Your Windows XP hard drive has 2 partitions. The system partition is NTFS and the other is FAT. You wish to encrypt a folder created on the system partition for the purpose of data security. Which of the following statements is true about this situation?
A. You can only encrypt files on the NTFS partition.
B. You can only encrypt files on the FAT partition.
C. Since the operating system is on the NTFS partition, you can encrypt files on both.
D. You cannot encrypt files on either partition.
Which of the following files starts the initialization process in booting sequence of the Linux operating system?
A. /etc/sbin/init
B. /etc/inittab
C. /etc/rc/rc.local
D. /etc/rc/rc.sysinit
Which of the following Linux file systems is a journaled file system?
A. ext3
B. ext4
C. ext2
D. ext
Which of the following Acts enacted in United States amends Civil Rights Act of 1964, providing technical changes affecting the length of time allowed to challenge unlawful seniority provisions, to sue the federal government for discrimination and to bring age discrimination claims?
A. Sexual Predators Act
B. Civil Rights Act of 1991
C. PROTECT Act
D. The USA Patriot Act of 2001
You work as a Forensic Investigator. Which of the following rules will you follow while working on a case? Each correct answer represents a part of the solution. Choose all that apply.
A. Prepare a chain of custody and handle the evidence carefully.
B. Examine original evidence and never rely on the duplicate evidence.
C. Never exceed the knowledge base of the forensic investigation.
D. Follow the rules of evidence and never temper with the evidence.
You work as a professional Computer Hacking Forensic Investigator. A project has been assigned to you to investigate the DoS attack on a computer network of SecureEnet Inc. Which of the following methods will you perform to accomplish the task?
Each correct answer represents a complete solution. Choose all that apply.
A. Look for unusual traffic on Internet connections and network segments.
B. Seize all computers and transfer them to the Forensic lab.
C. Look for core files or crash dumps on the affected systems.
D. Sniff network traffic to the failing machine.
You work as the Network Administrator for McNeil Inc. The company has a Unix-based network. You want to print the super block and block the group information for the filesystem present on a system. Which of the following Unix commands can you use to accomplish the task?
A. e2fsck
B. dump
C. e2label
D. dumpe2fs
Which of the following are advantages of NTFS file system over FAT32 and FAT? Each correct answer represents a part of the solution. Choose two.
A. Support for file and folder level permissions.
B. Support for audio files.
C. Support for Encrypting File System (EFS).
D. Support for dual-booting.
You want to change the attribute of a file named ACE.TXT to Hidden. Which command line will enable you to set the attribute?
A. ATTRIB ACE.TXT -H
B. ATTRIB ACE.TXT /HR
C. ATTRIB ACE.TXT +H
D. ATTRIB ACE.TXT /H
You are the Security Consultant and have been hired to check security for a client's network. Your client has stated that he has many concerns but the most critical is the security of Web applications on their Web server. What should be your highest priority then in checking his network?
A. Vulnerability scanning
B. Setting up IDS
C. Port scanning
D. Setting up a honey pot
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only GIAC exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your GCFA exam preparations and GIAC certification application, do not hesitate to visit our Vcedump.com to find your solutions here.