Pass the GIAC Forensics GCFA Questions and answers with CertsForce

Viewing page 8 out of 10 pages
Viewing questions 71-80 out of questions
Questions # 71:

Which of the following types of computers is used for attracting potential intruders?

Options:

A.

Bastion host


B.

Data pot


C.

Files pot


D.

Honey pot


Expert Solution
Questions # 72:

Adam works as a professional Computer Hacking Forensic Investigator. He has been called by the FBI to examine data of the hard disk, which is seized from the house of a suspected terrorist. Adam decided to acquire an image of the suspected hard drive. He uses a forensic hardware tool, which is capable of capturing data from IDE, Serial ATA, SCSI devices, and flash cards. This tool can also produce MD5 and CRC32 hash while capturing the data. Which of the following tools is Adam using?

Options:

A.

Wipe MASSter


B.

ImageMASSter 4002i


C.

ImageMASSter Solo-3


D.

FireWire DriveDock


Expert Solution
Questions # 73:

Which of the following is the first computer virus that was used to infect the boot sector of storage media formatted with the DOS File Allocation Table (FAT) file system?

Options:

A.

Melissa


B.

Tequila


C.

Brain


D.

I love you


Expert Solution
Questions # 74:

Which of the following directories in Linux operating system contains device files, which refers to physical devices?

Options:

A.

/boot


B.

/etc


C.

/dev


D.

/bin


Expert Solution
Questions # 75:

Which of the following is the process of overwriting all addressable locations on a disk?

Options:

A.

Drive wiping


B.

Spoofing


C.

Sanitization


D.

Authentication


Expert Solution
Questions # 76:

A firewall is a combination of hardware and software, used to provide security to a network. It is used to protect an internal network or intranet against unauthorized access from the Internet or other outside networks. It restricts inbound and outbound access and can analyze all traffic between an internal network and the Internet. Users can configure a firewall to pass or block packets from specific IP addresses and ports. Which of the following tools works as a firewall for the Linux 2.4 kernel?

Options:

A.

OpenSSH


B.

IPTables


C.

IPChains


D.

Stunnel


Expert Solution
Questions # 77:

Which of the following file systems cannot be used to install an operating system on the hard disk drive?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Windows NT file system (NTFS)


B.

High Performance File System (HPFS)


C.

Log-structured file system (LFS)


D.

Compact Disc File System (CDFS)


E.

Novell Storage Services (NSS)


Expert Solution
Questions # 78:

Which of the following is a correct sequence of different layers of Open System Interconnection (OSI) model?

Options:

A.

Physical layer, data link layer, network layer, transport layer, presentation layer, session layer, and application layer


B.

application layer, presentation layer, network layer, transport layer, session layer, data link layer, and physical layer


C.

Physical layer, data link layer, network layer, transport layer, session layer, presentation layer, and application layer


D.

Physical layer, network layer, transport layer, data link layer, session layer, presentation layer, and application layer


Expert Solution
Questions # 79:

Adam works as a professional Computer Hacking Forensic Investigator with the local police of his area. A project has been assigned to him to investigate a PDA seized from a local drug dealer. It is expected that many valuable and important information are stored in this PDA. Adam follows investigative methods, which are required to perform in a pre-defined sequential manner for the successful forensic investigation of the PDA. Which of the following is the correct order to perform forensic investigation of PDA?

Options:

A.

Identification, Collection, Examination, Documentation


B.

Examination, Collection, Identification, Documentation


C.

Documentation, Examination, Identification, Collection


D.

Examination, Identification, Collection, Documentation


Expert Solution
Questions # 80:

Which of the following is a name, symbol, or slogan with which a product is identified?

Options:

A.

Trade secret


B.

Patent


C.

Copyright


D.

Trademark


Expert Solution
Viewing page 8 out of 10 pages
Viewing questions 71-80 out of questions