Spring Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

GCFA GIACCertified Forensics Analyst Questions and Answers

Questions 4

Which of the following tables is formed by NTFS file system to keep the track of files, to store metadata, and their location?

Options:

A.

The Master File Table

B.

The System File Table

C.

The Master Allocation Table

D.

The File Allocation Table

Buy Now
Questions 5

John works as a professional Ethical Hacker. He is assigned a project to test the security of www.weare-secure.com. He enters a single quote in the input field of the login page of the We-are-secure Web site and receives the following error message:

Microsoft OLE DB Provider for ODBC Drivers error ' 0x80040E14 '

This error message shows that the We-are-secure Website is vulnerable to __________.

Options:

A.

An XSS attack

B.

A SQL injection attack

C.

A Denial-of-Service attack

D.

A buffer overflow

Buy Now
Questions 6

Which of the following directories contains administrative commands on a UNIX computer?

Options:

A.

/usr/local

B.

/sbin

C.

/bin

D.

/export

Buy Now
Questions 7

Which of the following Acts enacted in United States amends Civil Rights Act of 1964, providing technical changes affecting the length of time allowed to challenge unlawful seniority provisions, to sue the federal government for discrimination and to bring age discrimination claims?

Options:

A.

Sexual Predators Act

B.

Civil Rights Act of 1991

C.

PROTECT Act

D.

The USA Patriot Act of 2001

Buy Now
Questions 8

Based on the case study, to implement more security, which of the following additional technologies should you implement for laptop computers?

(Click the Exhibit button on the toolbar to see the case study.)

Each correct answer represents a complete solution. Choose two.

Options:

A.

PAP authentication

B.

Encrypting File System (EFS)

C.

Digital certificates

D.

Two-factor authentication

E.

Encrypted Data Transmissions

Buy Now
Questions 9

Joseph works as a Software Developer for WebTech Inc. He wants to protect the algorithms and the techniques of programming that he uses in developing an application. Which of the following laws are used to protect a part of software?

Options:

A.

Trademark laws

B.

Code Security law

C.

Patent laws

D.

Copyright laws

Buy Now
Questions 10

Victor is a novice Ethical Hacker. He is learning the hacking process, i.e., the steps taken by malicious hackers to perform hacking. Which of the following steps is NOT included in the hacking process?

Options:

A.

Reconnaissance

B.

gaining access

C.

Scanning

D.

Preparation

Buy Now
Questions 11

Which of the following statements about the NTDETECT.COM file is true?

Each correct answer represents a complete solution. Choose three.

Options:

A.

It is used to gather information about currently installed hardware on the computer.

B.

It is a startup file of the Windows NT/2000 operating system.

C.

It is located in the root of the startup disk.

D.

It is used to dual-boot a computer.

Buy Now
Questions 12

Which status is a problem, assigned when its cause has been recognized?

Options:

A.

Incident

B.

Request for Change

C.

Known Error

D.

Work-around

Buy Now
Questions 13

Which of the following switches is used with Pslist command on the command line to show the statistics for all active threads on the system, grouping these threads with their owning process?

Options:

A.

Pslist -m

B.

Pslist -d

C.

Pslist -x

D.

Pslist -t

Buy Now
Questions 14

Peter, an expert computer user, attached a new sound card to his computer. He then restarts the computer, so that the BIOS can scan the hardware changes. What will be the memory range of ROM that the BIOS scan for additional code to be executed for proper working of soundcard?

Options:

A.

hC800 to hDF80

B.

hCA79 to hAC20

C.

hAA43 to hF345

D.

hDF80 to hFF80

Buy Now
Questions 15

Which of the following precautionary steps are taken by the supervisors or employers to avoid sexual harassment in workplace?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Establish a complaint mechanism.

B.

Communicate to an employee who is indulging in such behavior.

C.

Contact the police and take legal action.

D.

Immediately take action on the complaint.

Buy Now
Questions 16

Which of the following terms refers to a mechanism which proves that the sender really sent a particular message?

Options:

A.

Confidentiality

B.

Authentication

C.

Non-repudiation

D.

Integrity

Buy Now
Questions 17

Which of the following encryption methods uses AES technology?

Options:

A.

Dynamic WEP

B.

Static WEP

C.

TKIP

D.

CCMP

Buy Now
Questions 18

Mark is the Administrator of a Linux computer. He wants to check the status of failed Telnet-based login attempts on the Linux computer. Which of the following shell commands will he use to accomplish the task?

Options:

A.

GREP

B.

CP

C.

FSCK

D.

CAT

Buy Now
Questions 19

Mark works as a security manager for SofTech Inc. He is using a technique for monitoring what the employees are doing with corporate resources. Which of the following techniques is being used by Mark to gather evidence of an ongoing computer crime if a member of the staff is e-mailing company ' s secrets to an opponent?

Options:

A.

Electronic surveillance

B.

Civil investigation

C.

Physical surveillance

D.

Criminal investigation

Buy Now
Questions 20

Maria works as a professional Ethical Hacker. She recently got a project to test the security of www.we-are-secure.com. Arrange the three pre-test phases of the attack to test the security of weare-secure.

GCFA Question 20

Options:

A.
Buy Now
Questions 21

Fill in the blank with the appropriate name.

_____is a list, which specifies the order of volatility of data in a Windows based system.

Options:

A.

RFC 3227

Buy Now
Questions 22

Which of the following directories cannot be placed out of the root filesystem?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

/sbin

B.

/etc

C.

/var

D.

/lib

Buy Now
Questions 23

By gaining full control of router, hackers often acquire full control of the network. Which of the following methods are commonly used to attack Routers?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

By launching Social Engineering attack

B.

By launching Max Age attack

C.

Route table poisoning

D.

By launching Sequence++ attack

Buy Now
Questions 24

Which of the following type of file systems is not supported by Linux kernel?

Options:

A.

vFAT

B.

NTFS

C.

HFS

D.

FAT32

Buy Now
Questions 25

Which of the following file systems is designed by Sun Microsystems?

Options:

A.

NTFS

B.

CIFS

C.

ext2

D.

ZFS

Buy Now
Questions 26

Which of the following file systems contains hardware settings of a Linux computer?

Options:

A.

/var

B.

/etc

C.

/proc

D.

/home

Buy Now
Questions 27

You are handling technical support calls for an insurance company. A user calls you complaining that he cannot open a file, and that the file name appears in green while opening in Windows Explorer.

What does this mean?

Options:

A.

The file is encrypted.

B.

The file belongs to another user.

C.

The file is infected with virus.

D.

The file is compressed.

Buy Now
Questions 28

Adam works as a professional Penetration tester. A project has been assigned to him to employ penetration testing on the network of Umbrella Inc. He is running the test from home and had downloaded every security scanner from the Internet. Despite knowing the IP range of all of the systems, and the exact network configuration, Adam is unable to get any useful results.

Which of the following is the most like cause of this problem?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Security scanners are only as smart as their database and cannot find unpublished vulnerabilities.

B.

Security scanners cannot perform vulnerability linkage.

C.

Security scanners are smart as their database and can find unpublished vulnerabilities.

D.

Security scanners are not designed to do testing through a firewall.

Buy Now
Questions 29

Which of the following is the first computer virus that was used to infect the boot sector of storage media formatted with the DOS File Allocation Table (FAT) file system?

Options:

A.

Melissa

B.

Tequila

C.

Brain

D.

I love you

Buy Now
Questions 30

Nathan works as a Computer Hacking Forensic Investigator for SecureEnet Inc. He uses Visual TimeAnalyzer software to track all computer usage by logging into individual users account or specific projects and compile detailed accounts of time spent within each program. Which of the following functions are NOT performed by Visual TimeAnalyzer?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

It monitors all user data such as passwords and personal documents.

B.

It gives parents control over their children ' s use of the personal computer.

C.

It tracks work time, pauses, projects, costs, software, and internet usage.

D.

It records specific keystrokes and run screen captures as a background process.

Buy Now
Questions 31

Sandra, a novice computer user, works on Windows environment. She experiences some problem regarding bad sectors formed in a hard disk of her computer. She wants to run CHKDSK command to check the hard disk for bad sectors and to fix the errors, if any, occurred. Which of the following switches will she use with CHKDSK command to accomplish the task?

Options:

A.

CHKDSK /I

B.

CHKDSK /C /L

C.

CHKDSK /V /X

D.

CHKDSK /R /F

Buy Now
Questions 32

Which of the following tools can be used by a user to hide his identity?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Proxy server

B.

Anonymizer

C.

Rootkit

D.

IPchains

E.

War dialer

Buy Now
Questions 33

In which of the following access control models can a user not grant permissions to other users to see a copy of an object marked as secret that he has received, unless they have the appropriate permissions?

Options:

A.

Discretionary Access Control (DAC)

B.

Access Control List (ACL)

C.

Mandatory Access Control (MAC)

D.

Role Based Access Control (RBAC)

Buy Now
Questions 34

You work as the Network Administrator for McNeil Inc. The company has a Unix-based network. You want to allow direct access to the filesystems data structure. Which of the following Unix commands can you use to accomplish the task?

Options:

A.

du

B.

debugfs

C.

df

D.

dosfsck

Buy Now
Questions 35

Nathan works as a professional Ethical Hacker. He wants to see all open TCP/IP and UDP ports of his computer. Nathan uses the netstat command for this purpose but he is still unable to map open ports to the running process with PID, process name, and path. Which of the following commands will Nathan use to accomplish the task?

Options:

A.

ping

B.

Psloggedon

C.

Pslist

D.

fport

Buy Now
Questions 36

Adam, a malicious hacker has successfully gained unauthorized access to the Linux system of

Umbrella Inc. Web server of the company runs on Apache. He has downloaded sensitive documents and database files from the computer. After performing these malicious tasks, Adam finally runs the following command on the Linux command box before disconnecting. for (( i = 0;i < 11;i++ )); do

dd if=/dev/random of=/dev/hda & & dd if=/dev/zero of=/dev/hda done

Which of the following actions does Adam want to perform by the above command?

Options:

A.

Making a bit stream copy of the entire hard disk for later download.

B.

Deleting all log files present on the system.

C.

Wiping the contents of the hard disk with zeros.

D.

Infecting the hard disk with polymorphic virus strings.

Buy Now
Questions 37

Which of the following attacks saturates network resources and disrupts services to a specific computer?

Options:

A.

Teardrop attack

B.

Polymorphic shell code attack

C.

Denial-of-Service (DoS) attack

D.

Replay attack

Buy Now
Questions 38

You want to upgrade a partition in your computer ' s hard disk drive from FAT to NTFS. Which of the following DOS commands will you use to accomplish this?

Options:

A.

FORMAT C: /s

B.

CONVERT C: /fs:ntfs

C.

SYS C:

D.

FDISK /mbr

Buy Now
Questions 39

Normally, RAM is used for temporary storage of data. But sometimes RAM data is stored in the hard disk, what is this method called?

Options:

A.

Cache memory

B.

Static memory

C.

Virtual memory

D.

Volatile memory

Buy Now
Questions 40

Adam works as a professional Computer Hacking Forensic Investigator. A project has been assigned to him to investigate the BlackBerry, which is suspected to be used to hide some important information. Which of the following is the first step taken to preserve the information in forensic investigation of the BlackBerry?

Options:

A.

Keep BlackBerry in ' ON ' state.

B.

Remove the storage media.

C.

Eliminate the ability of the device to receive the push data.

D.

Turn off the BlackBerry.

Buy Now
Questions 41

You are the Network Administrator and your company has recently implemented encryption for all emails. You want to check to make sure that the email packages are being encrypted. What tool would you use to accomplish this?

Options:

A.

Password cracker

B.

Packet sniffer

C.

Performance Monitor

D.

Vulnerability analyzer

Buy Now
Questions 42

Which of the following statements about an extended partition are true?

Each correct answer represents a complete solution. Choose two.

Options:

A.

It can be sub-divided into logical drives.

B.

It cannot be formatted or assigned a drive letter.

C.

A maximum of four extended partitions can exist on a single basic disk.

D.

It cannot contain more than one logical drive.

Buy Now
Questions 43

Adam works as a professional Computer Hacking Forensic Investigator. He has been called by the FBI to examine data of the hard disk, which is seized from the house of a suspected terrorist. Adam decided to acquire an image of the suspected hard drive. He uses a forensic hardware tool, which is capable of capturing data from IDE, Serial ATA, SCSI devices, and flash cards. This tool can also produce MD5 and CRC32 hash while capturing the data. Which of the following tools is Adam using?

Options:

A.

Wipe MASSter

B.

ImageMASSter 4002i

C.

ImageMASSter Solo-3

D.

FireWire DriveDock

Buy Now
Questions 44

Which of the following file systems supports the hot fixing feature?

Options:

A.

FAT16

B.

exFAT

C.

FAT32

D.

NTFS

Buy Now
Questions 45

Which of the following two cryptography methods are used by NTFS Encrypting File System (EFS) to encrypt the data stored on a disk on a file-by-file basis?

Options:

A.

Digital certificates

B.

Public key

C.

RSA

D.

Twofish

Buy Now
Questions 46

You are reviewing a Service Level Agreement between your company and a Web development vendor.

Which of the following are security requirements you should look for in this SLA?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Time to respond to bug reports

B.

Encryption standards

C.

Security Monitoring

D.

Guarantees on known security flaws

Buy Now
Questions 47

Which of the following is a correct sequence of different layers of Open System Interconnection (OSI) model?

Options:

A.

Physical layer, data link layer, network layer, transport layer, presentation layer, session layer, and application layer

B.

application layer, presentation layer, network layer, transport layer, session layer, data link layer, and physical layer

C.

Physical layer, data link layer, network layer, transport layer, session layer, presentation layer, and application layer

D.

Physical layer, network layer, transport layer, data link layer, session layer, presentation layer, and application layer

Buy Now
Questions 48

Which of the following directories contains administrative commands and daemon processes in the Linux operating system?

Options:

A.

/etc

B.

/dev

C.

/usr

D.

/sbin

Buy Now
Questions 49

Brutus is a password cracking tool that can be used to crack the following authentications:

 HTTP (Basic Authentication)

 HTTP (HTML Form/CGI)

 POP3 (Post Office Protocol v3)

 FTP (File Transfer Protocol)

 SMB (Server Message Block)

 Telnet

Which of the following attacks can be performed by Brutus for password cracking?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Replay attack

B.

Dictionary attack

C.

Man-in-the-middle attack

D.

Hybrid attack

E.

Brute force attack

Buy Now
Questions 50

Adam works as a professional Computer Hacking Forensic Investigator. He has been assigned with a project to investigate a computer in the network of SecureEnet Inc. The compromised system runs on Windows operating system. Adam decides to use Helix Live for Windows to gather data and electronic evidences starting with retrieving volatile data and transferring it to server component via TCP/IP. Which of the following application software in Helix Windows Live will he use to retrieve volatile data and transfer it to the server component via TCP/IP?

Options:

A.

FSP

B.

Drive Manager

C.

FTK imager

D.

FAU

Buy Now
Questions 51

Which of the following registry hives stores configuration information specific to a particular user who is currently logged on to the computer?

Options:

A.

HKEY_USERS

B.

HKEY_CURRENT_USER

C.

HKEY_LOCAL_MACHINE

D.

HKEY_CLASSES_ROOT

Buy Now
Questions 52

Which of the following tools is used to locate lost files and partitions to restore data from a formatted, damaged, or lost partition in Windows and Apple Macintosh computers?

Options:

A.

Easy-Undelete

B.

File Scavenger

C.

Recover4all Professional

D.

VirtualLab

Buy Now
Questions 53

Which of the following Windows XP system files handles memory management, I/O operations, and interrupts?

Options:

A.

Ntoskrnl.exe

B.

Win32k.sys

C.

Advapi32.dll

D.

Kernel32.dll

Buy Now
Questions 54

Which of the following representatives of incident response team takes forensic backups of the systems that are the focus of the incident?

Options:

A.

Technical representative

B.

Information security representative

C.

Legal representative

D.

Lead investigator

Buy Now
Questions 55

Mark works as a Network administrator for SecureEnet Inc. His system runs on Mac OS X. He wants to boot his system from the Network Interface Controller (NIC). Which of the following snag keys will Mark use to perform the required function?

Options:

A.

N

B.

D

C.

C

D.

Z

Buy Now
Questions 56

Your network has a Windows 2000 Server computer with FAT file system, shared by several users.

This system stores sensitive data. You decide to encrypt this data to protect it from unauthorized access. You want to accomplish the following goals:

 Data should be secure and encrypted.

 Administrative efforts should be minimum.

 You should have the ability to recover encrypted files in case the file owner leaves the company.

 Other permissions on encrypted files should be unaffected.

 File-level security is required on the disk where data is stored.

 Encrypting or decrypting of files should not be the responsibility of the file owner.

You take the following steps to accomplish these goals :

 Convert the FAT file system to Windows 2000 NTFS file system.

 Use Encrypting File System (EFS) to encrypt data.

Which of the following goals will you be able to accomplish?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

File-level security is available on the disk where data is stored.

B.

You have the ability to recover encrypted files in case the file owner leaves the company.

C.

Encrypting or decrypting of files is no longer the responsibility of the file owner.

D.

Data are secured and encrypted.

E.

Administrative efforts are minimum.

F.

Other permissions on encrypted files are unaffected.

Buy Now
Questions 57

Convention on Cybercrime, created by the Council of Europe, is the treaty seeking to address

Computer crime and Internet crimes by harmonizing national laws, improving investigative techniques, and increasing cooperation among nations. Which of the following chapters of Convention of Cybercrime contains the provisions for mutual assistances and extradition rules related to cybercrimes?

Options:

A.

Chapter II

B.

Chapter IV

C.

Chapter III

D.

Chapter I

Buy Now
Questions 58

What is the name of the group of blocks which contains information used by the operating system in Linux system?

Options:

A.

logblock

B.

Systemblock

C.

Bootblock

D.

Superblock

Buy Now
Questions 59

You work as the Network Administrator for McNeil Inc. The company has a Unix-based network. You want to query an image root device and RAM disk size. Which of the following Unix commands can you use to accomplish the task?

Options:

A.

rdev

B.

mount

C.

setfdprm

D.

rdump

Buy Now
Questions 60

Which of the following file systems provides integrated security?

Options:

A.

CDFS

B.

EFS

C.

HPFS

D.

FAT32

Buy Now
Questions 61

You work as a Network Administrator for Net World International. You want to configure a Windows 2000 computer to dual boot with Windows 98. The hard disk drive of the computer will be configured as a single partition drive. Which of the following file systems will you use to accomplish this?

Options:

A.

NTFS

B.

HPFS

C.

FAT16

D.

FAT32

Buy Now
Questions 62

Trinity wants to send an email to her friend. She uses the MD5 generator to calculate cryptographic hash of her email to ensure the security and integrity of the email. MD5 generator, which Trinity is using operates in two steps:

 Creates check file

 Verifies the check file

Which of the following MD5 generators is Trinity using?

Options:

A.

MD5 Checksum Verifier

B.

Mat-MD5

C.

Chaos MD5

D.

Secure Hash Signature Generator

Buy Now
Questions 63

Which of the following tools is an asterisk password revealer tool?

Options:

A.

Aircrack

B.

SnadBoy

C.

Cain and Abel

D.

Pwdump3

Buy Now
Questions 64

Which of the following Windows Registry key contains the password file of the user?

Options:

A.

HKEY_USER

B.

HKEY_CURRENT_CONFIG

C.

HKEY_DYN_DATA

D.

HKEY_LOCAL_MACHINE

Buy Now
Questions 65

Which of the following tools is a wireless sniffer and analyzer that works on the Windows operating system?

Options:

A.

Kismet

B.

Airsnort

C.

Void11

D.

Aeropeek

Buy Now
Questions 66

Which of the following firewalls depends on the three-way handshake of the TCP protocol?

Options:

A.

Proxy-based firewall

B.

Stateful firewall

C.

Packet filter firewall

D.

Endian firewall

Buy Now
Questions 67

Joseph works as a Web Designer for WebTech Inc. He creates a Web site and wants to protect it from lawsuits. Which of the following steps will he take to accomplish the task?

Each correct answer represents a part of the solution. Choose all that apply.

Options:

A.

Restrict the access to the site.

B.

Restrict shipping in certain areas.

C.

Restrict the transfer of information.

D.

Restrict customers according to their locations.

Buy Now
Questions 68

Which of the following is the Windows feature on which the file management can be performed by a PC user?

Options:

A.

Activity Monitor

B.

Task Manager

C.

Windows Explorer

D.

Finder

Buy Now
Questions 69

An attacker attempts to gain information about a network by specifically targeting the network resources and applications running on a computer. This method for gaining information is known as ______.

Options:

A.

Notification

B.

Scanning

C.

Enumeration

D.

Sensor

E.

Footprinting

F.

Passive response

Buy Now
Questions 70

Which of the following U.S. Federal laws addresses computer crime activities in communication lines, stations, or systems?

Options:

A.

18 U.S.C. 1030

B.

18 U.S.C. 1362

C.

18 U.S.C. 2701

D.

18 U.S.C. 2510

E.

18 U.S.C. 1029

Buy Now
Questions 71

Which of the following graphical tools is used to navigate through directory structures?

Options:

A.

Disk Cleanup

B.

System Information

C.

Disk Management

D.

Windows Explorer

Buy Now
Questions 72

Adam works as a Security Administrator for Umbrella Technology Inc. He reported a breach in security to his senior members, stating that " security defenses has been breached and exploited for 2 weeks by hackers. " The hackers had accessed and downloaded 50,000 addresses containing customer credit cards and passwords. Umbrella Technology was looking to law enforcement officials to protect their intellectual property. The intruder entered through an employee ' s home machine, which was connected to Umbrella Technology ' s corporate VPN network. The application called BEAST Trojan was used in the attack to open a " back door " allowing the hackers undetected access. The security breach was discovered when customers complained about the usage of their credit cards without their knowledge. The hackers were traced back to Shanghai, China through e-mail address evidence. The credit card information was sent to that same e-mail address. The passwords allowed the hackers to access Umbrella Technology ' s network from a remote location, posing as employees.

Which of the following actions can Adam perform to prevent such attacks from occurring in future?

Options:

A.

Apply different security policy to make passwords of employees more complex.

B.

Replace the VPN access with dial-up modem access to the company ' s network.

C.

Disable VPN access to all employees of the company from home machines

D.

Allow VPN access but replace the standard authentication with biometric authentication.

Buy Now
Questions 73

You are a professional Computer Hacking forensic investigator. You have been called to collect the evidences of Buffer Overflows or Cookie snooping attack. Which of the following logs will you review to accomplish the task?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

System logs

B.

Event logs

C.

Web server logs

D.

Program logs

Buy Now
Questions 74

John used to work as a Network Administrator for We-are-secure Inc. Now he has resigned from the company for personal reasons. He wants to send out some secret information of the company. To do so, he takes an image file and simply uses a tool image hide and embeds the secret file within an image file of the famous actress, Jennifer Lopez, and sends it to his Yahoo mail id. Since he is using the image file to send the data, the mail server of his company is unable to filter this mail. Which of the following techniques is he performing to accomplish his task?

Options:

A.

Email spoofing

B.

Social engineering

C.

Steganography

D.

Web ripping

Buy Now
Questions 75

Which of the following is used to store configuration settings and options on Microsoft Windows operating systems?

Options:

A.

Windows Config file

B.

Group policy editor

C.

Windows setting

D.

Windows Registry

Buy Now
Questions 76

Which of the following is described in the following statement?

" It is a 512 bytes long boot sector that is the first sector of a default boot drive. It is also known as Volume Boot Sector, if the boot drive is un-partitioned. "

Options:

A.

BIOS

B.

SBR

C.

POST

D.

MBR

Buy Now
Questions 77

You work as the Network Administrator for McNeil Inc. The company has a Unix-based network. You want to run a command that forces all the unwritten blocks in the buffer cache to be written to the disk. Which of the following Unix commands can you use to accomplish the task?

Options:

A.

tune2fs

B.

sync

C.

swapoff

D.

swapon

Buy Now
Questions 78

Adam works as a Computer Hacking Forensic Investigator. He has been assigned a project to

investigate child pornography. As the first step, Adam found that the accused is using a Peer-to-peer application to network different computers together over the internet and sharing pornographic materials of children with others. Which of the following are Peer-to-Peer applications?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Gnutella

B.

Kismet

C.

Hamachi

D.

Freenet

Buy Now
Questions 79

John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. He wants to test the effect of a virus on the We-are-secure server. He injects the virus on the server and, as a result, the server becomes infected with the virus even though an established antivirus program is installed on the server. Which of the following do you think are the reasons why the antivirus installed on the server did not detect the virus injected by John?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

The mutation engine of the virus is generating a new encrypted code.

B.

The virus, used by John, is not in the database of the antivirus program installed on the server.

C.

John has created a new virus.

D.

John has changed the signature of the virus.

Buy Now
Questions 80

Which of the following files in LILO booting process of Linux operating system stores the location of Kernel on the hard drive?

Options:

A.

/boot/map

B.

/boot/boot.b

C.

/etc/lilo.conf

D.

/sbin/lilo

Buy Now
Questions 81

You work as a professional Computer Hacking Forensic Investigator. A project has been assigned to you to investigate Plagiarism occurred in the source code files of C#. Which of the following tools will you use to detect the software plagiarism?

Options:

A.

Jplag

B.

Turnitin

C.

VAST

D.

SCAM

Buy Now
Questions 82

Peter works as a Security Administrator for SecureEnet Inc. He observes that the database server of the company has been compromised and the data is stolen. Peter immediately wants to report this crime to the law enforcement authorities. Which of the following organizations looks after the computer crimes investigations in the United States?

Options:

A.

Federal Bureau of Investigation

B.

Local or National office of the US secret service

C.

Incident response team

D.

National Institute of Standards and Technology

Buy Now
Questions 83

John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. He wants to forward all the kernel messages to the remote host having IP address 192.168.0.1. Which of the following changes will he perform in the syslog.conf file to accomplish the task?

Options:

A.

kern.* @192.168.0.1

B.

!*.* @192.168.0.1

C.

*.* @192.168.0.1

D.

!kern.* @192.168.0.1

Buy Now
Questions 84

Fill in the blank with the appropriate file system.

Alternate Data Streams (ADS) is a feature of the_____ file system, which allows more than one data stream to be associated with a filename.

Options:

A.

NTFS

Buy Now
Questions 85

Which of the following is included in a memory dump file?

Options:

A.

Security ID

B.

List of loaded drivers

C.

The kernel-mode call stack for the thread that stopped the process from execution

D.

Stop message and its parameters

Buy Now
Questions 86

Which of the following files starts the initialization process in booting sequence of the Linux operating system?

Options:

A.

/etc/sbin/init

B.

/etc/inittab

C.

/etc/rc/rc.local

D.

/etc/rc/rc.sysinit

Buy Now
Questions 87

Victor works as a professional Ethical Hacker for SecureEnet Inc. He has been assigned a job to test an image, in which some secret information is hidden, using Steganography. Victor performs the following techniques to accomplish the task:

1. Smoothening and decreasing contrast by averaging the pixels of the area where significant color transitions occurs.

2. Reducing noise by adjusting color and averaging pixel value.

3. Sharpening, Rotating, Resampling, and Softening the image.

Which of the following Steganography attacks is Victor using?

Options:

A.

Chosen-Stego Attack

B.

Stegdetect Attack

C.

Steg-Only Attack

D.

Active Attacks

Buy Now
Questions 88

A Web-based credit card company had collected financial and personal details of Mark before issuing him a credit card. The company has now provided Mark ' s financial and personal details to another company. Which of the following Internet laws has the credit card issuing company violated?

Options:

A.

Security law

B.

Privacy law

C.

Copyright law

D.

Trademark law

Buy Now
Questions 89

Your Windows XP hard drive has 2 partitions. The system partition is NTFS and the other is FAT. You wish to encrypt a folder created on the system partition for the purpose of data security. Which of the following statements is true about this situation?

Options:

A.

You can only encrypt files on the NTFS partition.

B.

You can only encrypt files on the FAT partition.

C.

Since the operating system is on the NTFS partition, you can encrypt files on both.

D.

You cannot encrypt files on either partition.

Buy Now
Questions 90

Which of the following can be monitored by using the host intrusion detection system (HIDS)?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Computer performance

B.

System files

C.

File system integrity

D.

Storage space on computers

Buy Now
Questions 91

Which of the following statements is NOT true about FAT16 file system?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

FAT16 file system supports Linux operating system.

B.

FAT16 file system supports file-level compression.

C.

FAT16 file system works well with large disks because the cluster size increases as the disk partition size increases.

D.

FAT16 does not support file-level security.

Buy Now
Questions 92

Which of the following is a formula, practice, process, design, instrument, pattern, or compilation of information which is not generally known, but by which a business can obtain an economic advantage over its competitors?

Options:

A.

Copyright

B.

Utility model

C.

Cookie

D.

Trade secret

Buy Now
Questions 93

You work as the Network Administrator for McNeil Inc. The company has a Unix-based network. You want to set the hard disk geometry parameters, cylinders, heads, and sectors. Which of the following Unix commands can you use to accomplish the task?

Options:

A.

mkfs

B.

mkswap

C.

mke2fs

D.

hdparm

Buy Now
Questions 94

Every network device contains a unique built in Media Access Control (MAC) address, which is used to identify the authentic device to limit the network access. Which of the following addresses is a valid MAC address?

Options:

A.

132.298.1.23

B.

A3-07-B9-E3-BC-F9

C.

F936.28A1.5BCD.DEFA

D.

1011-0011-1010-1110-1100-0001

Buy Now
Questions 95

Which of the following articles defines illegal access to the computer or network in Chapter 2 of Section 1, i.e., Substantive criminal law of the Convention on Cybercrime passed by the Council of Europe?

Options:

A.

Article 2

B.

Article 5

C.

Article 16

D.

Article 3

Buy Now
Exam Code: GCFA
Exam Name: GIACCertified Forensics Analyst
Last Update: Apr 30, 2026
Questions: 318

PDF + Testing Engine

$63.52  $181.49

Testing Engine

$50.57  $144.49
buy now GCFA testing engine

PDF (Q&A)

$43.57  $124.49
buy now GCFA pdf