[Free] 2017(Sep) EnsurePass Testinsides GIAC GCFA Dumps with VCE and PDF 111-120

Ensurepass.com : Ensure you pass the IT Exams
2017 Sep GIAC Official New Released GCFA
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/GCFA.html

GIACCertified Forensics Analyst

Question No: 111 – (Topic 2)

Which of the following file systems supports disk quotas?

  1. FAT32

  2. NTFS

  3. FAT

  4. CDFS

Answer: B

Question No: 112 – (Topic 2)

Which utility enables you to access files from a Windows .CAB file?

  1. ACCESS.EXE

  2. WINZIP.EXE

  3. XCOPY.EXE

  4. EXTRACT.EXE

Answer: D

Question No: 113 – (Topic 2)

Sandra wants to create a full system state backup of her computer, which is running on Microsoft Windows XP operating system. Which of the following is saved in full state

system backup?

Each correct answer represents a complete solution. Choose all that apply.

  1. file system information

  2. Registry

  3. Windows boot files

  4. Active Directory (NTDS)

Answer: B,C,D

Question No: 114 – (Topic 2)

This type of virus infects programs that can execute and load into memory to perform predefined steps for infecting systems. It infects files with the extensions .EXE, .COM, .BIN, and .SYS. As it can replicate or destroy these types of files, the operating system becomes corrupted and needs reinstallation. This type of virus is known as .

  1. Polymorphic virus

  2. Stealth virus

  3. Boot sector virus

  4. File virus

  5. Multipartite virus

Answer: D

Question No: 115 – (Topic 2)

Adam works as a professional Computer Hacking Forensic Investigator. A project has been assigned to him to investigate and examine drive image of a compromised system, which is suspected to be used in cyber crime. Adam uses Forensic Sorter to sort the contents of hard drive in different categories. Which of the following type of image formats is NOT supported by Forensic Sorter?

  1. PFR image file

  2. iso image file

  3. RAW image file

  4. EnCase image file

Answer: B

Question No: 116 – (Topic 2)

Which of the following statements best describes the consequences of the disaster recovery plan test?

  1. If no deficiencies were found during the test, then the plan is probably perfect.

  2. The results of the test should be kept secret.

  3. The plan should not be changed no matter what the results of the test would be.

  4. If no deficiencies were found during the test, then the test was probably flawed.

Answer: D

Question No: 117 – (Topic 2)

Adam works as a professional Computer Hacking Forensic Investigator. A project has been assigned to him to investigate a compromised system of a cyber criminal, who hides some information in his computer. This computer runs on Linux operating system. Adam wants to extract the data units of a file, which is specified by its meta-data address. He is using the Sleuth Kit for this purpose. Which of the following commands in the Sleuth kit will he use to accomplish the task?

  1. dcat

  2. ifind

  3. icat

  4. istat

Answer: C

Question No: 118 – (Topic 2)

Sarah has created a site on which she publishes a copyrighted material. She is ignorant that she is infringing copyright. Is she guilty under copyright laws?

  1. Yes

  2. No

Answer: A

Question No: 119 – (Topic 2)

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He traceroutes the We-are-secure server and gets the following result:

Ensurepass 2017 PDF and VCE

Considering the above traceroute result, which of the following statements can be true? Each correct answer represents a complete solution. Choose all that apply.

  1. While tracerouting, John#39;s network connection has become slow.

  2. Some router along the path is down.

  3. The We-are-secure server is using a packet filtering firewall.

  4. The IP address of the We-are-secure server is not valid.

Answer: A,B,C

Question No: 120 – (Topic 2)

Which of the following anti-child pornography organizations helps local communities to create

programs and develop strategies to investigate child exploitation?

  1. Anti-Child Porn.org

  2. Project Safe Childhood (PSC)

  3. Innocent Images National Imitative (IINI)

  4. Internet Crimes Against Children (ICAC)

Answer: B

100% Ensurepass Free Download!
Download Free Demo:GCFA Demo PDF
100% Ensurepass Free Guaranteed!
Download 2017 EnsurePass GCFA Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.