[Free] 2017(Sep) EnsurePass Testinsides GIAC GCFA Dumps with VCE and PDF 51-60

Ensurepass.com : Ensure you pass the IT Exams
2017 Sep GIAC Official New Released GCFA
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/GCFA.html

GIACCertified Forensics Analyst

Question No: 51 – (Topic 1)

Which of the following is the process of overwriting all addressable locations on a disk?

  1. Drive wiping

  2. Spoofing

  3. Sanitization

  4. Authentication

Answer: A

Question No: 52 – (Topic 1)

Adam works as a professional Computer Hacking Forensic Investigator with the local police of his area. A project has been assigned to him to investigate a PDA seized from a local drug dealer. It is expected that many valuable and important information are stored in this PDA. Adam follows investigative methods, which are required to perform in a pre-defined sequential manner for the successful forensic investigation of the PDA. Which of the following is the correct order to perform forensic investigation of PDA?

  1. Identification, Collection, Examination, Documentation

  2. Examination, Collection, Identification, Documentation

  3. Documentation, Examination, Identification, Collection

  4. Examination, Identification, Collection, Documentation

Answer: D

Question No: 53 – (Topic 1)

Which of the following prevents malicious programs from attacking a system?

  1. Anti-virus program

  2. Smart cards

  3. Biometric devices

  4. Firewall

Answer: A

Question No: 54 – (Topic 1)

Adam works as a professional Computer Hacking Forensic Investigator. He works with the local police. A project has been assigned to him to investigate an iPod, which was seized from a student of the high school. It is suspected that the explicit child pornography contents are stored in the iPod. Adam wants to investigate the iPod extensively. Which of the following operating systems will Adam use to carry out his investigations in more extensive and elaborate manner?

  1. Linux

  2. MINIX 3

  3. Windows XP

  4. Mac OS

Answer: D

Question No: 55 – (Topic 1)

Which of the following directories in Linux operating system contains device files, which refers to physical devices?

  1. /boot

  2. /etc

  3. /dev

  4. /bin

Answer: C

Question No: 56 HOTSPOT – (Topic 1)

Identify the port in the image given below, which can be connected to the hub to extend the

number of ports, and up to 127 devices can be connected to it?

Ensurepass 2017 PDF and VCE

Answer:

Ensurepass 2017 PDF and VCE

Question No: 57 – (Topic 1)

You work as a Web developer for ABC Inc. You want to investigate the Cross-Site Scripting attack on your company#39;s Web site. Which of the following methods of investigation can you use to accomplish the task?

Each correct answer represents a complete solution. Choose all that apply.

  1. Review the source of any HTML-formatted e-mail messages for embedded scripts or links in the URL to the company#39;s site.

  2. Look at the Web server#39;s logs and normal traffic logging.

  3. Use Wireshark to capture traffic going to the server and then searching for the requests going to the input page, which may give log of the malicious traffic and the IP address of the source.

  4. Use a Web proxy to view the Web server transactions in real time and investigate any communication with outside servers.

Answer: A,B,D

Question No: 58 – (Topic 1)

Which of the following directories cannot be placed out of the root filesystem? Each correct answer represents a complete solution. Choose all that apply.

  1. /sbin

  2. /etc

  3. /var

  4. /lib

Answer: A,B,D

Question No: 59 – (Topic 1)

You work as a Network Security Analyzer. You got a suspicious email while working on a forensic project. Now, you want to know the IP address of the sender so that you can analyze various information such as the actual location, domain information, operating system being used, contact information, etc. of the email sender with the help of various tools and resources. You also want to check whether this email is fake or real. You know that analysis of email headers is a good starting point in such cases. The email header of the suspicious email is given below:

Ensurepass 2017 PDF and VCE

What is the IP address of the sender of this email?

A. 172.16.10.90

B. 209.191.91.180

C. 216.168.54.25

D. 141.1.1.1

Answer: C

Question No: 60 – (Topic 1)

The incident response team has turned the evidence over to the forensic team. Now, it is the time to begin looking for the ways to improve the incident response process for next time. What are the typical areas for improvement?

Each correct answer represents a complete solution. Choose all that apply.

  1. Information dissemination policy

  2. Additional personnel security controls

  3. Incident response plan

  4. Electronic monitoring statement

Answer: A,B,C,D

100% Ensurepass Free Download!
Download Free Demo:GCFA Demo PDF
100% Ensurepass Free Guaranteed!
Download 2017 EnsurePass GCFA Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.