有効的なGDAT日本語版トレーリング & 合格スムーズGDAT過去問 | 一番優秀なGDATテキスト GIAC Defending Advanced ThreatsGIACのGDAT試験の合格書は君の仕事の上で更に一歩の昇進と生活条件の向上を助けられて、大きな財産に相当します。GIACのGDAT認定試験はIT専門知識のレベルの考察として、とっても重要な地位になりつつます。Jpshikenは最も正確なGIACのGDAT試験資料を追求しています。 GIAC Defending Advanced Threats 認定 GDAT 試験問題 (Q49-Q54):質問 # 49
Which file types are commonly associated with the delivery of malicious payloads via email attachments?
(Choose Two)
Response:
A. .txt
B. .docx
C. .exe
D. .pdf
正解:C、D
質問 # 50
Identify the techniques used to detect domain fronting within an enterprise network.
Response:
A. Monitoring for inconsistencies between DNS requests and TLS handshake SNI fields
B. Deep packet inspection of HTTP/S traffic
C. Regular scanning for unauthorized VPN connections
D. Analyzing patterns of failed authentication attempts
正解:A、B
質問 # 51
Your security team has identified several instances where non-administrative users were able to escalate their privileges to gain administrative rights. Further investigation reveals that these users exploited a misconfiguration in group policies that inadvertently granted elevated access to all users in a specific department.
What are the next steps you should prioritize to remediate and prevent this issue?
Response:
A. Implement role-based access control (RBAC) and enforce strict separation of duties
B. Conduct a privilege audit to identify and remove unnecessary elevated access
C. Reset all user passwords and enforce complex password policies
D. Immediately disable administrative accounts on the affected machines
正解:A、B
質問 # 52
To effectively simulate advanced persistent threats (APTs), it is essential to maintain _________ within the target network, which mirrors adversary behavior.
Response:
A. high throughput
B. persistence
C. rapid deployment
D. high availability
正解:B
質問 # 53
Which of the following is a primary goal of the reconnaissance phase of a cyber attack?
Response:
A. To establish persistence on the target system
B. To gather as much information as possible about the target's infrastructure
C. To encrypt the target's data
D. To deny the target access to its network resources