Exam Details

  • Exam Code
    :GCFA
  • Exam Name
    :GIAC Certified Forensics Analyst
  • Certification
    :GIAC Information Security
  • Vendor
    :GIAC
  • Total Questions
    :318 Q&As
  • Last Updated
    :May 14, 2024

GIAC GIAC Information Security GCFA Questions & Answers

  • Question 31:

    Which of the following types of attack can guess a hashed password?

    A. Denial of Service attack

    B. Evasion attack

    C. Brute force attack

    D. Teardrop attack

  • Question 32:

    John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. He enters the following command on the Linux terminal:

    chmod 741 secure.c

    Considering the above scenario, which of the following statements are true?

    Each correct answer represents a complete solution. Choose all that apply.

    A. By the octal representation of the file access permission, John is restricting the group members to only read the secure.c file.

    B. The textual representation of the file access permission of 741 will be -rwxr--rw-.

    C. John is restricting a guest to only write or execute the secure.c file.

    D. John is providing all rights to the owner of the file.

  • Question 33:

    You work as a Network Administrator for Net World International. Rick, a Sales Manager, complains that his Windows 98 computer is not displaying the taskbar. You reboot his computer and find that the taskbar is still missing. How will you resolve the issue?

    A. Replace WIN.INI from backup.

    B. Copy the registry from backup.

    C. Use Registry Editor to delete the following registry key: HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionExplorerStuckRects

    D. Reinstall Windows 98 on Rick's computer.

  • Question 34:

    Which of the following files in LILO booting process of Linux operating system stores the location of Kernel on the hard drive?

    A. /boot/map

    B. /boot/boot.b

    C. /etc/lilo.conf

    D. /sbin/lilo

  • Question 35:

    Joseph works as a Software Developer for WebTech Inc. He wants to protect the algorithms and the techniques of programming that he uses in developing an application. Which of the following laws are used to protect a part of software?

    A. Trademark laws

    B. Code Security law

    C. Patent laws

    D. Copyright laws

  • Question 36:

    What is the name of the Secondary IDE slave, fourth partition in Linux operating system according to the Linux naming convention?

    A. SDB3

    B. HDC4

    C. HDA4

    D. HDD4

  • Question 37:

    John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. He wants to forward all the kernel messages to the remote host having IP address 192.168.0.1. Which of the following changes will he perform in the syslog.conf file to accomplish the task?

    A. kern.* @192.168.0.1

    B. !*.* @192.168.0.1

    C. *.* @192.168.0.1

    D. !kern.* @192.168.0.1

  • Question 38:

    You use the FAT16 file system on your Windows 98 computer. You want to upgrade to the FAT32 file system. What is the advantage of the FAT32 file system over FAT16 file system?

    Each correct answer represents a complete solution. Choose two.

    A. It allocates disk space more efficiently.

    B. On startup failure, you can start the computer by using an MS-DOS or Windows 95 bootable floppy disk.

    C. It uses larger cluster sizes.

    D. It supports drives up to 2 terabytes (TB) in size.

  • Question 39:

    John works as a professional Ethical Hacker. He is assigned a project to test the security of www.weare-secure.com. He enters a single quote in the input field of the login page of the We- are-secure Web site and receives the following error message:

    Microsoft OLE DB Provider for ODBC Drivers error '0x80040E14'

    This error message shows that the We-are-secure Website is vulnerable to .

    A. An XSS attack

    B. A SQL injection attack

    C. A Denial-of-Service attack

    D. A buffer overflow

  • Question 40:

    Which of the following is NOT an example of passive footprinting?

    A. Querying the search engine.

    B. Analyzing job requirements.

    C. Scanning ports.

    D. Performing the whois query.

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only GIAC exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your GCFA exam preparations and GIAC certification application, do not hesitate to visit our Vcedump.com to find your solutions here.