[Free] 2017(Sep) EnsurePass Testinsides GIAC GCFA Dumps with VCE and PDF 171-180

Ensurepass.com : Ensure you pass the IT Exams
2017 Sep GIAC Official New Released GCFA
100% Free Download! 100% Pass Guaranteed!

GIACCertified Forensics Analyst

Question No: 171 – (Topic 2)

Which of the following protocols allows computers on different operating systems to share files and disk storage?

  1. Domain Name System (DNS)

  2. Network File System (NFS)

  3. Trivial File Transfer Protocol (TFTP)

  4. Simple Network Management Protocol (SNMP)

Answer: B

Question No: 172 – (Topic 2)

Which of the following statements are true about Compact Disc (CD) and Digital Versatile Disk (DVD)?

Each correct answer represents a complete solution. Choose all that apply.

  1. CDs and DVDs are affected by EMP from nuclear detonations.

  2. Data is encoded in the form of tiny pits on the surface of the CD and DVD.

  3. CDs and DVDs are not affected by X-rays, and other sources of electromagnetic radiation.

  4. It takes a small amount of energy to affect the data that written on CD and DVD.

Answer: B,D

Question No: 173 – (Topic 2)

John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. He wants to test the effect of a virus on the We-are- secure server. He injects the virus on the server and, as a result, the server becomes infected with the virus even though an established antivirus program is installed on the server. Which of the following do you think are the reasons why the antivirus installed on the server did not detect the virus injected by John?

Each correct answer represents a complete solution. Choose all that apply.

  1. The mutation engine of the virus is generating a new encrypted code.

  2. The virus, used by John, is not in the database of the antivirus program installed on the server.

  3. John has created a new virus.

  4. John has changed the signature of the virus.

Answer: A,B,C,D

Question No: 174 – (Topic 2)

You are the Security Consultant and have been contacted by a client regarding their encryption and hashing algorithms. Their in-house network administrator tells you that their current hashing algorithm is an older one with known weaknesses and is not collision resistant. Which algorithm are they most likely using for hashing?

  1. SHA

  2. MD5

  3. PKI

  4. Kerberos

Answer: B

Question No: 175 – (Topic 2)

Which of the following graphical tools is used to navigate through directory structures?

  1. Disk Cleanup

  2. System Information

  3. Disk Management

  4. Windows Explorer

Answer: D

Question No: 176 – (Topic 2)

An attacker attempts to gain information about a network by specifically targeting the network resources and applications running on a computer. This method for gaining information is known as .

  1. Notification

  2. Scanning

  3. Enumeration

  4. Sensor

  5. Footprinting

  6. Passive response

Answer: C

Question No: 177 – (Topic 2)

Which of the following Incident handling process phases is responsible for defining rules, collaborating human workforce, creating a back-up plan, and testing the plans for an enterprise?

  1. Recovery phase

  2. Eradication phase

  3. Identification phase

  4. Containment phase

  5. Preparation phase

Answer: E

Question No: 178 – (Topic 2)

Which of the following tools is used to restore deleted files from Linux and Mac OS X file system?

  1. Easy-Undelete

  2. Active@ UNERASER

  3. Active@ UNDELETE

  4. R-Undelete

Answer: A

Question No: 179 – (Topic 2)

You work as a Network Administrator for Tech Perfect Inc. The company has a TCP/IP- based network. You are configuring a wireless LAN on the network. You experience interference on your network. Through investigation, you come to know that three foreign WAPs are within the range of your LAN. Although they have different SSIDs than yours, they are working on the same channel as yours.

Which of the following steps will you take to reduce the interference?

  1. Configure the same SSID as of the foreign networks.

  2. Install a router on your network.

  3. Change your WAP#39;s channel.

  4. Install an external antenna.

Answer: C

Question No: 180 – (Topic 2)

Mark has been hired by a company to work as a Network Assistant. He is assigned the task to

configure a dial-up connection. He is configuring a laptop. Which of the following protocols should he disable to ensure that the password is encrypted during remote access?


  2. SPAP

  3. MSCHAP V2

  4. PAP

Answer: D

100% Ensurepass Free Download!
Download Free Demo:GCFA Demo PDF
100% Ensurepass Free Guaranteed!
Download 2017 EnsurePass GCFA Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.