GIAC Certified Enterprise Defender GCED Question # 24 Topic 3 Discussion

GIAC Certified Enterprise Defender GCED Question # 24 Topic 3 Discussion

GCED Exam Topic 3 Question 24 Discussion:
Question #: 24
Topic #: 3

When attempting to collect data from a suspected system compromise, which of the following should generally be collected first?


A.

The network connections and open ports


B.

The contents of physical memory


C.

The current routing table


D.

A list of the running services


Get Premium GCED Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.