Which of the following switches is used with Pslist command on the command line to show the statistics for all active threads on the system, grouping these threads with their owning process?
A. Pslist -m
B. Pslist -d
C. Pslist -x
D. Pslist -t
Based on the case study, to implement more security, which of the following additional technologies should you implement for laptop computers?
(Click the Exhibit button on the toolbar to see the case study.)
Each correct answer represents a complete solution. Choose two.
A. PAP authentication
B. Encrypting File System (EFS)
C. Digital certificates
D. Two-factor authentication
E. Encrypted Data Transmissions
Which of the following registry hives stores information about the file extensions that are mapped to their corresponding applications?
A. HKEY_CURRENT_USER
B. HKEY_USERS
C. HKEY_CLASSES_ROOT
D. HKEY_LOCAL_MACHINE
An organization wants to mitigate the risks associated with the lost or stolen laptops and the associated disclosure laws, while reporting data breaches. Which of the following solutions will be best for the organization?
A. Hashing function
B. Digital signature
C. Trusted Platform Module
D. Whole disk encryption
Which of the following cryptographic methods are used in EnCase to ensure the integrity of the data, which is acquired for the investigation? Each correct answer represents a complete solution. Choose two.
A. MD5
B. CRC
C. HAVAL
D. Twofish
Which of the following fsck commands will you use to check all filesystems listed in /etc/fstab?
A. fsck -f
B. fsck -P
C. fsck -A
D. fsck -y
Which of the following switches of the XCOPY command copies file ownerships and NTFS permissions on files while copying the files?
A. /r
B. /p
C. /s
D. /o
Which of the following sections of United States Economic Espionage Act of 1996 criminalizes the misappropriation of trade secrets related to or included in a product that is produced for or placed in interstate commerce, with the knowledge or intent that the misappropriation will injure the owner of the trade secret?
A. Title 18, U.S.C. 1839
B. Title 18, U.S.C. 1832
C. Title 18, U.S.C. 1831
D. Title 18, U.S.C. 1834
Which of the following statements about the NTDETECT.COM file is true? Each correct answer represents a complete solution. Choose three.
A. It is used to gather information about currently installed hardware on the computer.
B. It is a startup file of the Windows NT/2000 operating system.
C. It is located in the root of the startup disk.
D. It is used to dual-boot a computer.
Which of the following can be monitored by using the host intrusion detection system (HIDS)? Each correct answer represents a complete solution. Choose two.
A. Computer performance
B. System files
C. File system integrity
D. Storage space on computers
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only GIAC exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your GCFA exam preparations and GIAC certification application, do not hesitate to visit our Vcedump.com to find your solutions here.