Exam Details

  • Exam Code
    :GCFA
  • Exam Name
    :GIAC Certified Forensics Analyst
  • Certification
    :GIAC Information Security
  • Vendor
    :GIAC
  • Total Questions
    :318 Q&As
  • Last Updated
    :May 14, 2024

GIAC GIAC Information Security GCFA Questions & Answers

  • Question 11:

    Which of the following file attributes are not available on a FAT32 partition?

    Each correct answer represents a complete solution. Choose two.

    A. Compression

    B. Encryption

    C. Read Only

    D. Hidden

    E. Archive

  • Question 12:

    Which of the following statutes is enacted in the U.S., which prohibits creditors from collecting data from applicants, such as national origin, caste, religion etc?

    A. The Electronic Communications Privacy Act

    B. The Privacy Act

    C. The Fair Credit Reporting Act (FCRA)

    D. The Equal Credit Opportunity Act (ECOA)

  • Question 13:

    Which of the following articles defines illegal access to the computer or network in Chapter 2 of Section 1, i.e., Substantive criminal law of the Convention on Cybercrime passed by the Council of Europe?

    A. Article 2

    B. Article 5

    C. Article 16

    D. Article 3

  • Question 14:

    Which of the following is included in a memory dump file?

    A. Security ID

    B. List of loaded drivers

    C. The kernel-mode call stack for the thread that stopped the process from execution

    D. Stop message and its parameters

  • Question 15:

    Which of the following are the two different file formats in which Microsoft Outlook saves e-mail messages based on system configuration?

    Each correct answer represents a complete solution. Choose two.

    A. .pst

    B. .xst

    C. .txt

    D. .ost

  • Question 16:

    You work as a Network Administrator for NetTech Inc. The company's network is connected to the Internet. For security, you want to restrict unauthorized access to the network with minimum administrative effort. You want to implement a hardware-based solution. What will you do to accomplish this?

    A. Connect a brouter to the network.

    B. Implement firewall on the network.

    C. Connect a router to the network.

    D. Implement a proxy server on the network.

  • Question 17:

    Which of the following methods can be used to start the Disk Defragmenter utility in Windows 9x? Each correct answer represents a complete solution. Choose two.

    A. From Start menu > Programs > Accessories > System Tools, click Disk Defragmenter.

    B. From Start menu > Programs > Windows Explorer, right-click on the drive to be defragmented > click Properties in the popup menu > Tools tab, then click the Defragment Now button.

    C. From Start menu > Programs > Windows Explorer, right-click on the drive to be defragmented, then click the Disk Defragmenter in the popup window.

    D. From Start menu > Programs, click Disk Defragmenter.

  • Question 18:

    Which two technologies should research groups use for secure VPN access while traveling? (Click the Exhibit button on the toolbar to see the case study.)

    Each correct answer represents a complete solution. Choose two.

    A. SSL

    B. PPTP

    C. Encrypting File System (EFS)

    D. Kerberos authentication

    E. Smart cards

  • Question 19:

    You work as a Network Administrator for Blue Well Inc. Your company's network has a Windows 2000 server with the FAT file system. This server stores sensitive data. You want to encrypt this data to protect it from unauthorized access. You

    also have to accomplish the following goals:

    Data should be encrypted and secure.

    Administrative effort should be minimum.

    You should have the ability to recover encrypted files in case the file owner leaves the company.

    Other permissions on encrypted files should be unaffected.

    File-level security is required on the disk where data is stored.

    Encryption or decryption of files should not be the responsibility of the file owner.

    You take the following steps to accomplish these goals:

    Convert the FAT file system to NTFS file system.

    Use third-party data encryption software.

    What will happen after taking these steps?

    Each correct answer represents a complete solution. Choose all that apply.

    A. File-level security will be available on the disk where data is stored.

    B. Data will be encrypted and secure.

    C. Encryption or decryption of files will no longer be the responsibility of the file owner.

    D. Other permissions on encrypted files will remain unaffected.

    E. Administrative effort will be minimum.

  • Question 20:

    Which of the following types of virus makes changes to a file system of a disk?

    A. Master boot record virus

    B. Stealth virus

    C. Cluster virus

    D. Macro virus

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only GIAC exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your GCFA exam preparations and GIAC certification application, do not hesitate to visit our Vcedump.com to find your solutions here.