Pass the GIAC Forensics GCFA Questions and answers with CertsForce

Viewing page 5 out of 10 pages
Viewing questions 41-50 out of questions
Questions # 41:

Which of the following NIST RA process steps has the goal to identify the potential threat-sources and compile a threat statement listing the potential threat-sources that are applicable to the IT system being evaluated?

Options:

A.

Threat Identification


B.

Vulnerability Identification


C.

Impact Analysis


D.

Control Analysis


Expert Solution
Questions # 42:

Sandra wants to create a full system state backup of her computer, which is running on Microsoft Windows XP operating system. Which of the following is saved in full state system backup?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

file system information


B.

Registry


C.

Windows boot files


D.

Active Directory (NTDS)


Expert Solution
Questions # 43:

You are responsible for tech support at your company. You have been instructed to make certain that all desktops support file and folder encryption. Which file system should you use when installing Windows XP?

Options:

A.

FAT


B.

EXT4


C.

FAT32


D.

NTFS


Expert Solution
Questions # 44:

Which utility enables you to access files from a Windows .CAB file?

Options:

A.

ACCESS.EXE


B.

WINZIP.EXE


C.

XCOPY.EXE


D.

EXTRACT.EXE


Expert Solution
Questions # 45:

Joseph works as a Web Designer for WebTech Inc. He creates a Web site and wants to protect it from lawsuits. Which of the following steps will he take to accomplish the task?

Each correct answer represents a part of the solution. Choose all that apply.

Options:

A.

Restrict the access to the site.


B.

Restrict shipping in certain areas.


C.

Restrict the transfer of information.


D.

Restrict customers according to their locations.


Expert Solution
Questions # 46:

Which of the following enables an inventor to legally enforce his right to exclude others from using his invention?

Options:

A.

Artistic license


B.

Phishing


C.

Spam


D.

Patent


Expert Solution
Questions # 47:

You are a professional Computer Hacking forensic investigator. You have been called to collect the evidences of Buffer Overflows or Cookie snooping attack. Which of the following logs will you review to accomplish the task?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

System logs


B.

Event logs


C.

Web server logs


D.

Program logs


Expert Solution
Questions # 48:

You are the Security Consultant and have been contacted by a client regarding their encryption and hashing algorithms. Their in-house network administrator tells you that their current hashing algorithm is an older one with known weaknesses and is not collision resistant. Which algorithm are they most likely using for hashing?

Options:

A.

SHA


B.

MD5


C.

PKI


D.

Kerberos


Expert Solution
Questions # 49:

Mark has been hired by a company to work as a Network Assistant. He is assigned the task to

configure a dial-up connection. He is configuring a laptop. Which of the following protocols should he disable to ensure that the password is encrypted during remote access?

Options:

A.

MSCHAP


B.

SPAP


C.

MSCHAP V2


D.

PAP


Expert Solution
Questions # 50:

You work as the Network Administrator for McNeil Inc. The company has a Unix-based network. You want to run a command that forces all the unwritten blocks in the buffer cache to be written to the disk. Which of the following Unix commands can you use to accomplish the task?

Options:

A.

tune2fs


B.

sync


C.

swapoff


D.

swapon


Expert Solution
Viewing page 5 out of 10 pages
Viewing questions 41-50 out of questions