Pass the GIAC Forensics GCFA Questions and answers with CertsForce

Viewing page 4 out of 10 pages
Viewing questions 31-40 out of questions
Questions # 31:

Which of the following statements about SD cards are true?

Each correct answer represents a complete solution. Choose two.

Options:

A.

It is used with mobile phones and digital cameras.


B.

It is a type of non-volatile memory card.


C.

It is a 184-pin memory module.


D.

It is used as RAM on client computers and servers.


Expert Solution
Questions # 32:

Which of the following commands is used to enforce checking of a file system even if the file system seems to be clean?

Options:

A.

e2fsck -f


B.

e2fsck -p


C.

e2fsck -b


D.

e2fsck -c


Expert Solution
Questions # 33:

John used to work as a Network Administrator for We-are-secure Inc. Now he has resigned from the company for personal reasons. He wants to send out some secret information of the company. To do so, he takes an image file and simply uses a tool image hide and embeds the secret file within an image file of the famous actress, Jennifer Lopez, and sends it to his Yahoo mail id. Since he is using the image file to send the data, the mail server of his company is unable to filter this mail. Which of the following techniques is he performing to accomplish his task?

Options:

A.

Email spoofing


B.

Social engineering


C.

Steganography


D.

Web ripping


Expert Solution
Questions # 34:

Which of the following anti-child pornography organizations helps local communities to create

programs and develop strategies to investigate child exploitation?

Options:

A.

Anti-Child Porn.org


B.

Project Safe Childhood (PSC)


C.

Innocent Images National Imitative (IINI)


D.

Internet Crimes Against Children (ICAC)


Expert Solution
Questions # 35:

Which of the following U.S. Federal laws addresses computer crime activities in communication lines, stations, or systems?

Options:

A.

18 U.S.C. 1030


B.

18 U.S.C. 1362


C.

18 U.S.C. 2701


D.

18 U.S.C. 2510


E.

18 U.S.C. 1029


Expert Solution
Questions # 36:

Which of the following is a password-cracking program?

Options:

A.

Netcat


B.

L0phtcrack


C.

SubSeven


D.

NetSphere


Expert Solution
Questions # 37:

John is a black hat hacker. FBI arrested him while performing some email scams. Under which of the following US laws will john be charged?

Options:

A.

18 U.S.C. 2701


B.

18 U.S.C. 1030


C.

18 U.S.C. 1362


D.

18 U.S.C. 2510


Expert Solution
Questions # 38:

Which of the following Windows XP system files handles memory management, I/O operations, and interrupts?

Options:

A.

Ntoskrnl.exe


B.

Win32k.sys


C.

Advapi32.dll


D.

Kernel32.dll


Expert Solution
Questions # 39:

Which of the following tools is used to locate lost files and partitions to restore data from a formatted, damaged, or lost partition in Windows and Apple Macintosh computers?

Options:

A.

Easy-Undelete


B.

File Scavenger


C.

Recover4all Professional


D.

VirtualLab


Expert Solution
Questions # 40:

Which of the following Windows Registry key contains the password file of the user?

Options:

A.

HKEY_USER


B.

HKEY_CURRENT_CONFIG


C.

HKEY_DYN_DATA


D.

HKEY_LOCAL_MACHINE


Expert Solution
Viewing page 4 out of 10 pages
Viewing questions 31-40 out of questions