Pass4itsure > GIAC > GIAC Information Security > GCFA > GCFA Online Practice Questions and Answers

GCFA Online Practice Questions and Answers

Questions 4

Which of the following type of file systems is not supported by Linux kernel?

A. vFAT

B. NTFS

C. HFS

D. FAT32

Buy Now
Questions 5

Which of the following evidences are the collection of facts that, when considered together, can be used to infer a conclusion about the malicious activity/person?

A. Corroborating

B. Circumstantial

C. Incontrovertible

D. Direct

Buy Now
Questions 6

By gaining full control of router, hackers often acquire full control of the network. Which of the following methods are commonly used to attack Routers?

Each correct answer represents a complete solution. Choose all that apply.

A. By launching Social Engineering attack

B. By launching Max Age attack

C. Route table poisoning

D. By launching Sequence++ attack

Buy Now
Questions 7

What is the name of the group of blocks which contains information used by the operating system in Linux system?

A. logblock

B. Systemblock

C. Bootblock

D. Superblock

Buy Now
Questions 8

Which of the following is used for remote file access by UNIX/Linux systems?

A. NetWare Core Protocol (NCP)

B. Common Internet File System (CIFS)

C. Server Message Block (SMB)

D. Network File System (NFS)

Buy Now
Questions 9

An attacker attempts to gain information about a network by specifically targeting the network resources and applications running on a computer. This method for gaining information is known as .

A. Notification

B. Scanning

C. Enumeration

D. Sensor

E. Footprinting

F. Passive response

Buy Now
Questions 10

Which of the following layers protocols handles file transfer and network management?

A. Application

B. Session

C. Presentation

D. Transport

Buy Now
Questions 11

Peter works as a Security Administrator for SecureEnet Inc. He observes that the database server of the company has been compromised and the data is stolen. Peter immediately wants to report this crime to the law enforcement authorities. Which of the following organizations looks after the computer crimes investigations in the United States?

A. Federal Bureau of Investigation

B. Local or National office of the US secret service

C. Incident response team

D. National Institute of Standards and Technology

Buy Now
Questions 12

Adam works as a professional Computer Hacking Forensic Investigator. A project has been assigned to him to investigate an iphone, which is being seized from a criminal. The local police suspect that this iphone contains some sensitive information. Adam knows that the storage partition of the iphone is divided into two partitions. The first partition is used for the operating system. Other data of iphone is stored in the second partition. Which of the following is the name with which the second partition is mounted on the iphone?

A. /private/var

B. /var/data

C. /var/private

D. /data/var

Buy Now
Questions 13

Adrian, the Network Administrator for Peach Tree Inc., wants to install a new computer on the company's network. He asks his assistant to make a boot disk with minimum files. The boot disk will be used to boot the computer, which does not have an operating system installed, yet. Which of the following files will he include on the disk?

A. IO.SYS, MSDOS.SYS, COMMAND.COM, and AUTOEXEC.BAT.

B. IO.SYS, MSDOS.SYS, and COMMAND.COM.

C. IO.SYS, MSDOS.SYS, COMMAND.COM, and CONFIG.SYS.

D. IO.SYS, MSDOS.SYS, COMMAND.COM, and FDISK.

Buy Now
Exam Code: GCFA
Exam Name: GIAC Certified Forensics Analyst
Last Update: Apr 30, 2024
Questions: 318
10%OFF Coupon Code: SAVE10

PDF (Q&A)

$45.99

VCE

$49.99

PDF + VCE

$59.99