GIAC Certified Enterprise Defender Exam Practice Test

Page: 1 / 14
Total 88 questions
Question 1

A compromised router is reconfigured by an attacker to redirect SMTP email traffic to the attacker's server before sending packets on to their intended destinations. Which IP header value would help expose anomalies in the path outbound SMTP/Port 25 traffic takes compared to outbound packets sent to other ports?



Answer : C

In a case study of a redirect tunnel set up on a router, some anomalies were noticed while watching network traffic with the TCPdump packet sniffer.

Packets going to port 25 (Simple Mail Transfer Protocol [SMTP] used by mail servers and other Mail Transfer Agents [MTAs] to send and receive e-mail) were apparently taking a different network path. The TLs were consistently three less than other destination ports, indicating another three network hops were taken.

Other IP header values listed, such as fragment offset. The acknowledgement number is a TCP, not IP, header field.


Question 2

What would be the output of the following Google search?

filetype:doc inurl:ws_ftp



Answer : D


Question 3

Which of the following would be used in order to restrict software form performing unauthorized operations, such as invalid access to memory or invalid calls to system access?



Answer : C


Question 4

How does data classification help protect against data loss?



Answer : A


Question 5

Which Windows tool would use the following command to view a process:

process where name='suspect_malware.exe'list statistics



Answer : C


Question 6

Requiring criminal and financial background checks for new employees is an example of what type of security control?



Answer : D

Management Controls include: Policies, guidelines, checklists, and reporting.

Detective management controls include personnel security. As a detective control, we are referring to indepth background investigations, clearances, and rotation of duties.


Question 7

An analyst wants to see a grouping of images that may be contained in a pcap file. Which tool natively meets this need?



Answer : A


Page:    1 / 14   
Total 88 questions