DA list of the running services
Correct Answer:
B
B
send
light_mode
delete
Question #19
Before re-assigning a computer to a new employee, what data security technique does the IT department use to make sure no data is left behind by the previous user?
send
light_mode
delete
Question #20
What feature of Wireshark allows the analysis of one HTTP conversation?
- AFollow UDP Stream
- BFollow TCP Stream
- CConversation list > IPV4
- DSetting a display filter to ‘tcp’
Correct Answer:
B
Follow TCP Stream is a feature of Wireshark that allows the analysis of a single TCP conversation between two hosts over multiple packets. Filtering packets using tcp in the filter box will return all TCP packets, not grouping by a single TCP conversation. HTTP is TCP not UDP, so you cannot follow a HTTP stream over UDP.
B
Follow TCP Stream is a feature of Wireshark that allows the analysis of a single TCP conversation between two hosts over multiple packets. Filtering packets using tcp in the filter box will return all TCP packets, not grouping by a single TCP conversation. HTTP is TCP not UDP, so you cannot follow a HTTP stream over UDP.
send
light_mode
delete
All Pages