Certbus > GIAC > GIAC Information Security > GCFA > GCFA Online Practice Questions and Answers

GCFA Online Practice Questions and Answers

Questions 4

You work as a professional Computer Hacking Forensic Investigator for DataEnet Inc. You want to investigate e-mail information of an employee of the company. The suspected employee is using an online e-mail system such as Hotmail or Yahoo. Which of the following folders on the local computer will you review to accomplish the task?

Each correct answer represents a complete solution. Choose all that apply.

A. History folder

B. Temporary Internet Folder

C. Download folder

D. Cookies folder

Browse 318 Q&As
Questions 5

Which of the following file systems provides file-level security?

A. CDFS

B. FAT

C. FAT32

D. NTFS

Browse 318 Q&As
Questions 6

You work as a Network Administrator for Net Perfect Inc. The company has a Windows Server 2008 network environment. The network is configured as a Windows Active Directory-based single forest single domain network. The network is configured on IP version 6 protocol. All the computers on the network are connected to a switch device. One day, users complain that they are unable to connect to a file server. You try to ping the client computers from the server, but the pinging fails. You try to ping the server's own loopback address, but it fails to ping. You restart the server, but the problem persists.

What is the most likely cause?

A. The cable that connects the server to the switch is broken.

B. Automatic IP addressing is not working.

C. The switch device is not working.

D. The server is configured with unspecified IP address.

E. The server's NIC is not working.

Browse 318 Q&As
Questions 7

Which of the following is a type of intruder detection that involves logging network events to a file for an administrator to review later?

A. Packet detection

B. Passive detection

C. Active detection

D. Event detection

Browse 318 Q&As
Questions 8

You work as a Network Administrator for Peach Tree Inc. The company currently has a FAT- based Windows NT network. All client computers run Windows 98. The management wants all client computers to be able to boot in Windows XP Professional. You want to accomplish the following goals:

The file system should support file compression and file level security.

All the existing data and files can be used by the new file system.

Users should be able to dual-boot their computers.

You take the following steps to accomplish these goals:

Convert the FAT file system to NTFS using the CONVERT utility.

Install Windows XP and choose to upgrade the existing operating system during setup.

Which of the following goals will you be able to accomplish?

Each correct answer represents a complete solution. Choose all that apply.

A. The file system supports file compression and file level security.

B. All the existing data and files can be used by the new file system.

C. Users are able to dual-boot their computers.

D. None of the goals are accomplished.

Browse 318 Q&As
Questions 9

Which of the following parameters is NOT used for calculating the capacity of the hard disk?

A. Bytes per sector

B. Number of heads

C. Total number of sectors

D. Number of platters

Browse 318 Q&As
Questions 10

Adam works as a professional Computer Hacking Forensic Investigator. He has been called by the FBI to examine data of the hard disk, which is seized from the house of a suspected terrorist. Adam decided to acquire an image of the suspected hard drive. He uses a forensic hardware tool, which is capable of capturing data from IDE, Serial ATA, SCSI devices, and flash cards. This tool can also produce MD5 and CRC32 hash while capturing the data. Which of the following tools is Adam using?

A. Wipe MASSter

B. ImageMASSter 4002i

C. ImageMASSter Solo-3

D. FireWire DriveDock

Browse 318 Q&As
Questions 11

Which of the following file systems contains hardware settings of a Linux computer?

A. /var

B. /etc

C. /proc

D. /home

Browse 318 Q&As
Questions 12

Which of the following statements about registry is true?

Each correct answer represents a complete solution. Choose three.

A. It is divided in many areas known as hives.

B. It was first introduced with Windows 95 operating system.

C. It is a centralized configuration database that stores information related to a Windows computer.

D. It can be edited using SCANREG utility.

Browse 318 Q&As
Questions 13

Which of the following tables is formed by NTFS file system to keep the track of files, to store metadata, and their location?

A. The Master File Table

B. The System File Table

C. The Master Allocation Table

D. The File Allocation Table

Browse 318 Q&As
Questions 14

Which of the following standard technologies is not used to interface hard disk with the computer?

A. USB

B. SCSI

C. IDE/ATA

D. PS/2

Browse 318 Q&As
Questions 15

You want to change the attribute of a file named ACE.TXT to Hidden. Which command line will enable you to set the attribute?

A. ATTRIB ACE.TXT -H

B. ATTRIB ACE.TXT /HR

C. ATTRIB ACE.TXT +H

D. ATTRIB ACE.TXT /H

Browse 318 Q&As
Questions 16

You use the FAT16 file system on your Windows 98 computer. You want to upgrade to the FAT32 file system. What is the advantage of the FAT32 file system over FAT16 file system?

Each correct answer represents a complete solution. Choose two.

A. It allocates disk space more efficiently.

B. On startup failure, you can start the computer by using an MS-DOS or Windows 95 bootable floppy disk.

C. It uses larger cluster sizes.

D. It supports drives up to 2 terabytes (TB) in size.

Browse 318 Q&As
Questions 17

Which of the following Acts enacted in United States amends Civil Rights Act of 1964, providing technical changes affecting the length of time allowed to challenge unlawful seniority provisions, to sue the federal government for discrimination and to bring age discrimination claims?

A. Sexual Predators Act

B. Civil Rights Act of 1991

C. PROTECT Act

D. The USA Patriot Act of 2001

Browse 318 Q&As
Questions 18

Which of the following registry hives contains information about all users who have logged on to the system?

A. HKEY_CLASSES_ROOT

B. HKEY_CURRENT_USERS

C. HKEY_USERS

D. HKEY_CURRENT_CONFIG

Browse 318 Q&As
Exam Code: GCFA
Exam Name: GIAC Certified Forensics Analyst
Last Update: Apr 25, 2024
Questions: 318 Q&As

PDF

$45.99

VCE

$49.99

PDF + VCE

$59.99