Handsome Savings - Limited Time Offer 30% OFF - Ends In 0d 0h 0m 0s Coupon code: 50OFF
Welcome to QA4Exam
Logo

- Trusted Worldwide Questions & Answers

GIAC GCED Exam Actual Questions

The questions for GCED were last updated on Oct 4, 2024.
  • Viewing page 1 out of 18 pages.
  • Viewing questions 1-5 out of 88 questions
Unlock Access to All 88 Questions & Answers
Question No. 1

What information would the Wireshark filter in the screenshot list within the display window?

Show Answer Hide Answer
Correct Answer: B

Question No. 2

What are Browser Helper Objects (BHO)s used for?

Show Answer Hide Answer
Correct Answer: B

When scanning your system, you may notice many BHOs since they are widely used by software developers to provide a more feature rich interface for Microsoft Internet Explorer.


Question No. 3

What is needed to be able to use taskkill to end a process on remote system?

Show Answer Hide Answer
Correct Answer: B

Domain login credentials are needed to kill a process on a remote system using taskkill.


Question No. 4

A compromised router is reconfigured by an attacker to redirect SMTP email traffic to the attacker's server before sending packets on to their intended destinations. Which IP header value would help expose anomalies in the path outbound SMTP/Port 25 traffic takes compared to outbound packets sent to other ports?

Show Answer Hide Answer
Correct Answer: C

In a case study of a redirect tunnel set up on a router, some anomalies were noticed while watching network traffic with the TCPdump packet sniffer.

Packets going to port 25 (Simple Mail Transfer Protocol [SMTP] used by mail servers and other Mail Transfer Agents [MTAs] to send and receive e-mail) were apparently taking a different network path. The TLs were consistently three less than other destination ports, indicating another three network hops were taken.

Other IP header values listed, such as fragment offset. The acknowledgement number is a TCP, not IP, header field.


Question No. 5

Which tool keeps a backup of all deleted items, so that they can be restored later if need be?

Show Answer Hide Answer
Correct Answer: E

After selecting ''fix it!'' with Hijack This you can always restore deleted items, because Hijack This keeps a backup of them.


Product Image

Unlock All Questions for GIAC GCED Exam

Full Exam Access, Actual Exam Questions, Validated Answers, Anytime Anywhere, No Download Limits, No Practice Limits

Get All 88 Questions & Answers