[Free] 2017(Sep) EnsurePass Testinsides GIAC GCFA Dumps with VCE and PDF 31-40

Ensurepass.com : Ensure you pass the IT Exams
2017 Sep GIAC Official New Released GCFA
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/GCFA.html

GIACCertified Forensics Analyst

Question No: 31 – (Topic 1)

Adam works as a professional Computer Hacking Forensic Investigator. A project has been assigned to him to investigate the BlackBerry, which is suspected to be used to hide some important information. Which of the following is the first step taken to preserve the information in forensic investigation of the BlackBerry?

  1. Keep BlackBerry in #39;ON#39; state.

  2. Remove the storage media.

  3. Eliminate the ability of the device to receive the push data.

  4. Turn off the BlackBerry.

Answer: C

Question No: 32 – (Topic 1)

You are reviewing a Service Level Agreement between your company and a Web development vendor.

Which of the following are security requirements you should look for in this SLA? Each correct answer represents a complete solution. Choose all that apply.

  1. Time to respond to bug reports

  2. Encryption standards

  3. Security Monitoring

  4. Guarantees on known security flaws

Answer: A,B,C,D

Question No: 33 – (Topic 1)

Mark works as a Network Administrator for Net Perfect Inc. The company has a Linux- based network. Mark installs a Checkpoint Firewall NGX on a SecurePlatform device. He performs a scheduled backup of his system settings and products configuration. Where are these backup files stored?

Each correct answer represents a complete solution. Choose all that apply.

  1. SCP

  2. TFTP

  3. Locally on the SecurePlatform machine hard drive

  4. On a PC in a file named userC

Answer: A,B,C

Question No: 34 – (Topic 1)

Which of the following tools can be used by a user to hide his identity? Each correct answer represents a complete solution. Choose all that apply.

  1. Proxy server

  2. Anonymizer

  3. Rootkit

  4. IPchains

  5. War dialer

Answer: A,B,D

Question No: 35 – (Topic 1)

Which of the following file systems is designed by Sun Microsystems?

  1. NTFS

  2. CIFS

  3. ext2

  4. ZFS

Answer: D

Question No: 36 – (Topic 1)

Which of the following standard file formats is used by Apple#39;s iPod to store contact information?

  1. HFS

  2. hCard

  3. vCard

  4. FAT32

Answer: C

Question No: 37 – (Topic 1)

Which of the following is the correct order of digital investigations Standard Operating Procedure (SOP)?

  1. Initial analysis, request for service, data collection, data analysis, data reporting

  2. Initial analysis, request for service, data collection, data reporting, data analysis

  3. Request for service, initial analysis, data collection, data reporting, data analysis

  4. Request for service, initial analysis, data collection, data analysis, data reporting

Answer: D

Question No: 38 – (Topic 1)

Which of the following types of computers is used for attracting potential intruders?

  1. Bastion host

  2. Data pot

  3. Files pot

  4. Honey pot

Answer: D

Question No: 39 – (Topic 1)

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He receives the following e-mail:

Ensurepass 2017 PDF and VCE

The e-mail that John has received is an example of .

  1. Virus hoaxes

  2. Spambots

  3. Social engineering attacks

  4. Chain letters

Answer: D

Question No: 40 – (Topic 1)

You work as a Network Administrator for Peach Tree Inc. The company currently has a FAT-based Windows NT network. All client computers run Windows 98. The management wants all client computers to be able to boot in Windows XP Professional. You want to accomplish the following goals:

The file system should support file compression and file level security. All the existing data and files can be used by the new file system.

Users should be able to dual-boot their computers.

You take the following steps to accomplish these goals:

Convert the FAT file system to NTFS using the CONVERT utility.

Install Windows XP and choose to upgrade the existing operating system during setup. Which of the following goals will you be able to accomplish?

Each correct answer represents a complete solution. Choose all that apply.

  1. The file system supports file compression and file level security.

  2. All the existing data and files can be used by the new file system.

  3. Users are able to dual-boot their computers.

  4. None of the goals are accomplished.

Answer: A,B

100% Ensurepass Free Download!
Download Free Demo:GCFA Demo PDF
100% Ensurepass Free Guaranteed!
Download 2017 EnsurePass GCFA Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.