[Free] 2017(Sep) EnsurePass Testinsides GIAC GCFA Dumps with VCE and PDF 101-110

Ensurepass.com : Ensure you pass the IT Exams
2017 Sep GIAC Official New Released GCFA
100% Free Download! 100% Pass Guaranteed!

GIACCertified Forensics Analyst

Question No: 101 – (Topic 2)

Adam works as a Security Administrator for Umbrella Technology Inc. He reported a breach in security to his senior members, stating that quot;security defenses has been breached and exploited for 2 weeks by hackers.quot; The hackers had accessed and downloaded 50,000 addresses containing customer credit cards and passwords. Umbrella Technology was looking to law enforcement officials to protect their intellectual property.

The intruder entered through an employee#39;s home machine, which was connected to Umbrella Technology#39;s corporate VPN network. The application called BEAST Trojan was used in the attack to open a quot;back doorquot; allowing the hackers undetected access. The security breach was discovered when customers complained about the usage of their credit cards without their knowledge. The hackers were traced back to Shanghai, China through e-mail address evidence. The credit card information was sent to that same e-mail address. The passwords allowed the hackers to access Umbrella Technology#39;s network from a remote location, posing as employees.

Which of the following actions can Adam perform to prevent such attacks from occurring in future?

  1. Apply different security policy to make passwords of employees more complex.

  2. Replace the VPN access with dial-up modem access to the company#39;s network.

  3. Disable VPN access to all employees of the company from home machines

  4. Allow VPN access but replace the standard authentication with biometric authentication.

Answer: C

Question No: 102 – (Topic 2)

Which of the following Windows XP system files handles memory management, I/O operations, and interrupts?

  1. Ntoskrnl.exe

  2. Win32k.sys

  3. Advapi32.dll

  4. Kernel32.dll

Answer: D

Question No: 103 – (Topic 2)

Which of the following is used to store configuration settings and options on Microsoft Windows operating systems?

  1. Windows Config file

  2. Group policy editor

  3. Windows setting

  4. Windows Registry

Answer: D

Question No: 104 – (Topic 2)

You are a professional Computer Hacking forensic investigator. You have been called to collect the evidences of Buffer Overflows or Cookie snooping attack. Which of the following logs will you review to accomplish the task?

Each correct answer represents a complete solution. Choose all that apply.

  1. System logs

  2. Event logs

  3. Web server logs

  4. Program logs

Answer: A,B,D

Question No: 105 – (Topic 2)

Which of the following types of firewall functions at the Session layer of OSI model?

  1. Application-level firewall

  2. Switch-level firewall

  3. Packet filtering firewall

  4. Circuit-level firewall

Answer: D

Question No: 106 – (Topic 2)

Joseph works as a Web Designer for WebTech Inc. He creates a Web site and wants to protect it from lawsuits. Which of the following steps will he take to accomplish the task?

Each correct answer represents a part of the solution. Choose all that apply.

  1. Restrict the access to the site.

  2. Restrict shipping in certain areas.

  3. Restrict the transfer of information.

  4. Restrict customers according to their locations.

Answer: A,B,D

Question No: 107 – (Topic 2)

Allen works as a professional Computer Hacking Forensic Investigator. A project has been assigned to him to investigate a computer, which is used by the suspect to sexually harass the victim using instant messenger program. Suspect#39;s computer runs on Windows operating system. Allen wants to recover password from instant messenger program, which

suspect is using, to collect the evidence of the crime. Allen is using Helix Live for this purpose. Which of the following utilities of Helix will he use to accomplish the task?

  1. Mail Pass View

  2. MessenPass

  3. Asterisk Logger

  4. Access PassView

Answer: B

Question No: 108 – (Topic 2)

Which of the following statements are true about routers?

Each correct answer represents a complete solution. Choose all that apply.

  1. Routers organize addresses into classes, which are used to determine how to move packets from one network to another.

  2. Routers are responsible for making decisions about which of several paths network (or Internet) traffic will follow.

  3. Routers do not limit physical broadcast traffic.

  4. Routers act as protocol translators and bind dissimilar networks.

Answer: A,B,D

Question No: 109 – (Topic 2)

Which of the following statements about the HKEY_LOCAL_MACHINE registry hive is true?

  1. It contains the user profile for the user who is currently logged on to the computer.

  2. It contains information about the local computer system, including hardware and operating system data, such as bus type, system memory, device drivers, and startup control parameters.

  3. It contains configuration data for the current hardware profile.

  4. It contains data that associates file types with programs and configuration data for COM objects, Visual Basic programs, or other automation.

Answer: B

Question No: 110 – (Topic 2)

Which of the following is a password-cracking program?

  1. Netcat

  2. L0phtcrack

  3. SubSeven

  4. NetSphere

Answer: B

100% Ensurepass Free Download!
Download Free Demo:GCFA Demo PDF
100% Ensurepass Free Guaranteed!
Download 2017 EnsurePass GCFA Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.