[Free] 2017(Sep) EnsurePass Testinsides GIAC GCFA Dumps with VCE and PDF 181-190

Ensurepass.com : Ensure you pass the IT Exams
2017 Sep GIAC Official New Released GCFA
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/GCFA.html

GIACCertified Forensics Analyst

Question No: 181 – (Topic 2)

Which of the following representatives of incident response team takes forensic backups of the systems that are the focus of the incident?

  1. Technical representative

  2. Information security representative

  3. Legal representative

  4. Lead investigator

Answer: A

Question No: 182 – (Topic 2)

Which of the following password cracking attacks is based on a pre-calculated hash table to retrieve plain text passwords?

  1. Dictionary attack

  2. Rainbow attack

  3. Brute Force attack

  4. Hybrid attack

Answer: B

Question No: 183 – (Topic 2)

Which of the following registry hives stores configuration information specific to a particular user who is currently logged on to the computer?

  1. HKEY_USERS

  2. HKEY_CURRENT_USER

  3. HKEY_LOCAL_MACHINE

  4. HKEY_CLASSES_ROOT

Answer: B

Question No: 184 – (Topic 2)

Which of the following describes software technologies that improve portability, manageability, and compatibility of applications by encapsulating them from the underlying operating system on which they are executed?

  1. Group Policy

  2. System registry

  3. System control

  4. Application virtualization

Answer: D

Question No: 185 – (Topic 2)

Which of the following file systems provides integrated security?

  1. CDFS

  2. EFS

  3. HPFS

  4. FAT32

Answer: B

Question No: 186 – (Topic 2)

Convention on Cybercrime, created by the Council of Europe, is the treaty seeking to

address

Computer crime and Internet crimes by harmonizing national laws, improving investigative techniques, and increasing cooperation among nations. Which of the following chapters of Convention of Cybercrime contains the provisions for mutual assistances and extradition rules related to cybercrimes?

  1. Chapter II

  2. Chapter IV

  3. Chapter III

  4. Chapter I

Answer: C

Question No: 187 – (Topic 2)

Which of the following laws or acts, formed in Australia, enforces prohibition against cyber stalking?

  1. Stalking by Electronic Communications Act (2001)

  2. Malicious Communications Act (1998)

  3. Anti-Cyber-Stalking law (1999)

  4. Stalking Amendment Act (1999)

Answer: D

Question No: 188 – (Topic 2)

Rick works as a Network Administrator for uCertify Inc. He takes a backup of some important compressed files on an NTFS partition, using the Windows 2000 Backup utility. Rick restores these files in a FAT32 partition. He finds that the restored files do not have the compression attribute. What is the most likely cause?

  1. A FAT32 partition does not support compression.

  2. The FAT32 partition is corrupt and requires to be reformatted.

  3. The Windows 2000 Backup utility decompresses compressed files while taking a backup.

  4. The backup of files that are saved on an NTFS partition cannot be restored in a FAT32 partition.

Answer: A

Question No: 189 – (Topic 2)

Which of the following tools is used to modify registry permissions in Windows?

  1. POLEDIT

  2. REGEDIT

  3. REGEDT32

  4. SECEDIT

Answer: C

Question No: 190 – (Topic 2)

Which of the following enables an inventor to legally enforce his right to exclude others from using his invention?

  1. Artistic license

  2. Phishing

  3. Spam

  4. Patent

Answer: D

100% Ensurepass Free Download!
Download Free Demo:GCFA Demo PDF
100% Ensurepass Free Guaranteed!
Download 2017 EnsurePass GCFA Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.