[Free] 2017(Sep) EnsurePass Testinsides GIAC GCFA Dumps with VCE and PDF 151-160

Ensurepass.com : Ensure you pass the IT Exams
2017 Sep GIAC Official New Released GCFA
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/GCFA.html

GIACCertified Forensics Analyst

Question No: 151 – (Topic 2)

Which of the following tools is used to locate lost files and partitions to restore data from a formatted, damaged, or lost partition in Windows and Apple Macintosh computers?

  1. Easy-Undelete

  2. File Scavenger

  3. Recover4all Professional

  4. VirtualLab

Answer: D

Question No: 152 – (Topic 2)

Adam works as a Computer Hacking Forensic Investigator in a law firm. He has been assigned with his first project. Adam collected all required evidences and clues. He is now required to write an investigative report to present before court for further prosecution of the case. He needs guidelines to write an investigative report for expressing an opinion. Which of the following are the guidelines to write an investigative report in an efficient way?

Each correct answer represents a complete solution. Choose all that apply.

  1. All ideas present in the investigative report should flow logically from facts to conclusions.

  2. There should not be any assumptions made about any facts while writing the investigative report.

  3. Opinion of a lay witness should be included in the investigative report.

  4. The investigative report should be understandable by any reader.

Answer: A,B,D

Question No: 153 – (Topic 2)

You work as a Computer Hacking Forensic Investigator for SecureNet Inc. You want to investigate Cross-Site Scripting attack on your company#39;s Website. Which of the following methods of investigation can you use to accomplish the task?

Each correct answer represents a complete solution. Choose all that apply.

  1. Review the source of any HTML-formatted e-mail messages for embedded scripts or links in the URL to the company#39;s site.

  2. Use a Web proxy to view the Web server transactions in real time and investigate any communication with outside servers.

  3. Use Wireshark to capture traffic going to the server and then searching for the requests going to the input page, which may give log of the malicious traffic and the IP address of the source.

  4. Look at the Web servers logs and normal traffic logging.

Answer: A,B,D

Question No: 154 – (Topic 2)

Which of the following uses hard disk drive space to provide extra memory for a computer?

  1. Virtual memory

  2. File system

  3. Cluster

  4. RAM

Answer: A

Question No: 155 – (Topic 2)

Adam works as a professional Computer Hacking Forensic Investigator. He has been assigned with a project to investigate a computer in the network of SecureEnet Inc. The compromised system runs on Windows operating system. Adam decides to use Helix Live for Windows to gather data and electronic evidences starting with retrieving volatile data and transferring it to server component via TCP/IP. Which of the following application software in Helix Windows Live will he use to retrieve volatile data and transfer it to the server component via TCP/IP?

  1. FSP

  2. Drive Manager

  3. FTK imager

  4. FAU

Answer: A

Question No: 156 – (Topic 2)

What is the name of the group of blocks which contains information used by the operating system in Linux system?

  1. logblock

  2. Systemblock

  3. Bootblock

  4. Superblock

Answer: D

Question No: 157 – (Topic 2)

You work as the Network Administrator for McNeil Inc. The company has a Unix-based network. You want to query an image root device and RAM disk size. Which of the following Unix commands can you use to accomplish the task?

  1. rdev

  2. mount

  3. setfdprm

  4. rdump

Answer: A

Question No: 158 – (Topic 2)

John, a novice web user, makes a new E-mail account and keeps his password as quot;applequot;, his favorite fruit. John#39;s password is vulnerable to which of the following password cracking attacks?

Each correct answer represents a complete solution. Choose all that apply.

  1. Rule based attack

  2. Brute Force attack

  3. Dictionary attack

  4. Hybrid attack

Answer: B,C,D

Question No: 159 – (Topic 2)

You work as a Network Administrator for Net World International. You want to configure a Windows 2000 computer to dual boot with Windows 98. The hard disk drive of the computer will be configured as a single partition drive. Which of the following file systems will you use to accomplish this?

  1. NTFS

  2. HPFS

  3. FAT16

  4. FAT32

Answer: D

Question No: 160 – (Topic 2)

Which of the following is the Windows feature on which the file management can be

performed by a PC user?

  1. Activity Monitor

  2. Task Manager

  3. Windows Explorer

  4. Finder

Answer: C

100% Ensurepass Free Download!
Download Free Demo:GCFA Demo PDF
100% Ensurepass Free Guaranteed!
Download 2017 EnsurePass GCFA Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.