Exam Details

  • Exam Code
    :GCFA
  • Exam Name
    :GIAC Certified Forensics Analyst
  • Certification
    :GIAC Information Security
  • Vendor
    :GIAC
  • Total Questions
    :318 Q&As
  • Last Updated
    :May 14, 2024

GIAC GIAC Information Security GCFA Questions & Answers

  • Question 301:

    Mark works as a security manager for SofTech Inc. He is using a technique for monitoring what the employees are doing with corporate resources. Which of the following techniques is being used by Mark to gather evidence of an ongoing computer crime if a member of the staff is e- mailing company's secrets to an opponent?

    A. Electronic surveillance

    B. Civil investigation

    C. Physical surveillance

    D. Criminal investigation

  • Question 302:

    Which of the following is the first computer virus that was used to infect the boot sector of storage media formatted with the DOS File Allocation Table (FAT) file system?

    A. Melissa

    B. Tequila

    C. Brain

    D. I love you

  • Question 303:

    Which of the following attacks saturates network resources and disrupts services to a specific computer?

    A. Teardrop attack

    B. Polymorphic shell code attack

    C. Denial-of-Service (DoS) attack

    D. Replay attack

  • Question 304:

    Adam, a malicious hacker has successfully gained unauthorized access to the Linux system of Umbrella Inc. Web server of the company runs on Apache. He has downloaded sensitive documents and database files from the computer. After performing these malicious tasks, Adam finally runs the following command on the Linux command box before disconnecting. for (( i = 0;i<11;i++ )); do dd if=/dev/random of=/dev/hda andand dd if=/dev/zero of=/dev/hda done

    Which of the following actions does Adam want to perform by the above command?

    A. Making a bit stream copy of the entire hard disk for later download.

    B. Deleting all log files present on the system.

    C. Wiping the contents of the hard disk with zeros.

    D. Infecting the hard disk with polymorphic virus strings.

  • Question 305:

    Adam works as a Computer Hacking Forensic Investigator for a garment company in the United States. A project has been assigned to him to investigate a case of a disloyal employee who is suspected of stealing design of the garments, which belongs to the company and selling those garments of the same design under different brand name. Adam investigated that the company does not have any policy related to the copy of design of the garments. He also investigated that the trademark under which the employee is selling the garments is almost identical to the original trademark of the company. On the grounds of which of the following laws can the employee be prosecuted?

    A. Trademark law

    B. Cyber law

    C. Copyright law

    D. Espionage law

  • Question 306:

    You work as a Network Administrator for Perfect Solutions Inc. You install Windows 98 on a computer. By default, which of the following folders does Windows 98 setup use to keep the registry tools?

    A. $SYSTEMROOT$REGISTRY

    B. $SYSTEMROOT$WINDOWS

    C. $SYSTEMROOT$WINDOWSREGISTRY

    D. $SYSTEMROOT$WINDOWSSYSTEM32

  • Question 307:

    Which of the following tools can be used to perform tasks such as Windows password cracking, Windows enumeration, and VoIP session sniffing?

    A. John the Ripper

    B. L0phtcrack

    C. Obiwan

    D. Cain

  • Question 308:

    Which of the following type of file systems is not supported by Linux kernel?

    A. vFAT

    B. NTFS

    C. HFS

    D. FAT32

  • Question 309:

    Which of the following modules of OS X kernel (XNU) provides the primary system program interface?

    A. BSD

    B. LIBKERN

    C. I/O Toolkit

    D. Mach

  • Question 310:

    You work as a Network Administrator for Blue Bell Inc. You want to install Windows XP Professional on your computer, which already has Windows Me installed. You want to configure your computer to dual boot between Windows Me and Windows XP Professional. You have a single 40GB hard disk.

    Which of the following file systems will you choose to dual-boot between the two operating systems?

    A. NTFS

    B. FAT32

    C. CDFS

    D. FAT

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only GIAC exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your GCFA exam preparations and GIAC certification application, do not hesitate to visit our Vcedump.com to find your solutions here.