Leads4pass > GIAC > GIAC Certifications > GCFA > GCFA Online Practice Questions and Answers

GCFA Online Practice Questions and Answers

Questions 4

You work as a professional Computer Hacking Forensic Investigator for DataEnet Inc. You want to investigate e-mail information of an employee of the company. The suspected employee is using an online e-mail system such as Hotmail or Yahoo. Which of the following folders on the local computer will you review to accomplish the task?

Each correct answer represents a complete solution. Choose all that apply.

A. History folder

B. Temporary Internet Folder

C. Download folder

D. Cookies folder

Buy Now
Questions 5

Which of the following tools are used for footprinting?

Each correct answer represents a complete solution. Choose all that apply.

A. Sam spade

B. Traceroute

C. Whois

D. Brutus

Buy Now
Questions 6

Which of the following parameters is NOT used for calculating the capacity of the hard disk?

A. Bytes per sector

B. Number of heads

C. Total number of sectors

D. Number of platters

Buy Now
Questions 7

Which of the following prevents malicious programs from attacking a system?

A. Anti-virus program

B. Smart cards

C. Biometric devices

D. Firewall

Buy Now
Questions 8

Adam works as a professional Computer Hacking Forensic Investigator. A project has been assigned to him to investigate the main server of SecureEnet Inc. The server runs on Debian Linux operating system. Adam wants to investigate and review the GRUB configuration file of the server system.

Which of the following files will Adam investigate to accomplish the task?

A. /boot/grub/menu.lst

B. /boot/grub/grub.conf

C. /boot/boot.conf

D. /grub/grub.com

Buy Now
Questions 9

Which of the following file systems is used by both CD and DVD?

A. Network File System (NFS)

B. New Technology File System (NTFS)

C. Compact Disk File System (CDFS)

D. Universal Disk Format (UDF)

Buy Now
Questions 10

Peter works as a Security Administrator for SecureEnet Inc. He observes that the database server of the company has been compromised and the data is stolen. Peter immediately wants to report this crime to the law enforcement authorities. Which of the following organizations looks after the computer crimes investigations in the United States?

A. Federal Bureau of Investigation

B. Local or National office of the US secret service

C. Incident response team

D. National Institute of Standards and Technology

Buy Now
Questions 11

Which of the following cryptographic methods are used in EnCase to ensure the integrity of the data, which is acquired for the investigation? Each correct answer represents a complete solution. Choose two.

A. MD5

B. CRC

C. HAVAL

D. Twofish

Buy Now
Questions 12

What is the name of the Secondary IDE slave, fourth partition in Linux operating system according to the Linux naming convention?

A. SDB3

B. HDC4

C. HDA4

D. HDD4

Buy Now
Questions 13

Adrian, the Network Administrator for Peach Tree Inc., wants to install a new computer on the company's network. He asks his assistant to make a boot disk with minimum files. The boot disk will be used to boot the computer, which does not have an operating system installed, yet. Which of the following files will he include on the disk?

A. IO.SYS, MSDOS.SYS, COMMAND.COM, and AUTOEXEC.BAT.

B. IO.SYS, MSDOS.SYS, and COMMAND.COM.

C. IO.SYS, MSDOS.SYS, COMMAND.COM, and CONFIG.SYS.

D. IO.SYS, MSDOS.SYS, COMMAND.COM, and FDISK.

Buy Now
Exam Code: GCFA
Exam Name: GIAC Certified Forensics Analyst (GCFA)
Last Update: Jan 12, 2025
Questions: 318
10%OFF Coupon Code: SAVE10

PDF (Q&A)

$49.99

VCE

$55.99

PDF + VCE

$65.99