[Free] 2017(Sep) EnsurePass Testinsides GIAC GCFA Dumps with VCE and PDF 91-100

Ensurepass.com : Ensure you pass the IT Exams
2017 Sep GIAC Official New Released GCFA
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/GCFA.html

GIACCertified Forensics Analyst

Question No: 91 – (Topic 1)

Which of the following is the correct order of loading system files into the main memory of the system, when the computer is running on Microsoft#39;s Windows XP operating system?

  1. NTLDR, BOOT.ini, HAL.dll, NTDETECT.com, NTOSKRNL.exe

  2. NTLDR, BOOT.ini, NTDETECT.com, HAL.dll, NTOSKRNL.exe

  3. NTLDR, BOOT.ini, HAL.dll, NTDETECT.com, NTOSKRNL.exe

  4. BOOT.ini, HAL.dll, NTDETECT.com, NTLDR, NTOSKRNL.exe

Answer: B

Question No: 92 – (Topic 1)

Adam works as a professional Penetration tester. A project has been assigned to him to employ penetration testing on the network of Umbrella Inc. He is running the test from home and had downloaded every security scanner from the Internet. Despite knowing the IP range of all of the systems, and the exact network configuration, Adam is unable to get any useful results.

Which of the following is the most like cause of this problem?

Each correct answer represents a complete solution. Choose all that apply.

  1. Security scanners are only as smart as their database and cannot find unpublished vulnerabilities.

  2. Security scanners cannot perform vulnerability linkage.

  3. Security scanners are smart as their database and can find unpublished vulnerabilities.

  4. Security scanners are not designed to do testing through a firewall.

Answer: A,B,D

Question No: 93 – (Topic 1)

Which of the following methods is used by forensic investigators to acquire an image over the network in a secure manner?

  1. DOS boot disk

  2. Linux Live CD

  3. Secure Authentication for EnCase (SAFE)

  4. EnCase with a hardware write blocker

Answer: C

Question No: 94 – (Topic 1)

Which of the following two cryptography methods are used by NTFS Encrypting File System (EFS) to encrypt the data stored on a disk on a file-by-file basis?

  1. Digital certificates

  2. Public key

  3. RSA

  4. Twofish

Answer: A,B

Question No: 95 – (Topic 1)

An organization monitors the hard disks of its employees#39; computers from time to time. Which policy does this pertain to?

  1. Network security policy

  2. User password policy

  3. Privacy policy

  4. Backup policy

Answer: C

Question No: 96 – (Topic 1)

John works as a professional Ethical Hacker. He has been assigned a project for testing the security of www.we-are-secure.com. He wants to corrupt an IDS signature database so that performing attacks on the server is made easy and he can observe the flaws in the We-are-secure server. To perform his task, he first of all sends a virus that continuously changes its signature to avoid detection from IDS. Since the new signature of the virus does not match the old signature, which is entered in the IDS signature database, IDS becomes unable to point out the malicious virus. Which of the following IDS evasion attacks is John performing?

  1. Evasion attack

  2. Session splicing attack

  3. Insertion attack

  4. Polymorphic shell code attack

Answer: D

Question No: 97 – (Topic 1)

Which of the following statements about an extended partition are true? Each correct answer represents a complete solution. Choose two.

  1. It can be sub-divided into logical drives.

  2. It cannot be formatted or assigned a drive letter.

  3. A maximum of four extended partitions can exist on a single basic disk.

  4. It cannot contain more than one logical drive.

Answer: A,B

Question No: 98 – (Topic 1)

You work as the Network Administrator for McNeil Inc. The company has a Unix-based network. You want to allow direct access to the filesystems data structure. Which of the following Unix commands can you use to accomplish the task?

  1. du

  2. debugfs

  3. df

  4. dosfsck

Answer: B

Topic 2, Volume B

Question No: 99 – (Topic 2)

Which of the following is a documentation of guidelines that computer forensics experts use

to handle evidences?

  1. Chain of evidence

  2. Chain of custody

  3. Incident response policy

  4. Evidence access policy

Answer: B

Question No: 100 – (Topic 2)

In which of the following files does the Linux operating system store passwords?

  1. Password

  2. Passwd

  3. Shadow

  4. SAM

Answer: C

100% Ensurepass Free Download!
Download Free Demo:GCFA Demo PDF
100% Ensurepass Free Guaranteed!
Download 2017 EnsurePass GCFA Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.