[Jan-2024] GCFA Dumps Full Questions – GIAC Information Security Exam Study Guide [Q147-Q170]

Rate this post

[Jan-2024] GCFA Dumps Full Questions – GIAC Information Security Exam Study Guide

Exam Questions and Answers for GCFA Study Guide

NO.147 You want to upgrade a partition in your computer’s hard disk drive from FAT to NTFS. Which of the following DOS commands will you use to accomplish this?

 
 
 
 

NO.148 Which of the following is used for remote file access by UNIX/Linux systems?

 
 
 
 

NO.149 Mark works as a Network administrator for SecureEnet Inc. His system runs on Mac OS
X. He wants to boot his system from the Network Interface Controller (NIC). Which of the following snag keys will Mark use to perform the required function?

 
 
 
 

NO.150 You work as a Network Administrator for Blue Well Inc. Your company’s network has a Windows 2000 server with the FAT file system. This server stores sensitive data. You want to encrypt this data to protect it from unauthorized access. You also have to accomplish the following goals:
Data should be encrypted and secure.

Administrative effort should be minimum.

You should have the ability to recover encrypted files in case the file owner leaves the company.

Other permissions on encrypted files should be unaffected.

File-level security is required on the disk where data is stored.

Encryption or decryption of files should not be the responsibility of the file owner.

You take the following steps to accomplish these goals:
Convert the FAT file system to NTFS file system.

Use third-party data encryption software.

What will happen after taking these steps?
Each correct answer represents a complete solution. Choose all that apply.

 
 
 
 
 

NO.151 You work as the Network Administrator for McNeil Inc. The company has a Unix-based network. You want to query an image root device and RAM disk size. Which of the following Unix commands can you use to accomplish the task?

 
 
 
 

NO.152 John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. He wants to test the effect of a virus on the We-are-secure server. He injects the virus on the server and, as a result, the server becomes infected with the virus even though an established antivirus program is installed on the server. Which of the following do you think are the reasons why the antivirus installed on the server did not detect the virus injected by John?
Each correct answer represents a complete solution. Choose all that apply.

 
 
 
 

NO.153 Which of the following is used to store configuration settings and options on Microsoft Windows operating systems?

 
 
 
 

NO.154 The incident response team has turned the evidence over to the forensic team. Now, it is the time to begin looking for the ways to improve the incident response process for next time. What are the typical areas for improvement?
Each correct answer represents a complete solution. Choose all that apply.

 
 
 
 

NO.155 John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. Which of the following commands will John use to display information about all mounted file systems?
Each correct answer represents a complete solution. Choose all that apply.

 
 
 
 

NO.156 Which of the following is a documentation of guidelines that computer forensics experts use to handle evidences?

 
 
 
 

NO.157 Which of the following diagnostic codes sent by POST to the internal port h80 refers to the system board error?

 
 
 
 

NO.158 John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He traceroutes the We-are-secure server and gets the following result:

Considering the above traceroute result, which of the following statements can be true?
Each correct answer represents a complete solution. Choose all that apply.

 
 
 
 

NO.159 John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we- are-secure.com. He wants to test the effect of a virus on the We-are-secure server. He injects the virus on the server and, as a result, the server becomes infected with the virus even though an established antivirus program is installed on the server. Which of the following do you think are the reasons why the antivirus installed on the server did not detect the virus injected by John?
Each correct answer represents a complete solution. Choose all that apply.

 
 
 
 

NO.160 Mark is the Administrator of a Linux computer. He wants to check the status of failed Telnet-based login attempts on the Linux computer. Which of the following shell commands will he use to accomplish the task?

 
 
 
 

NO.161 You work as the Network Administrator for McNeil Inc. The company has a Unix-based network. You want to allow direct access to the filesystems data structure. Which of the following Unix commands can you use to accomplish the task?

 
 
 
 

NO.162 Which of the following IP addresses are private addresses?
Each correct answer represents a complete solution. Choose all that apply.

 
 
 
 

NO.163 When you start your computer, Windows operating system reports that the hard disk drive has bad sectors. What will be your first step in resolving this issue?

 
 
 
 

NO.164 Which of the following statements about the compression feature of the NTFS file system are true?
Each correct answer represents a complete solution. Choose two.

 
 
 
 

NO.165 Which of the following is included in a memory dump file?

 
 
 
 

NO.166 Which of the following file systems provides file-level security?

 
 
 
 

NO.167 John works as a contract Ethical Hacker. He has recently got a project to do security checking for www.we-are-secure.com. He wants to find out the operating system of the we-are-secure server in the information gathering step. Which of the following commands will he use to accomplish the task?
Each correct answer represents a complete solution. Choose two.

 
 
 
 

NO.168 Adrian, the Network Administrator for Peach Tree Inc., wants to install a new computer on the company’s network. He asks his assistant to make a boot disk with minimum files. The boot disk will be used to boot the computer, which does not have an operating system installed, yet. Which of the following files will he include on the disk?

 
 
 
 

NO.169 Which of the following file systems provides integrated security?

 
 
 
 

NO.170 Adam, a malicious hacker, hides a hacking tool from a system administrator of his company by using Alternate Data Streams (ADS) feature. Which of the following statements is true in context with the above scenario?

 
 
 
 

GIAC Certified Forensics Analyst Free Update With 100% Exam Passing Guarantee: https://www.examslabs.com/GIAC/GIAC-Information-Security/best-GCFA-exam-dumps.html