[Free] 2017(Sep) EnsurePass Testinsides GIAC GCFA Dumps with VCE and PDF 11-20

Ensurepass.com : Ensure you pass the IT Exams
2017 Sep GIAC Official New Released GCFA
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/GCFA.html

GIACCertified Forensics Analyst

Question No: 11 – (Topic 1)

Which of the following evidences are the collection of facts that, when considered together, can be used to infer a conclusion about the malicious activity/person?

  1. Corroborating

  2. Circumstantial

  3. Incontrovertible

  4. Direct

Answer: B

Question No: 12 – (Topic 1)

Mark works as a security manager for SofTech Inc. He is using a technique for monitoring what the employees are doing with corporate resources. Which of the following techniques is being used by Mark to gather evidence of an ongoing computer crime if a member of the staff is e-mailing company#39;s secrets to an opponent?

  1. Electronic surveillance

  2. Civil investigation

  3. Physical surveillance

  4. Criminal investigation

Answer: A

Question No: 13 – (Topic 1)

Peter works as a Technical Representative in a CSIRT for SecureEnet Inc. His team is called to investigate the computer of an employee, who is suspected for classified data theft. Suspect#39;s computer runs on Windows operating system. Peter wants to collect data and evidences for further analysis. He knows that in Windows operating system, the data is searched in pre-defined steps for proper and efficient analysis. Which of the following is the correct order for searching data on a Windows based system?

  1. Volatile data, file slack, registry, memory dumps, file system, system state backup, internet traces

  2. Volatile data, file slack, registry, system state backup, internet traces, file system, memory dumps

  3. Volatile data, file slack, internet traces, registry, memory dumps, system state backup, file system

  4. Volatile data, file slack, file system, registry, memory dumps, system state backup, internet traces

Answer: D

Question No: 14 – (Topic 1)

Peter works as a Computer Hacking Forensic Investigator. He has been called by an organization to conduct a seminar to give necessary information related to sexual harassment within the work place. Peter started with the definition and types of sexual harassment. He then wants to convey that it is important that records of the sexual harassment incidents should be maintained, which helps in further legal prosecution. Which of the following data should be recorded in this documentation?

Each correct answer represents a complete solution. Choose all that apply.

  1. Names of the victims

  2. Date and time of incident

  3. Nature of harassment

  4. Location of each incident

Answer: A,B,D

Question No: 15 – (Topic 1)

Which of the following is a type of intruder detection that involves logging network events to a file for an administrator to review later?

  1. Packet detection

  2. Passive detection

  3. Active detection

  4. Event detection

Answer: B

Question No: 16 – (Topic 1)

In which of the following access control models can a user not grant permissions to other users to see a copy of an object marked as secret that he has received, unless they have the appropriate permissions?

  1. Discretionary Access Control (DAC)

  2. Access Control List (ACL)

  3. Mandatory Access Control (MAC)

  4. Role Based Access Control (RBAC)

Answer: C

Question No: 17 – (Topic 1)

You work as a Network Administrator for Web World Inc. You want to host an e-commerce

Web site on your network. You want to ensure that storage of credit card information is secure. Which of the following conditions should be met to accomplish this?

Each correct answer represents a complete solution. Choose all that apply.

  1. NT authentication should be required for all customers before they provide their credit card numbers.

  2. Strong encryption software should be used to store credit card information.

  3. Only authorized access should be allowed to credit card information.

  4. The NTFS file system should be implemented on a client computer.

Answer: B,C

Question No: 18 – (Topic 1)

Nathan works as a professional Ethical Hacker. He wants to see all open TCP/IP and UDP ports of his computer. Nathan uses the netstat command for this purpose but he is still unable to map open ports to the running process with PID, process name, and path. Which of the following commands will Nathan use to accomplish the task?

  1. ping

  2. Psloggedon

  3. Pslist

  4. fport

Answer: D

Question No: 19 – (Topic 1)

A firewall is a combination of hardware and software, used to provide security to a network. It is used to protect an internal network or intranet against unauthorized access from the Internet or other outside networks. It restricts inbound and outbound access and can analyze all traffic between an internal network and the Internet. Users can configure a firewall to pass or block packets from specific IP addresses and ports. Which of the following tools works as a firewall for the Linux 2.4 kernel?

  1. OpenSSH

  2. IPTables

  3. IPChains

  4. Stunnel

Answer: B

Question No: 20 – (Topic 1)

Adam works as a Computer Hacking Forensic Investigator for a garment company in the United States. A project has been assigned to him to investigate a case of a disloyal employee who is suspected of stealing design of the garments, which belongs to the company and selling those garments of the same design under different brand name.

Adam investigated that the company does not have any policy related to the copy of design of the garments. He also investigated that the trademark under which the employee is selling the garments is almost identical to the original trademark of the company. On the grounds of which of the following laws can the employee be prosecuted?

  1. Trademark law

  2. Cyber law

  3. Copyright law

  4. Espionage law

Answer: A

100% Ensurepass Free Download!
Download Free Demo:GCFA Demo PDF
100% Ensurepass Free Guaranteed!
Download 2017 EnsurePass GCFA Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.