Pass the GIAC Forensics GCFA Questions and answers with CertsForce

Viewing page 1 out of 10 pages
Viewing questions 1-10 out of questions
Questions # 1:

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He enters the following command on the Linux terminal:

chmod -rwSr----- secure.c

Considering the above scenario, which of the following statements is true?

Options:

A.

The Sticky bit is set, but other users have no execute permission.


B.

The SUID bit is set, but the owner has no execute permission.


C.

The Sticky bit is set and other users have the execute permission.


D.

The SGID bit is set, but the group execute permission is not set.


Expert Solution
Questions # 2:

Which of the following are the two different file formats in which Microsoft Outlook saves e-mail messages based on system configuration?

Each correct answer represents a complete solution. Choose two.

Options:

A.

.pst


B.

.xst


C.

.txt


D.

.ost


Expert Solution
Questions # 3:

You want to perform passive footprinting against we-are-secure Inc. Web server. Which of the following tools will you use?

Options:

A.

Netcraft


B.

Ettercap


C.

Ethereal


D.

Nmap


Expert Solution
Questions # 4:

Which of the following precautionary steps are taken by the supervisors or employers to avoid sexual harassment in workplace?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Establish a complaint mechanism.


B.

Communicate to an employee who is indulging in such behavior.


C.

Contact the police and take legal action.


D.

Immediately take action on the complaint.


Expert Solution
Questions # 5:

Which of the following is a formula, practice, process, design, instrument, pattern, or compilation of information which is not generally known, but by which a business can obtain an economic advantage over its competitors?

Options:

A.

Copyright


B.

Utility model


C.

Cookie


D.

Trade secret


Expert Solution
Questions # 6:

Mark is taking a data backup during non-working hours from a remote computer on the network by using the Backup utility. What will he do to ensure that the backup has no errors?

Options:

A.

Verify the backup.


B.

Take a full backup.


C.

Take an incremental backup.


D.

Log off all the users from the network.


Expert Solution
Questions # 7:

When you start your computer, Windows operating system reports that the hard disk drive has bad sectors. What will be your first step in resolving this issue?

Options:

A.

Run the FORMAT command from DOS prompt.


B.

Replace the data cable of the hard disk drive.


C.

Run DEFRAG on the hard drive.


D.

Run SCANDISK with the Thorough option.


Expert Solution
Questions # 8:

Sandra, an expert computer user, hears five beeps while booting her computer that has AMI BIOS; and after that her computer stops responding. Sandra knows that during booting process POST produces different beep codes for different types of errors. Which of the following errors refers to this POST beep code?

Options:

A.

Display memory error


B.

Processor failure


C.

Mother board timer not operational


D.

Cache memory test failed


Expert Solution
Questions # 9:

Which of the following are advantages of NTFS file system over FAT32 and FAT?

Each correct answer represents a part of the solution. Choose two.

Options:

A.

Support for file and folder level permissions.


B.

Support for audio files.


C.

Support for Encrypting File System (EFS).


D.

Support for dual-booting.


Expert Solution
Questions # 10:

The Klez worm is a mass-mailing worm that exploits a vulnerability to open an executable attachment even in Microsoft Outlook's preview pane. The Klez worm gathers email addresses from the entries of the default Windows Address Book (WAB). Which of the following registry values can be used to identify this worm?

Options:

A.

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run


B.

HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunServices


C.

HKEY_CURRENT_USER\Software\Microsoft\WAB\WAB4\Wab File Name = "file and pathname of the WAB file"


D.

HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run


Expert Solution
Viewing page 1 out of 10 pages
Viewing questions 1-10 out of questions