Pass the GIAC Forensics GCFA Questions and answers with CertsForce

Viewing page 9 out of 10 pages
Viewing questions 81-90 out of questions
Questions # 81:

Which of the following modules of OS X kernel (XNU) provides the primary system program interface?

Options:

A.

BSD


B.

LIBKERN


C.

I/O Toolkit


D.

Mach


Expert Solution
Questions # 82:

Adam works as a Computer Hacking Forensic Investigator for a garment company in the United States. A project has been assigned to him to investigate a case of a disloyal employee who is suspected of stealing design of the garments, which belongs to the company and selling those garments of the same design under different brand name. Adam investigated that the company does not have any policy related to the copy of design of the garments. He also investigated that the trademark under which the employee is selling the garments is almost identical to the original trademark of the company. On the grounds of which of the following laws can the employee be prosecuted?

Options:

A.

Trademark law


B.

Cyber law


C.

Copyright law


D.

Espionage law


Expert Solution
Questions # 83:

Adam works as a professional Computer Hacking Forensic Investigator. He has been assigned with the project of investigating an iPod, which is suspected to contain some explicit material. Adam wants to connect the compromised iPod to his system, which is running on Windows XP (SP2) operating system. He doubts that connecting the iPod with his computer may change some evidences and settings in the iPod. He wants to set the iPod to read-only mode. This can be done by changing the registry key within the Windows XP (SP2) operating system. Which of the following registry keys will Adam change to accomplish the task?

Options:

A.

HKEY_LOCAL_MACHINE\System\CurrentControlset\Control\StorageDevicePolicies


B.

HKEY_LOCAL_MACHINE\CurrentControlset\Control\StorageDevicePolicies


C.

HKEY_LOCAL_MACHINE\System\CurrentControlset\StorageDevicePolicies


D.

HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion


Expert Solution
Questions # 84:

Which of the following are the primary goals of the incident handling team?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Prevent any further damage.


B.

Freeze the scene.


C.

Repair any damage caused by an incident.


D.

Inform higher authorities.


Expert Solution
Questions # 85:

The MBR of a hard disk is a collection of boot records that contain disk information such as disk architecture, cluster size, and so on. The main work of the MBR is to locate and run necessary operating system files that are required to run a hard disk. In the context of the operating system, MBR is also known as the boot loader. Which of the following viruses can infect the MBR of a hard disk?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Stealth


B.

Boot sector


C.

Multipartite


D.

File


Expert Solution
Questions # 86:

Identify the port in the image given below, which can be connected to the hub to extend the number of ports, and up to 127 devices can be connected to it?

Question # 86


Expert Solution
Questions # 87:

Maria works as a professional Ethical Hacker. She recently got a project to test the security of www.we-are-secure.com. Arrange the three pre-test phases of the attack to test the security of weare-secure.

Question # 87

Options:

A.

Expert Solution
Questions # 88:

Which of the following prevents malicious programs from attacking a system?

Options:

A.

Anti-virus program


B.

Smart cards


C.

Biometric devices


D.

Firewall


Expert Solution
Questions # 89:

You are working with a team that will be bringing in new computers to a sales department at a company. The sales team would like to keep not only their old files, but system settings as well on the new PC's. What should you do?

Options:

A.

Use the Disk Management tool to move everything to the new computer.


B.

Copy the files and the Windows Registry to a removable media then copy it onto the new machines.


C.

Do a system backup (complete) on each old machine, then restore it onto the new machines


D.

Use the User State Migration tool to move the system settings and files to the new machines.


Expert Solution
Questions # 90:

Which of the following parameters is NOT used for calculating the capacity of the hard disk?

Options:

A.

Bytes per sector


B.

Number of heads


C.

Total number of sectors


D.

Number of platters


Expert Solution
Viewing page 9 out of 10 pages
Viewing questions 81-90 out of questions