[Free] 2017(Sep) EnsurePass Testinsides GIAC GCFA Dumps with VCE and PDF 201-210

Ensurepass.com : Ensure you pass the IT Exams
2017 Sep GIAC Official New Released GCFA
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/GCFA.html

GIACCertified Forensics Analyst

Question No: 201 – (Topic 3)

You use the FAT16 file system on your Windows 98 computer. You want to upgrade to the FAT32 file system. What is the advantage of the FAT32 file system over FAT16 file system?

Each correct answer represents a complete solution. Choose two.

  1. It allocates disk space more efficiently.

  2. On startup failure, you can start the computer by using an MS-DOS or Windows 95 bootable floppy disk.

  3. It uses larger cluster sizes.

  4. It supports drives up to 2 terabytes (TB) in size.

Answer: A,D

Question No: 202 – (Topic 3)

You work as a Network Administrator for Blue Well Inc. Your company#39;s network has a Windows 2000 server with the FAT file system. This server stores sensitive data. You want to encrypt this data to protect it from unauthorized access. You also have to accomplish the following goals:

Data should be encrypted and secure. Administrative effort should be minimum.

You should have the ability to recover encrypted files in case the file owner leaves the company.

Other permissions on encrypted files should be unaffected. File-level security is required on the disk where data is stored.

Encryption or decryption of files should not be the responsibility of the file owner. You take the following steps to accomplish these goals:

Convert the FAT file system to NTFS file system. Use third-party data encryption software.

What will happen after taking these steps?

Each correct answer represents a complete solution. Choose all that apply.

  1. File-level security will be available on the disk where data is stored.

  2. Data will be encrypted and secure.

  3. Encryption or decryption of files will no longer be the responsibility of the file owner.

  4. Other permissions on encrypted files will remain unaffected.

  5. Administrative effort will be minimum.

Answer: A,B,D

Question No: 203 – (Topic 3)

John works as a Network Administrator for DigiNet Inc. He wants to investigate failed logon attempts to a network. He uses Log Parser to detail out the failed logons over a specific time frame. He uses the following commands and query to list all failed logons on a specific date:

logparser.exe file:FailedLogons.sql -i:EVT -o:datagrid SELECT

timegenerated AS LogonTime, extract_token(strings, 0, #39;|#39;) AS UserName FROM Security

WHERE EventID IN (529; 530;

531;

532;

533;

534;

535;

537;

539)

AND to_string(timegenerated,#39;yyyy-MM-dd HH:mm:ss#39;) like #39;2004-09%#39;

After investigation, John concludes that two logon attempts were made by using an expired account.

Which of the following EventID refers to this failed logon?

A. 529

B. 534

C. 531

D. 532

Answer: D

Question No: 204 – (Topic 3)

John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. He copies the whole structure of the We-are-secure Web site to the local disk and obtains all the files on the Web site. Which of the following

techniques is he using to accomplish his task?

  1. Web ripping

  2. TCP FTP proxy scanning

  3. Fingerprinting

  4. Eavesdropping

Answer: A

Question No: 205 – (Topic 3)

Which of the following file attributes are not available on a FAT32 partition? Each correct answer represents a complete solution. Choose two.

  1. Compression

  2. Encryption

  3. Read Only

  4. Hidden

  5. Archive

Answer: A,B

Question No: 206 – (Topic 3)

Victor is a novice Ethical Hacker. He is learning the hacking process, i.e., the steps taken by malicious hackers to perform hacking. Which of the following steps is NOT included in the hacking process?

  1. Reconnaissance

  2. gaining access

  3. Scanning

  4. Preparation

Answer: D

Question No: 207 – (Topic 3)

Which of the following types of virus makes changes to a file system of a disk?

  1. Master boot record virus

  2. Stealth virus

  3. Cluster virus

  4. Macro virus

Answer: C

Question No: 208 – (Topic 3)

Which of the following Acts enacted in United States amends Civil Rights Act of 1964, providing technical changes affecting the length of time allowed to challenge unlawful seniority provisions, to sue the federal government for discrimination and to bring age discrimination claims?

  1. Sexual Predators Act

  2. Civil Rights Act of 1991

  3. PROTECT Act

  4. The USA Patriot Act of 2001

Answer: B

Question No: 209 – (Topic 3)

You work as a Network Administrator for Perfect Solutions Inc. The company has a Linux- based network. You are working as a root user on the Linux operating system. While performing some security investigation, you want to see the hostname and IP address from where users logged in.

Which of the following commands will you use to accomplish the task?

  1. Dig

  2. Netstat

  3. Nslookup

  4. Last

Answer: D

Question No: 210 – (Topic 3)

Based on the case study, to implement more security, which of the following additional technologies should you implement for laptop computers?

(Click the Exhibit button on the toolbar to see the case study.) Each correct answer represents a complete solution. Choose two.

  1. PAP authentication

  2. Encrypting File System (EFS)

  3. Digital certificates

  4. Two-factor authentication

  5. Encrypted Data Transmissions

Answer: B,C

100% Ensurepass Free Download!
Download Free Demo:GCFA Demo PDF
100% Ensurepass Free Guaranteed!
Download 2017 EnsurePass GCFA Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.