Pass the GIAC Forensics GCFA Questions and answers with CertsForce

Viewing page 3 out of 10 pages
Viewing questions 21-30 out of questions
Questions # 21:

Your Windows XP hard drive has 2 partitions. The system partition is NTFS and the other is FAT. You wish to encrypt a folder created on the system partition for the purpose of data security. Which of the following statements is true about this situation?

Options:

A.

You can only encrypt files on the NTFS partition.


B.

You can only encrypt files on the FAT partition.


C.

Since the operating system is on the NTFS partition, you can encrypt files on both.


D.

You cannot encrypt files on either partition.


Expert Solution
Questions # 22:

What are the purposes of audit records on an information system?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Backup


B.

Investigation


C.

Upgradation


D.

Troubleshooting


Expert Solution
Questions # 23:

Which of the following statements is NOT true about FAT16 file system?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

FAT16 file system supports Linux operating system.


B.

FAT16 file system supports file-level compression.


C.

FAT16 file system works well with large disks because the cluster size increases as the disk partition size increases.


D.

FAT16 does not support file-level security.


Expert Solution
Questions # 24:

John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. He wants to forward all the kernel messages to the remote host having IP address 192.168.0.1. Which of the following changes will he perform in the syslog.conf file to accomplish the task?

Options:

A.

kern.* @192.168.0.1


B.

!*.* @192.168.0.1


C.

*.* @192.168.0.1


D.

!kern.* @192.168.0.1


Expert Solution
Questions # 25:

John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. He copies the whole structure of the We-are-secure Web site to the local disk and obtains all the files on the Web site. Which of the following techniques is he using to accomplish his task?

Options:

A.

Web ripping


B.

TCP FTP proxy scanning


C.

Fingerprinting


D.

Eavesdropping


Expert Solution
Questions # 26:

Which of the following types of evidence is considered as the best evidence?

Options:

A.

The original document


B.

A copy of the original document


C.

A computer-generated record


D.

Information gathered through the witness's senses


Expert Solution
Questions # 27:

Which of the following registry hives contains information about all users who have logged on to the system?

Options:

A.

HKEY_CLASSES_ROOT


B.

HKEY_CURRENT_USERS


C.

HKEY_USERS


D.

HKEY_CURRENT_CONFIG


Expert Solution
Questions # 28:

You want to change the attribute of a file named ACE.TXT to Hidden. Which command line will enable you to set the attribute?

Options:

A.

ATTRIB ACE.TXT -H


B.

ATTRIB ACE.TXT /HR


C.

ATTRIB ACE.TXT +H


D.

ATTRIB ACE.TXT /H


Expert Solution
Questions # 29:

You work as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. You are creating a user account by using the USERADD command. Which of the following entries cannot be used for specifying a user ID?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

0


B.

99


C.

100


D.

-1


Expert Solution
Questions # 30:

In which of the following security tests does the security testing team simulate as an employee or other person with an authorized connection to the organization's network?

Options:

A.

Remote network


B.

Remote dial-up network


C.

Stolen equipment


D.

Local network


Expert Solution
Viewing page 3 out of 10 pages
Viewing questions 21-30 out of questions