一番いいGDAT資料的中率 & 資格試験のリーダー & 公認されたGIAC GIAC Defending Advanced Threats当社GIACの専門家は、GDATトレーニング資料を毎日更新し、最新の更新をタイムリーに提供します。当社の製品および購入手順に関する疑問または質問がある場合は、いつでも当社のオンライン顧客サービス担当者にご連絡ください。古いクライアントに割引を提供します。購入前にGDATテスト問題を無料でダウンロードして試用できます。したがって、当社の製品には多くのメリットがあります。 GDAT試験問題を購入する前に、無料デモでGDAT模擬テストの特性と機能を知ることができます。 GIAC Defending Advanced Threats 認定 GDAT 試験問題 (Q106-Q111):質問 # 106
Your organization has noticed a significant increase in phishing attempts targeting its employees. In one instance, a user unknowingly downloaded a malicious executable file attached to an email, which led to the installation of ransomware.
What immediate steps should your security team take to contain the incident and prevent future payload delivery through email?
Response:
A. Block all outbound traffic from the organization until the threat is contained
B. Develop a backup and recovery plan to prevent future incidents
C. Disconnect the infected machine from the network and initiate a ransomware recovery protocol
D. Notify users to reset their passwords and conduct phishing awareness training
正解:C
質問 # 107
What is the primary purpose of using the SMB protocol in lateral movement?
Response:
A. To transfer files between network systems
B. To bypass network firewalls
C. To execute scripts remotely
D. To encrypt communications
正解:A
質問 # 108
Which techniques can help detect data exfiltration via command-and-control (C2) channels?
(Choose two)
Response:
A. Regular password changes
B. Disabling unused network services
C. Deep packet inspection of outbound traffic
D. Behavioral anomaly detection
正解:C、D
質問 # 109
Which tool is commonly used by attackers for lateral movement within a network?
Response:
A. PowerShell
B. OpenSSL
C. Nmap
D. Snort
正解:A
質問 # 110
Which of the following are potential indicators of a Pass-the-Hash (PtH) attack in an Active Directory environment?
Response:
A. Unexpected access to sensitive resources using legitimate but compromised credentials
B. Discovery of user credentials stored in plain text
C. The use of unusual privilege escalation techniques
D. Repeated failed login attempts from a single user account