Weekend Sale - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65percent

Welcome To DumpsPedia

GCFA Sample Questions Answers

Questions 4

Which of the following is included in a memory dump file?

Options:

A.

Security ID

B.

List of loaded drivers

C.

The kernel-mode call stack for the thread that stopped the process from execution

D.

Stop message and its parameters

Buy Now
Questions 5

Peter, an expert computer user, attached a new sound card to his computer. He then restarts the computer, so that the BIOS can scan the hardware changes. What will be the memory range of ROM that the BIOS scan for additional code to be executed for proper working of soundcard?

Options:

A.

hC800 to hDF80

B.

hCA79 to hAC20

C.

hAA43 to hF345

D.

hDF80 to hFF80

Buy Now
Questions 6

Which of the following classes of hackers describes an individual who uses his computer knowledge for breaking security laws, invading privacy, and making information systems insecure?

Options:

A.

White Hat

B.

Black Hat

C.

Gray Hat

D.

Security providing organizations

Buy Now
Questions 7

You work as the Network Administrator for McNeil Inc. The company has a Unix-based network. You want to print the super block and block the group information for the filesystem present on a system.

Which of the following Unix commands can you use to accomplish the task?

Options:

A.

e2fsck

B.

dump

C.

e2label

D.

dumpe2fs

Buy Now
Questions 8

What are the purposes of audit records on an information system?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Backup

B.

Investigation

C.

Upgradation

D.

Troubleshooting

Buy Now
Questions 9

A customer comes to you stating that his hard drive has crashed. He had backed up the hard drive, but some files on it were encrypted with Windows Encrypted File System (EFS). What do you need to do to be able to give him access to those restored encrypted files?

Options:

A.

Nothing, they are unrecoverable.

B.

You need the encryption key. If that was not saved/backed up, then there is no chance of recovery.

C.

Nothing, when you restore, he will have access.

D.

You need to make sure that when you restore, you give the new machine the same user account so that he can open the encrypted files.

Buy Now
Questions 10

Which of the following functionality within the Autopsy browser is specifically designed to aid in case management?

Options:

A.

Hash database

B.

File listing

C.

Image integrity

D.

Keyword searches

Buy Now
Questions 11

You work as a professional Computer Hacking Forensic Investigator. A project has been assigned to you to investigate the DoS attack on a computer network of SecureEnet Inc. Which of the following methods will you perform to accomplish the task?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Look for unusual traffic on Internet connections and network segments.

B.

Seize all computers and transfer them to the Forensic lab.

C.

Look for core files or crash dumps on the affected systems.

D.

Sniff network traffic to the failing machine.

Buy Now
Questions 12

Which of the following are known as the three laws of OPSEC?

Each correct answer represents a part of the solution. Choose three.

Options:

A.

If you are not protecting it (the critical and sensitive information), the adversary wins!

B.

If you don't know the threat, how do you know what to protect?

C.

If you don't know what to protect, how do you know you are protecting it?

D.

If you don't know about your security resources you cannot protect your network.

Buy Now
Questions 13

Which of the following switches is used with Pslist command on the command line to show the statistics for all active threads on the system, grouping these threads with their owning process?

Options:

A.

Pslist -m

B.

Pslist -d

C.

Pslist -x

D.

Pslist -t

Buy Now
Questions 14

You work as the Network Administrator for McNeil Inc. The company has a Unix-based network. You want to set the hard disk geometry parameters, cylinders, heads, and sectors. Which of the following Unix commands can you use to accomplish the task?

Options:

A.

mkfs

B.

mkswap

C.

mke2fs

D.

hdparm

Buy Now
Questions 15

John works as a contract Ethical Hacker. He has recently got a project to do security checking for www.we-are-secure.com. He wants to find out the operating system of the we-are-secure server in the information gathering step. Which of the following commands will he use to accomplish the task?

Each correct answer represents a complete solution. Choose two.

Options:

A.

nc 208.100.2.25 23

B.

nmap -v -O www.we-are-secure.com

C.

nc -v -n 208.100.2.25 80

D.

nmap -v -O 208.100.2.25

Buy Now
Questions 16

You work as a Network Administrator for Net World International. Rick, a Sales Manager, complains that his Windows 98 computer is not displaying the taskbar. You reboot his computer and find that the taskbar is still missing. How will you resolve the issue?

Options:

A.

Replace WIN.INI from backup.

B.

Copy the registry from backup.

C.

Use Registry Editor to delete the following registry key:

HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionExplorerStuckRects

D.

Reinstall Windows 98 on Rick's computer.

Buy Now
Questions 17

Joseph works as a Software Developer for WebTech Inc. He wants to protect the algorithms and the techniques of programming that he uses in developing an application. Which of the following laws are used to protect a part of software?

Options:

A.

Trademark laws

B.

Code Security law

C.

Patent laws

D.

Copyright laws

Buy Now
Questions 18

You want to perform passive footprinting against we-are-secure Inc. Web server. Which of the following tools will you use?

Options:

A.

Netcraft

B.

Ettercap

C.

Ethereal

D.

Nmap

Buy Now
Questions 19

Which of the following Acts enacted in United States amends Civil Rights Act of 1964, providing technical changes affecting the length of time allowed to challenge unlawful seniority provisions, to sue the federal government for discrimination and to bring age discrimination claims?

Options:

A.

Sexual Predators Act

B.

Civil Rights Act of 1991

C.

PROTECT Act

D.

The USA Patriot Act of 2001

Buy Now
Questions 20

John works as a professional Ethical Hacker. He is assigned a project to test the security of www.weare-secure.com. He is working on the Linux operating system. He wants to sniff the we-are-secure network and intercept a conversation between two employees of the company through session hijacking. Which of the following tools will John use to accomplish the task?

Options:

A.

Ethercap

B.

Tripwire

C.

Hunt

D.

IPChains

Buy Now
Questions 21

Adam, a malicious hacker has successfully gained unauthorized access to the Linux system of

Umbrella Inc. Web server of the company runs on Apache. He has downloaded sensitive documents and database files from the computer. After performing these malicious tasks, Adam finally runs the following command on the Linux command box before disconnecting. for (( i = 0;i<11;i++ )); do

dd if=/dev/random of=/dev/hda && dd if=/dev/zero of=/dev/hda done

Which of the following actions does Adam want to perform by the above command?

Options:

A.

Making a bit stream copy of the entire hard disk for later download.

B.

Deleting all log files present on the system.

C.

Wiping the contents of the hard disk with zeros.

D.

Infecting the hard disk with polymorphic virus strings.

Buy Now
Questions 22

Which of the following is NOT an example of passive footprinting?

Options:

A.

Querying the search engine.

B.

Analyzing job requirements.

C.

Scanning ports.

D.

Performing the whois query.

Buy Now
Questions 23

Which of the following switches of the XCOPY command copies file ownerships and NTFS permissions on files while copying the files?

Options:

A.

/r

B.

/p

C.

/s

D.

/o

Buy Now
Questions 24

You want to change the attribute of a file named ACE.TXT to Hidden. Which command line will enable you to set the attribute?

Options:

A.

ATTRIB ACE.TXT -H

B.

ATTRIB ACE.TXT /HR

C.

ATTRIB ACE.TXT +H

D.

ATTRIB ACE.TXT /H

Buy Now
Questions 25

Based on the case study, to implement more security, which of the following additional technologies should you implement for laptop computers?

(Click the Exhibit button on the toolbar to see the case study.)

Each correct answer represents a complete solution. Choose two.

Options:

A.

PAP authentication

B.

Encrypting File System (EFS)

C.

Digital certificates

D.

Two-factor authentication

E.

Encrypted Data Transmissions

Buy Now
Questions 26

Which two technologies should research groups use for secure VPN access while traveling? (Click the Exhibit button on the toolbar to see the case study.)

Each correct answer represents a complete solution. Choose two.

Options:

A.

SSL

B.

PPTP

C.

Encrypting File System (EFS)

D.

Kerberos authentication

E.

Smart cards

Buy Now
Questions 27

In a Windows 98 computer, which of the following utilities is used to convert a FAT16 partition to FAT32?

Options:

A.

CVT16.EXE

B.

CVT1.EXE

C.

CONVERT16.EXE

D.

CONVERT.EXE

Buy Now
Questions 28

Which of the following refers to the ability to ensure that the data is not modified or tampered with?

Options:

A.

Integrity

B.

Availability

C.

Non-repudiation

D.

Confidentiality

Buy Now
Questions 29

An organization wants to mitigate the risks associated with the lost or stolen laptops and the associated disclosure laws, while reporting data breaches. Which of the following solutions will be best for the organization?

Options:

A.

Hashing function

B.

Digital signature

C.

Trusted Platform Module

D.

Whole disk encryption

Buy Now
Questions 30

Which of the following files starts the initialization process in booting sequence of the Linux operating system?

Options:

A.

/etc/sbin/init

B.

/etc/inittab

C.

/etc/rc/rc.local

D.

/etc/rc/rc.sysinit

Buy Now
Questions 31

You work as the Network Administrator for McNeil Inc. The company has a Unix-based network. You want to fix partitions on a hard drive. Which of the following Unix commands can you use to accomplish the task?

Options:

A.

fdformat

B.

exportfs

C.

fsck

D.

fdisk

Buy Now
Questions 32

The Klez worm is a mass-mailing worm that exploits a vulnerability to open an executable attachment even in Microsoft Outlook's preview pane. The Klez worm gathers email addresses from the entries of the default Windows Address Book (WAB). Which of the following registry values can be used to identify this worm?

Options:

A.

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run

B.

HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunServices

C.

HKEY_CURRENT_USER\Software\Microsoft\WAB\WAB4\Wab File Name = "file and pathname of the WAB file"

D.

HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run

Buy Now
Questions 33

Which of the following is the process of comparing cryptographic hash functions of system executables and configuration files?

Options:

A.

Spoofing

B.

File integrity auditing

C.

Reconnaissance

D.

Shoulder surfing

Buy Now
Questions 34

Which of the following Linux file systems is a journaled file system?

Options:

A.

ext3

B.

ext4

C.

ext2

D.

ext

Buy Now
Questions 35

You are the Network Administrator and your company has recently implemented encryption for all emails. You want to check to make sure that the email packages are being encrypted. What tool would you use to accomplish this?

Options:

A.

Password cracker

B.

Packet sniffer

C.

Performance Monitor

D.

Vulnerability analyzer

Buy Now
Questions 36

Adam works as a professional Computer Hacking Forensic Investigator, a project has been assigned to him to investigate and examine files present on suspect's computer. Adam uses a tool with the help of which he can examine recovered deleted files, fragmented files, and other corrupted data. He can also examine the data, which was captured from the network, and access the physical RAM, and any processes running in virtual memory with the help of this tool. Which of the following tools is Adam using?

Options:

A.

Evidor

B.

HxD

C.

WinHex

D.

Vedit

Buy Now
Questions 37

Which of the following statutes is enacted in the U.S., which prohibits creditors from collecting data from applicants, such as national origin, caste, religion etc?

Options:

A.

The Electronic Communications Privacy Act

B.

The Privacy Act

C.

The Fair Credit Reporting Act (FCRA)

D.

The Equal Credit Opportunity Act (ECOA)

Buy Now
Questions 38

Jason, a game lover, owns an Apple's iPod nano. He wants to play games on his iPod. He also wants to improve the quality of the audio recording of his iPod. Which of the following steps can Jason take to accomplish the task?

Options:

A.

Install iPodLinux.

B.

Install third party software.

C.

Upgrade Apple's firmware.

D.

Buy external add-ons.

Buy Now
Questions 39

Which of the following cryptographic methods are used in EnCase to ensure the integrity of the data, which is acquired for the investigation?

Each correct answer represents a complete solution. Choose two.

Options:

A.

MD5

B.

CRC

C.

HAVAL

D.

Twofish

Buy Now
Questions 40

John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. He copies the whole structure of the We-are-secure Web site to the local disk and obtains all the files on the Web site. Which of the following techniques is he using to accomplish his task?

Options:

A.

Web ripping

B.

TCP FTP proxy scanning

C.

Fingerprinting

D.

Eavesdropping

Buy Now
Questions 41

Which of the following registry hives stores configuration information specific to a particular user who is currently logged on to the computer?

Options:

A.

HKEY_USERS

B.

HKEY_CURRENT_USER

C.

HKEY_LOCAL_MACHINE

D.

HKEY_CLASSES_ROOT

Buy Now
Questions 42

Adam works as a professional Computer Hacking Forensic Investigator. A project has been assigned to him to investigate a compromised system of a cyber criminal, who hides some information in his computer. This computer runs on Linux operating system. Adam wants to extract the data units of a file, which is specified by its meta-data address. He is using the Sleuth Kit for this purpose. Which of the following commands in the Sleuth kit will he use to accomplish the task?

Options:

A.

dcat

B.

ifind

C.

icat

D.

istat

Buy Now
Questions 43

Sarah has created a site on which she publishes a copyrighted material. She is ignorant that she is infringing copyright. Is she guilty under copyright laws?

Options:

A.

Yes

B.

No

Buy Now
Questions 44

Which of the following U.S. Federal laws addresses computer crime activities in communication lines, stations, or systems?

Options:

A.

18 U.S.C. 1030

B.

18 U.S.C. 1362

C.

18 U.S.C. 2701

D.

18 U.S.C. 2510

E.

18 U.S.C. 1029

Buy Now
Questions 45

Which of the following tools is used to block email, Instant Message, Web site, or other media if inappropriate words such as pornography, violence etc. is used?

Options:

A.

iProtect

B.

Reveal

C.

iProtectYou

D.

Child Exploitation Tracking System

Buy Now
Questions 46

Which of the following is used to authenticate asymmetric keys?

Options:

A.

Password

B.

Digital signature

C.

MAC Address

D.

Demilitarized zone (DMZ)

Buy Now
Questions 47

Your network has a Windows 2000 Server computer with FAT file system, shared by several users.

This system stores sensitive data. You decide to encrypt this data to protect it from unauthorized access. You want to accomplish the following goals:

Data should be secure and encrypted.

Administrative efforts should be minimum.

You should have the ability to recover encrypted files in case the file owner leaves the company.

Other permissions on encrypted files should be unaffected.

File-level security is required on the disk where data is stored.

Encrypting or decrypting of files should not be the responsibility of the file owner.

You take the following steps to accomplish these goals :

Convert the FAT file system to Windows 2000 NTFS file system.

Use Encrypting File System (EFS) to encrypt data.

Which of the following goals will you be able to accomplish?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

File-level security is available on the disk where data is stored.

B.

You have the ability to recover encrypted files in case the file owner leaves the company.

C.

Encrypting or decrypting of files is no longer the responsibility of the file owner.

D.

Data are secured and encrypted.

E.

Administrative efforts are minimum.

F.

Other permissions on encrypted files are unaffected.

Buy Now
Questions 48

Which of the following statements about registry is true?

Each correct answer represents a complete solution. Choose three.

Options:

A.

It is divided in many areas known as hives.

B.

It was first introduced with Windows 95 operating system.

C.

It is a centralized configuration database that stores information related to a Windows computer.

D.

It can be edited using SCANREG utility.

Buy Now
Questions 49

Mark has been hired by a company to work as a Network Assistant. He is assigned the task to

configure a dial-up connection. He is configuring a laptop. Which of the following protocols should he disable to ensure that the password is encrypted during remote access?

Options:

A.

MSCHAP

B.

SPAP

C.

MSCHAP V2

D.

PAP

Buy Now
Questions 50

Which of the following is a documentation of guidelines that computer forensics experts use to handle evidences?

Options:

A.

Chain of evidence

B.

Chain of custody

C.

Incident response policy

D.

Evidence access policy

Buy Now
Questions 51

You are responsible for tech support at your company. You have been instructed to make certain that all desktops support file and folder encryption. Which file system should you use when installing Windows XP?

Options:

A.

FAT

B.

EXT4

C.

FAT32

D.

NTFS

Buy Now
Questions 52

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He traceroutes the We-are-secure server and gets the following result:

Considering the above traceroute result, which of the following statements can be true?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

While tracerouting, John's network connection has become slow.

B.

Some router along the path is down.

C.

The We-are-secure server is using a packet filtering firewall.

D.

The IP address of the We-are-secure server is not valid.

Buy Now
Questions 53

Trinity wants to send an email to her friend. She uses the MD5 generator to calculate cryptographic hash of her email to ensure the security and integrity of the email. MD5 generator, which Trinity is using operates in two steps:

Creates check file

Verifies the check file

Which of the following MD5 generators is Trinity using?

Options:

A.

MD5 Checksum Verifier

B.

Mat-MD5

C.

Chaos MD5

D.

Secure Hash Signature Generator

Buy Now
Questions 54

Adam works as a Security Analyst for Umbrella Inc. He suspects that a virus exists in the network of the company. He scanned the client system with latest signature-based anti-virus, but no productive results have been obtained. Adam suspects that a polymorphic virus exists in the network. Which of the following statements are true about the polymorphic virus?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

When the user runs the infected file in the disk, it loads virus into the RAM.

B.

The mutation engine of polymorphic virus generates a new encrypted code, this changes the signature of the virus.

C.

It has the ability to mutate and can change its known viral signature and hide from signature based antivirus programs.

D.

The new virus resides in the main memory of the computer and does not infect other files of the operating system.

Buy Now
Questions 55

John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. He wants to test the effect of a virus on the We-are-secure server. He injects the virus on the server and, as a result, the server becomes infected with the virus even though an established antivirus program is installed on the server. Which of the following do you think are the reasons why the antivirus installed on the server did not detect the virus injected by John?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

The mutation engine of the virus is generating a new encrypted code.

B.

The virus, used by John, is not in the database of the antivirus program installed on the server.

C.

John has created a new virus.

D.

John has changed the signature of the virus.

Buy Now
Questions 56

Which of the following file systems supports disk quotas?

Options:

A.

FAT32

B.

NTFS

C.

FAT

D.

CDFS

Buy Now
Questions 57

Which of the following is the Windows feature on which the file management can be performed by a PC user?

Options:

A.

Activity Monitor

B.

Task Manager

C.

Windows Explorer

D.

Finder

Buy Now
Questions 58

You are the Security Consultant and have been contacted by a client regarding their encryption and hashing algorithms. Their in-house network administrator tells you that their current hashing algorithm is an older one with known weaknesses and is not collision resistant. Which algorithm are they most likely using for hashing?

Options:

A.

SHA

B.

MD5

C.

PKI

D.

Kerberos

Buy Now
Questions 59

Adam works as a professional Computer Hacking Forensic Investigator. He has been assigned with a project to investigate a computer in the network of SecureEnet Inc. The compromised system runs on Windows operating system. Adam decides to use Helix Live for Windows to gather data and electronic evidences starting with retrieving volatile data and transferring it to server component via TCP/IP. Which of the following application software in Helix Windows Live will he use to retrieve volatile data and transfer it to the server component via TCP/IP?

Options:

A.

FSP

B.

Drive Manager

C.

FTK imager

D.

FAU

Buy Now
Questions 60

Brutus is a password cracking tool that can be used to crack the following authentications:

HTTP (Basic Authentication)

HTTP (HTML Form/CGI)

POP3 (Post Office Protocol v3)

FTP (File Transfer Protocol)

SMB (Server Message Block)

Telnet

Which of the following attacks can be performed by Brutus for password cracking?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Replay attack

B.

Dictionary attack

C.

Man-in-the-middle attack

D.

Hybrid attack

E.

Brute force attack

Buy Now
Questions 61

Joseph works as a Web Designer for WebTech Inc. He creates a Web site and wants to protect it from lawsuits. Which of the following steps will he take to accomplish the task?

Each correct answer represents a part of the solution. Choose all that apply.

Options:

A.

Restrict the access to the site.

B.

Restrict shipping in certain areas.

C.

Restrict the transfer of information.

D.

Restrict customers according to their locations.

Buy Now
Questions 62

Which of the following types of firewall functions at the Session layer of OSI model?

Options:

A.

Application-level firewall

B.

Switch-level firewall

C.

Packet filtering firewall

D.

Circuit-level firewall

Buy Now
Questions 63

Which of the following types of computers is used for attracting potential intruders?

Options:

A.

Bastion host

B.

Data pot

C.

Files pot

D.

Honey pot

Buy Now
Questions 64

Identify the port in the image given below, which can be connected to the hub to extend the number of ports, and up to 127 devices can be connected to it?

Options:

Buy Now
Questions 65

Which of the following statements are NOT true about volume boot record or Master Boot Record?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

The end of MBR marker is h55CC.

B.

The actual program can be 512 bytes long.

C.

Volume boot sector is present at cylinder 0, head 0, and sector 1 of the default boot drive.

D.

Four 16 bytes master partition records are present in MBR.

Buy Now
Questions 66

Peter works as a Computer Hacking Forensic Investigator. He has been called by an organization to conduct a seminar to give necessary information related to sexual harassment within the work place. Peter started with the definition and types of sexual harassment. He then wants to convey that it is important that records of the sexual harassment incidents should be maintained, which helps in further legal prosecution. Which of the following data should be recorded in this documentation?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Names of the victims

B.

Date and time of incident

C.

Nature of harassment

D.

Location of each incident

Buy Now
Questions 67

You want to upgrade a partition in your computer's hard disk drive from FAT to NTFS. Which of the following DOS commands will you use to accomplish this?

Options:

A.

FORMAT C: /s

B.

CONVERT C: /fs:ntfs

C.

SYS C:

D.

FDISK /mbr

Buy Now
Questions 68

Which of the following statements about an extended partition are true?

Each correct answer represents a complete solution. Choose two.

Options:

A.

It can be sub-divided into logical drives.

B.

It cannot be formatted or assigned a drive letter.

C.

A maximum of four extended partitions can exist on a single basic disk.

D.

It cannot contain more than one logical drive.

Buy Now
Questions 69

Which of the following file systems contains hardware settings of a Linux computer?

Options:

A.

/var

B.

/etc

C.

/proc

D.

/home

Buy Now
Questions 70

Which of the following Acts enacted in United States allows the FBI to issue National Security Letters (NSLs) to Internet service providers (ISPs) ordering them to disclose records about their customers?

Options:

A.

Wiretap Act

B.

Computer Fraud and Abuse Act

C.

Economic Espionage Act of 1996

D.

Electronic Communications Privacy Act of 1986

Buy Now
Questions 71

You work as a professional Computer Hacking Forensic Investigator for DataEnet Inc. You want to investigate e-mail information of an employee of the company. The suspected employee is using an online e-mail system such as Hotmail or Yahoo. Which of the following folders on the local computer will you review to accomplish the task?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

History folder

B.

Temporary Internet Folder

C.

Download folder

D.

Cookies folder

Buy Now
Questions 72

Which of the following two cryptography methods are used by NTFS Encrypting File System (EFS) to encrypt the data stored on a disk on a file-by-file basis?

Options:

A.

Digital certificates

B.

Public key

C.

RSA

D.

Twofish

Buy Now
Questions 73

Which of the following is the correct order of digital investigations Standard Operating Procedure (SOP)?

Options:

A.

Initial analysis, request for service, data collection, data analysis, data reporting

B.

Initial analysis, request for service, data collection, data reporting, data analysis

C.

Request for service, initial analysis, data collection, data reporting, data analysis

D.

Request for service, initial analysis, data collection, data analysis, data reporting

Buy Now
Questions 74

On which of the following locations does the Windows NT/2000 operating system contain the SAM, SAM.LOG, SECURITY.LOG, APPLICATION.LOG, and EVENT.LOG files?

Options:

A.

\%Systemroot%system32

B.

\%Systemroot%profiles

C.

\%Systemroot%system32config

D.

\%Systemroot%help

Buy Now
Questions 75

You work as a Network Administrator for Peach Tree Inc. The company currently has a FAT-based Windows NT network. All client computers run Windows 98. The management wants all client computers to be able to boot in Windows XP Professional. You want to accomplish the following goals:

The file system should support file compression and file level security.

All the existing data and files can be used by the new file system.

Users should be able to dual-boot their computers.

You take the following steps to accomplish these goals:

Convert the FAT file system to NTFS using the CONVERT utility.

Install Windows XP and choose to upgrade the existing operating system during setup.

Which of the following goals will you be able to accomplish?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

The file system supports file compression and file level security.

B.

All the existing data and files can be used by the new file system.

C.

Users are able to dual-boot their computers.

D.

None of the goals are accomplished.

Buy Now
Questions 76

Maria works as a professional Ethical Hacker. She recently got a project to test the security of www.we-are-secure.com. Arrange the three pre-test phases of the attack to test the security of weare-secure.

Options:

A.

Buy Now
Questions 77

Adam works as a Computer Hacking Forensic Investigator for a garment company in the United States. A project has been assigned to him to investigate a case of a disloyal employee who is suspected of stealing design of the garments, which belongs to the company and selling those garments of the same design under different brand name. Adam investigated that the company does not have any policy related to the copy of design of the garments. He also investigated that the trademark under which the employee is selling the garments is almost identical to the original trademark of the company. On the grounds of which of the following laws can the employee be prosecuted?

Options:

A.

Trademark law

B.

Cyber law

C.

Copyright law

D.

Espionage law

Buy Now
Questions 78

Adam works as an Incident Handler for Umbrella Inc. He is informed by the senior authorities that the server of the marketing department has been affected by a malicious hacking attack. Supervisors are also claiming that some sensitive data are also stolen. Adam immediately arrived to the server room of the marketing department and identified the event as an incident. He isolated the infected network from the remaining part of the network and started preparing to image the entire system. He captures volatile data, such as running process, ram, and network connections.

Which of the following steps of the incident handling process is being performed by Adam?

Options:

A.

Recovery

B.

Eradication

C.

Identification

D.

Containment

Buy Now
Questions 79

By gaining full control of router, hackers often acquire full control of the network. Which of the following methods are commonly used to attack Routers?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

By launching Social Engineering attack

B.

By launching Max Age attack

C.

Route table poisoning

D.

By launching Sequence++ attack

Buy Now
Questions 80

Fill in the blank with the appropriate name.

_____is a list, which specifies the order of volatility of data in a Windows based system.

Options:

A.

RFC 3227

Buy Now
Questions 81

You work as a Network Administrator for Blue Bell Inc. You want to install Windows XP Professional on your computer, which already has Windows Me installed. You want to configure your computer to dual boot between Windows Me and Windows XP Professional. You have a single 40GB hard disk.

Which of the following file systems will you choose to dual-boot between the two operating systems?

Options:

A.

NTFS

B.

FAT32

C.

CDFS

D.

FAT

Buy Now
Questions 82

TCP FIN scanning is a type of stealth scanning through which the attacker sends a FIN packet to the target port. If the port is closed, the victim assumes that this packet was sent mistakenly by the attacker and sends the RST packet to the attacker. If the port is open, the FIN packet will be ignored and the port will drop the packet. Which of the following operating systems can be easily identified with the help of TCP FIN scanning?

Options:

A.

Solaris

B.

Red Hat

C.

Knoppix

D.

Windows

Buy Now
Questions 83

Which of the following tools can be used to perform tasks such as Windows password cracking, Windows enumeration, and VoIP session sniffing?

Options:

A.

John the Ripper

B.

L0phtcrack

C.

Obiwan

D.

Cain

Buy Now
Questions 84

You are handling technical support calls for an insurance company. A user calls you complaining that he cannot open a file, and that the file name appears in green while opening in Windows Explorer.

What does this mean?

Options:

A.

The file is encrypted.

B.

The file belongs to another user.

C.

The file is infected with virus.

D.

The file is compressed.

Buy Now
Questions 85

Which of the following is a name, symbol, or slogan with which a product is identified?

Options:

A.

Trade secret

B.

Patent

C.

Copyright

D.

Trademark

Buy Now
Questions 86

Adam works as a professional Computer Hacking Forensic Investigator. A project has been assigned to him by the chief security officer of a cloth manufacturing company who suspects that one of the employees is selling the design of the clothes outside the company. The security officer asked Adam to investigate the iPhone of the employee, as he suspects that there might be some sensitive information stored in his iPhone. On investigation Adam found out that the employee tries to destroy the evidence on his iPhone. He presses and holds the Home and Power buttons until the device is forced into recovery mode. Which of the following actions occurred when iPhone is set into recovery mode?

Options:

A.

iPhone will be prevented from booting temporarily.

B.

The file system will be destroyed.

C.

Nothing will happen.

D.

Data will be destroyed.

Buy Now
Questions 87

Which of the following hardware devices prevents broadcasts from crossing over subnets?

Options:

A.

Bridge

B.

Hub

C.

Modem

D.

Router

Buy Now
Questions 88

Which of the following is described in the following statement?

"It is a 512 bytes long boot sector that is the first sector of a default boot drive. It is also known as Volume Boot Sector, if the boot drive is un-partitioned. "

Options:

A.

BIOS

B.

SBR

C.

POST

D.

MBR

Buy Now
Questions 89

In which of the following files does the Linux operating system store passwords?

Options:

A.

Password

B.

Passwd

C.

Shadow

D.

SAM

Buy Now
Questions 90

Which of the following wireless network standards operates on the 5 GHz band and transfers data at a rate of 54 Mbps?

Options:

A.

802.11a

B.

802.11u

C.

802.11g

D.

802.11b

Buy Now
Questions 91

You work as a Network Administrator for Net World International. You want to configure a Windows 2000 computer to dual boot with Windows 98. The hard disk drive of the computer will be configured as a single partition drive. Which of the following file systems will you use to accomplish this?

Options:

A.

NTFS

B.

HPFS

C.

FAT16

D.

FAT32

Buy Now
Questions 92

Which of the following tools is used to locate lost files and partitions to restore data from a formatted, damaged, or lost partition in Windows and Apple Macintosh computers?

Options:

A.

Easy-Undelete

B.

File Scavenger

C.

Recover4all Professional

D.

VirtualLab

Buy Now
Questions 93

Which of the following statements about the HKEY_LOCAL_MACHINE registry hive is true?

Options:

A.

It contains the user profile for the user who is currently logged on to the computer.

B.

It contains information about the local computer system, including hardware and operating system data, such as bus type, system memory, device drivers, and startup control parameters.

C.

It contains configuration data for the current hardware profile.

D.

It contains data that associates file types with programs and configuration data for COM objects, Visual Basic programs, or other automation.

Buy Now
Questions 94

Victor works as a professional Ethical Hacker for SecureNet Inc. He wants to use Steganographic file system method to encrypt and hide some secret information. Which of the following disk spaces will he use to store this secret information?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Hidden partition

B.

Slack space

C.

Dumb space

D.

Unused Sectors

Buy Now
Questions 95

Which of the following Windows Registry key contains the password file of the user?

Options:

A.

HKEY_USER

B.

HKEY_CURRENT_CONFIG

C.

HKEY_DYN_DATA

D.

HKEY_LOCAL_MACHINE

Buy Now
Exam Code: GCFA
Exam Name: GIACCertified Forensics Analyst
Last Update: Sep 15, 2025
Questions: 318
$57.75  $164.99
$43.75  $124.99
$36.75  $104.99
buy now GCFA