Pass the GIAC Security Certification: GASF GCED Questions and answers with CertsForce

Viewing page 2 out of 3 pages
Viewing questions 11-20 out of questions
Questions # 11:

Which type of attack could be used to obtain IOS router configuration files without a valid user password?

Options:

A.

ARP cache poisoning


B.

CDP sniffing


C.

SNMP man in the middle


D.

TFTP brute force


Expert Solution
Questions # 12:

Which command tool can be used to change the read-only or hidden setting of the file in the screenshot?

Question # 12

Options:

A.

attrib


B.

type


C.

tasklist


D.

dir


Expert Solution
Questions # 13:

Which command is the Best choice for creating a forensic backup of a Linux system?

Options:

A.

Run form a bootable CD: tar cvzf image.tgz /


B.

Run from compromised operating system: tar cvzf image.tgz /


C.

Run from compromised operating system: dd if=/ dev/hda1 of=/mnt/backup/hda1.img


D.

Run from a bootable CD: dd if=/dev/hda1 of=/mnt/backup/hda1.img


Expert Solution
Questions # 14:

Which tool uses a Snort rules file for input and by design triggers Snort alerts?

Options:

A.

snot


B.

stick


C.

Nidsbench


D.

ftester


Expert Solution
Questions # 15:

How would an attacker use the following configuration settings?

Question # 15

Options:

A.

A client based HIDS evasion attack


B.

A firewall based DDoS attack


C.

A router based MITM attack


D.

A switch based VLAN hopping attack


Expert Solution
Questions # 16:

Monitoring the transmission of data across the network using a man-in-the-middle attack presents a threat against which type of data?

Options:

A.

At-rest


B.

In-transit


C.

Public


D.

Encrypted


Expert Solution
Questions # 17:

At the start of an investigation on a Windows system, the lead handler executes the following commands after inserting a USB drive. What is the purpose of this command? C:\ >dir / s / a dhsra d: \ > a: \ IRCD.txt

Options:

A.

To create a file on the USB drive that contains a listing of the C: drive


B.

To show hidden and archived files on the C: drive and copy them to the USB drive


C.

To copy a forensic image of the local C: drive onto the USB drive


D.

To compare a list of known good hashes on the USB drive to files on the local C: drive


Expert Solution
Questions # 18:

Why would the pass action be used in a Snort configuration file?

Options:

A.

The pass action simplifies some filtering by specifying what to ignore.


B.

The pass action passes the packet onto further rules for immediate analysis.


C.

The pass action serves as a placeholder in the snort configuration file for future rule updates.


D.

Using the pass action allows a packet to be passed to an external process.


E.

The pass action increases the number of false positives, better testing the rules.


Expert Solution
Questions # 19:

An analyst will capture traffic from an air-gapped network that does not use DNS. The analyst is looking for unencrypted Syslog data being transmitted. Which of the following is most efficient for this purpose?

Options:

A.

tcpdump –s0 –i eth0 port 514


B.

tcpdump –nnvvX –i eth0 port 6514


C.

tcpdump –nX –i eth0 port 514


D.

tcpdump –vv –i eth0 port 6514


Expert Solution
Questions # 20:

Analyze the screenshot below. Which of the following attacks can be mitigated by these configuration settings?

Question # 20

Options:

A.

A Denial-of-Service attack using network broadcasts


B.

A Replay attack


C.

An IP masquerading attack


D.

A MAC Flood attack


Expert Solution
Viewing page 2 out of 3 pages
Viewing questions 11-20 out of questions