[Free] 2017(Sep) EnsurePass Testinsides GIAC GCFA Dumps with VCE and PDF 121-130

Ensurepass.com : Ensure you pass the IT Exams
2017 Sep GIAC Official New Released GCFA
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/GCFA.html

GIACCertified Forensics Analyst

Question No: 121 – (Topic 2)

You are responsible for tech support at your company. You have been instructed to make certain that all desktops support file and folder encryption. Which file system should you use when installing Windows XP?

  1. FAT

  2. EXT4

  3. FAT32

  4. NTFS

Answer: D

Question No: 122 – (Topic 2)

John works as a professional Ethical Hacker. He has been assigned the task of testing the security of www.we-are-secure.com. He has performed the footprinting step and now he has enough information to begin scanning in order to detect active computers. He sends a ping request to a computer using ICMP type 13. What kind of ICMP message is John using to send the ICMP ping request message?

  1. Address mask request

  2. Echo request

  3. Information request (obsolete)

  4. Timestamp request (obsolete)

Answer: D

Question No: 123 – (Topic 2)

Which of the following are the benefits of information classification for an organization? Each correct answer represents a complete solution. Choose two.

  1. It ensures that modifications are not made to data by unauthorized personnel or

    processes.

  2. It helps identify which information is the most sensitive or vital to an organization.

  3. It helps reduce the Total Cost of Ownership (TCO).

  4. It helps identify which protections apply to which information.

Answer: B,D

Question No: 124 – (Topic 2)

Which of the following is used for remote file access by UNIX/Linux systems?

  1. NetWare Core Protocol (NCP)

  2. Common Internet File System (CIFS)

  3. Server Message Block (SMB)

  4. Network File System (NFS)

Answer: D

Question No: 125 – (Topic 2)

John used to work as a Network Administrator for We-are-secure Inc. Now he has resigned from the company for personal reasons. He wants to send out some secret information of the company. To do so, he takes an image file and simply uses a tool image hide and embeds the secret file within an image file of the famous actress, Jennifer Lopez, and sends it to his Yahoo mail id. Since he is using the image file to send the data, the mail server of his company is unable to filter this mail. Which of the following techniques is he performing to accomplish his task?

  1. Email spoofing

  2. Social engineering

  3. Steganography

  4. Web ripping

Answer: C

Question No: 126 – (Topic 2)

Which of the following file systems is used by both CD and DVD?

  1. Network File System (NFS)

  2. New Technology File System (NTFS)

  3. Compact Disk File System (CDFS)

  4. Universal Disk Format (UDF)

Answer: D

Question No: 127 – (Topic 2)

Victor works as a professional Ethical Hacker for SecureNet Inc. He wants to use Steganographic file system method to encrypt and hide some secret information. Which of the following disk spaces will he use to store this secret information?

Each correct answer represents a complete solution. Choose all that apply.

  1. Hidden partition

  2. Slack space

  3. Dumb space

  4. Unused Sectors

Answer: A,B,D

Question No: 128 – (Topic 2)

You want to retrieve information whether your system is in promiscuous mode or not. Which of the following commands will you use?

Each correct answer represents a complete solution. Choose all that apply.

  1. grep Promisc /var/log/messages

  2. ip link

  3. ifconfig | grep PROMISC

  4. show promisc

Answer: A,B,C

Question No: 129 – (Topic 2)

Which of the following tools is used to block email, Instant Message, Web site, or other media if inappropriate words such as pornography, violence etc. is used?

  1. iProtect

  2. Reveal

  3. iProtectYou

  4. Child Exploitation Tracking System

Answer: C

Question No: 130 – (Topic 2)

Which of the following Windows Registry key contains the password file of the user?

  1. HKEY_USER

  2. HKEY_CURRENT_CONFIG

  3. HKEY_DYN_DATA

  4. HKEY_LOCAL_MACHINE

Answer: D

100% Ensurepass Free Download!
Download Free Demo:GCFA Demo PDF
100% Ensurepass Free Guaranteed!
Download 2017 EnsurePass GCFA Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.