Pass the GIAC Forensics GCFA Questions and answers with CertsForce

Viewing page 10 out of 10 pages
Viewing questions 91-100 out of questions
Questions # 91:

Mark works as a Network Administrator for Net Perfect Inc. The company has a Linux-based network. Mark installs a Checkpoint Firewall NGX on a SecurePlatform device. He performs a scheduled backup of his system settings and products configuration. Where are these backup files stored?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

SCP


B.

TFTP


C.

Locally on the SecurePlatform machine hard drive


D.

On a PC in a file named userC


Expert Solution
Questions # 92:

Which of the following methods is used by forensic investigators to acquire an image over the network in a secure manner?

Options:

A.

DOS boot disk


B.

Linux Live CD


C.

Secure Authentication for EnCase (SAFE)


D.

EnCase with a hardware write blocker


Expert Solution
Questions # 93:

Adam works as a professional Computer Hacking Forensic Investigator. He works with the local police. A project has been assigned to him to investigate an iPod, which was seized from a student of the high school. It is suspected that the explicit child pornography contents are stored in the iPod. Adam wants to investigate the iPod extensively. Which of the following operating systems will Adam use to carry out his investigations in more extensive and elaborate manner?

Options:

A.

Linux


B.

MINIX 3


C.

Windows XP


D.

Mac OS


Expert Solution
Questions # 94:

An organization monitors the hard disks of its employees' computers from time to time. Which policy does this pertain to?

Options:

A.

Network security policy


B.

User password policy


C.

Privacy policy


D.

Backup policy


Expert Solution
Questions # 95:

Which of the following file systems is designed by Sun Microsystems?

Options:

A.

NTFS


B.

CIFS


C.

ext2


D.

ZFS


Expert Solution
Viewing page 10 out of 10 pages
Viewing questions 91-100 out of questions