Pass the GIAC Forensics GCFA Questions and answers with CertsForce

Viewing page 2 out of 10 pages
Viewing questions 11-20 out of questions
Questions # 11:

You work as a professional Computer Hacking Forensic Investigator. A project has been assigned to you to investigate Plagiarism occurred in the source code files of C#. Which of the following tools will you use to detect the software plagiarism?

Options:

A.

Jplag


B.

Turnitin


C.

VAST


D.

SCAM


Expert Solution
Questions # 12:

Which of the following registry hives stores information about the file extensions that are mapped to their corresponding applications?

Options:

A.

HKEY_CURRENT_USER


B.

HKEY_USERS


C.

HKEY_CLASSES_ROOT


D.

HKEY_LOCAL_MACHINE


Expert Solution
Questions # 13:

You work as a Forensic Investigator. Which of the following rules will you follow while working on a case?

Each correct answer represents a part of the solution. Choose all that apply.

Options:

A.

Prepare a chain of custody and handle the evidence carefully.


B.

Examine original evidence and never rely on the duplicate evidence.


C.

Never exceed the knowledge base of the forensic investigation.


D.

Follow the rules of evidence and never temper with the evidence.


Expert Solution
Questions # 14:

Which of the following cryptographic methods are used in EnCase to ensure the integrity of the data, which is acquired for the investigation?

Each correct answer represents a complete solution. Choose two.

Options:

A.

MD5


B.

CRC


C.

HAVAL


D.

Twofish


Expert Solution
Questions # 15:

Which of the following methods can be used to start the Disk Defragmenter utility in Windows 9x?

Each correct answer represents a complete solution. Choose two.

Options:

A.

From Start menu > Programs > Accessories > System Tools, click Disk Defragmenter.


B.

From Start menu > Programs > Windows Explorer, right-click on the drive to be defragmented > click Properties in the popup menu > Tools tab, then click the Defragment Now button.


C.

From Start menu > Programs > Windows Explorer, right-click on the drive to be defragmented, then click the Disk Defragmenter in the popup window.


D.

From Start menu > Programs, click Disk Defragmenter.


Expert Solution
Questions # 16:

Which of the following tools works by using standard set of MS-DOS commands and can create an MD5 hash of an entire drive, partition, or selected files?

Options:

A.

DriveSpy


B.

Ontrack


C.

Forensic Sorter


D.

Device Seizure


Expert Solution
Questions # 17:

Which of the following types of attack can guess a hashed password?

Options:

A.

Denial of Service attack


B.

Evasion attack


C.

Brute force attack


D.

Teardrop attack


Expert Solution
Questions # 18:

Which of the following types of cyber stalking damage the reputation of their victim and turn other people against them by setting up their own Websites, blogs or user pages for this purpose?

Options:

A.

False victimization


B.

Encouraging others to harass the victim


C.

False accusations


D.

Attempts to gather information about the victim


Expert Solution
Questions # 19:

Which of the following is used to back up forensic evidences or data folders from the network or locally attached hard disk drives?

Options:

A.

WinHex


B.

Device Seizure


C.

FAR system


D.

Vedit


Expert Solution
Questions # 20:

Which of the following switches of the XCOPY command copies file ownerships and NTFS permissions on files while copying the files?

Options:

A.

/r


B.

/p


C.

/s


D.

/o


Expert Solution
Viewing page 2 out of 10 pages
Viewing questions 11-20 out of questions