[Free] 2017(Sep) EnsurePass Testinsides GIAC GCFA Dumps with VCE and PDF 161-170

Ensurepass.com : Ensure you pass the IT Exams
2017 Sep GIAC Official New Released GCFA
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/GCFA.html

GIACCertified Forensics Analyst

Question No: 161 – (Topic 2)

Which of the following NIST RA process steps has the goal to identify the potential threat- sources and compile a threat statement listing the potential threat-sources that are applicable to the IT system being evaluated?

  1. Threat Identification

  2. Vulnerability Identification

  3. Impact Analysis

  4. Control Analysis

Answer: A

Question No: 162 – (Topic 2)

John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. Which of the following commands will John use to display information about all mounted file systems?

Each correct answer represents a complete solution. Choose all that apply.

  1. du

  2. ls

  3. df

  4. df -m

Answer: C,D

Question No: 163 – (Topic 2)

Which of the following statements is NOT true about the file slack spaces in Windows operating system?

  1. File slack may contain data from the memory of the system.

  2. Large cluster size will decrease the volume of the file slack.

  3. File slack is the space, which exists between the end of the file and the end of the last cluster.

  4. It is possible to find user names, passwords, and other important information in slack.

Answer: B

Question No: 164 – (Topic 2)

Adam works as a Computer Hacking Forensic Investigator. He has been assigned a project to

investigate child pornography. As the first step, Adam found that the accused is using a Peer-to-peer application to network different computers together over the internet and sharing pornographic materials of children with others. Which of the following are Peer-to- Peer applications?

Each correct answer represents a complete solution. Choose all that apply.

  1. Gnutella

  2. Kismet

  3. Hamachi

  4. Freenet

Answer: A,C,D

Question No: 165 – (Topic 2)

Mark works as a Network administrator for SecureEnet Inc. His system runs on Mac OS X. He wants to boot his system from the Network Interface Controller (NIC). Which of the following snag keys will Mark use to perform the required function?

  1. N

  2. D

  3. C

  4. Z

Answer: A

Question No: 166 – (Topic 2)

Which of the following command line tools are available in Helix Live acquisition tool on Windows?

Each correct answer represents a complete solution. Choose all that apply.

  1. .cab extractors

  2. ipconfig

  3. netstat

  4. whois

Answer: A,B,C

Question No: 167 – (Topic 2)

Brutus is a password cracking tool that can be used to crack the following authentications: HTTP (Basic Authentication)

HTTP (HTML Form/CGI)

POP3 (Post Office Protocol v3) FTP (File Transfer Protocol) SMB (Server Message Block) Telnet

Which of the following attacks can be performed by Brutus for password cracking? Each correct answer represents a complete solution. Choose all that apply.

  1. Replay attack

  2. Dictionary attack

  3. Man-in-the-middle attack

  4. Hybrid attack

  5. Brute force attack

Answer: B,D,E

Question No: 168 – (Topic 2)

Which of the following tools is used to extract human understandable interpretation from the computer binary files?

  1. FTK Imager

  2. Word Extractor

  3. FAU

  4. Galleta

Answer: B

Question No: 169 – (Topic 2)

Which of the following hardware devices prevents broadcasts from crossing over subnets?

  1. Bridge

  2. Hub

  3. Modem

  4. Router

Answer: D

Question No: 170 – (Topic 2)

Your network has a Windows 2000 Server computer with FAT file system, shared by several users.

This system stores sensitive data. You decide to encrypt this data to protect it from unauthorized access. You want to accomplish the following goals:

Data should be secure and encrypted.

Administrative efforts should be minimum.

You should have the ability to recover encrypted files in case the file owner leaves the company.

Other permissions on encrypted files should be unaffected. File-level security is required on the disk where data is stored.

Encrypting or decrypting of files should not be the responsibility of the file owner. You take the following steps to accomplish these goals :

Convert the FAT file system to Windows 2000 NTFS file system. Use Encrypting File System (EFS) to encrypt data.

Which of the following goals will you be able to accomplish?

Each correct answer represents a complete solution. Choose all that apply.

  1. File-level security is available on the disk where data is stored.

  2. You have the ability to recover encrypted files in case the file owner leaves the company.

  3. Encrypting or decrypting of files is no longer the responsibility of the file owner.

  4. Data are secured and encrypted.

  5. Administrative efforts are minimum.

  6. Other permissions on encrypted files are unaffected.

Answer: A,B,C,D,E,F

100% Ensurepass Free Download!
Download Free Demo:GCFA Demo PDF
100% Ensurepass Free Guaranteed!
Download 2017 EnsurePass GCFA Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.