[Free] 2017(Sep) EnsurePass Testinsides GIAC GCFA Dumps with VCE and PDF 191-200

Ensurepass.com : Ensure you pass the IT Exams
2017 Sep GIAC Official New Released GCFA
100% Free Download! 100% Pass Guaranteed!

GIACCertified Forensics Analyst

Question No: 191 – (Topic 2)

Which of the following statements about registry is true?

Each correct answer represents a complete solution. Choose three.

  1. It is divided in many areas known as hives.

  2. It was first introduced with Windows 95 operating system.

  3. It is a centralized configuration database that stores information related to a Windows computer.

  4. It can be edited using SCANREG utility.

Answer: A,B,C

Question No: 192 – (Topic 2)

You work as a Network Administrator for a bank. For securing the bank#39;s network, you configure a firewall and an IDS. In spite of these security measures, intruders are able to attack the network. After a close investigation, you find that your IDS is not configured properly and hence is unable to generate alarms when needed. What type of response is the IDS giving?

  1. False Positive

  2. True Negative

  3. True Positive

  4. False Negative

Answer: D

Question No: 193 – (Topic 2)

In 2001, the Council of Europe passed a convention on cybercrime. It was the first international treaty seeking to address computer crime and Internet crimes by harmonizing national laws, improving investigative techniques, and increasing cooperation among nations. On 1 March 2006, the Additional Protocol to the Convention on Cybercrime came into force. Which of the following statements clearly describes this protocol?

  1. The convention of cybercrime is only applied within Europe.

  2. It requires participating states to criminalize the dissemination of racist and xenophobic material through computer systems.

  3. The convention of cybercrime should immediately be put on hold until there is an inclusion of a new or amended article.

  4. English speaking states in Europe such as Ireland and the United Kingdom should sign the convention.

Answer: B

Question No: 194 – (Topic 2)

Trinity wants to send an email to her friend. She uses the MD5 generator to calculate cryptographic hash of her email to ensure the security and integrity of the email. MD5 generator, which Trinity is using operates in two steps:

Creates check file Verifies the check file

Which of the following MD5 generators is Trinity using?

  1. MD5 Checksum Verifier

  2. Mat-MD5

  3. Chaos MD5

  4. Secure Hash Signature Generator

Answer: A

Question No: 195 – (Topic 2)

Which of the following tools in Helix Windows Live is used to reveal the database password of password protected MDB files created using Microsoft Access or with Jet Database Engine?

  1. Asterisk logger

  2. FAU

  3. Galleta

  4. Access Pass View

Answer: D

Topic 3, Volume C

Question No: 196 – (Topic 3)

Which of the following log files are used to collect evidences before taking the bit-stream image of the BlackBerry?

Each correct answer represents a complete solution. Choose all that apply.

  1. Roam and Radio

  2. user history

  3. Radio status

  4. Transmit/Receive

Answer: A,C,D

Question No: 197 – (Topic 3)

Which of the following are advantages of NTFS file system over FAT32 and FAT? Each correct answer represents a part of the solution. Choose two.

  1. Support for file and folder level permissions.

  2. Support for audio files.

  3. Support for Encrypting File System (EFS).

  4. Support for dual-booting.

Answer: A,C

Question No: 198 – (Topic 3)

John works as a Network Security Professional. He is assigned a project to test the security of www.we-are-secure.com. He is working on the Linux operating system and wants to install an Intrusion Detection System on the We-are-secure server so that he can receive alerts about any hacking attempts. Which of the following tools can John use to accomplish the task?

Each correct answer represents a complete solution. Choose all that apply.

  1. SARA

  2. Snort

  3. Tripwire

  4. Samhain

Answer: B,D

Question No: 199 – (Topic 3)

Adam, a malicious hacker, hides a hacking tool from a system administrator of his company by using Alternate Data Streams (ADS) feature. Which of the following statements is true in context with the above scenario?

  1. Alternate Data Streams is a feature of Linux operating system.

  2. Adam is using FAT file system.

  3. Adam is using NTFS file system.

  4. Adam#39;s system runs on Microsoft Windows 98 operating system.

Answer: C

Question No: 200 – (Topic 3)

Which of the following switches of the XCOPY command copies file ownerships and NTFS permissions on files while copying the files?

  1. /r

  2. /p

  3. /s

  4. /o

Answer: D

100% Ensurepass Free Download!
Download Free Demo:GCFA Demo PDF
100% Ensurepass Free Guaranteed!
Download 2017 EnsurePass GCFA Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.