EnsurePass
Exam Dumps
GCFA Dumps VCE and PDF
2019 GCFA Dumps Practice Exams

QUESTION 51

Which of the following file systems is designed by Sun Microsystems?

 

A.

NTFS

B.

CIFS

C.

ext2

D.

ZFS

 

Correct Answer: D

 

 

QUESTION 52

Mark works as a Network Administrator for Net Perfect Inc. The company has a Linux-based network. Mark installs a Checkpoint Firewall NGX on a SecurePlatform device. He performs a scheduled backup of his system settings and products configuration. Where are these backup files stored? Each correct answer represents a complete solution. Choose all that apply.

 

A.

SCP

B.

TFTP

C.

Locally on the SecurePlatform machine hard drive

D.

On a PC in a file named userC

 

Correct Answer: ABC

 

 

QUESTION 53

Which of the following evidences are the collection of facts that, when considered together, can be used to infer a conclusion about the malicious activity/person?

 

A.

Corroborating

B.

Circumstantial

C.

Incontrovertible

D.

Direct

 

Correct Answer: B

 

 

QUESTION 54

You are working with a team that will be bringing in new computers to a sales department at a company. The sales team would like to keep not only their old files, but system settings as well on the new PC’s. What should you do?

 

A.

Use the Disk Management tool to move everything to the new computer.

B.

Copy the files and the Windows Registry to a removable media then copy it onto the new machines.

C.

Do a system backup (complete) on each old machine, then restore it onto the new machines

D.

Use the User State Migration tool to move the system settings and files to the new machines.

 

Correct Answer: D

 

 

 

 

QUESTION 55

CORRECT TEXT

Maria works as a professional Ethical Hacker. She recently got a project to test the security of www.we-are-secure.com. Arrange the three pre-test phases of the attack to test the security of weare-secure.

 

Correct Answer:

image006

 

 

QUESTION 56

By gaining full control of router, hackers often acquire full control of the network. Which of the following methods are commonly used to attack Routers? Each correct answer represents a complete solution. Choose all that apply.

 

A.

By launching Social Engineering attack

B.

By launching Max Age attack

C.

Route table poisoning

D.

By launching Sequence++ attack

 

Correct Answer: BCD

 

 

QUESTION 57

Which of the following is the process of comparing cryptographic hash functions of system executables and configuration files?

 

A.

Spoofing

B.

File integrity auditing

C.

Reconnaissance

D.

Shoulder surfing

 

Correct Answer: B

 

 

QUESTION 58

Which of the following are the primary goals of the incident handling team? Each correct answer represents a complete solution. Choose all that apply.

 

A.

Prevent any further damage.

B.

Freeze the scene.

C.

Repair any damage caused by an incident.

D.

Inform higher authorities.

 

Correct Answer: ABC

 

 

QUESTION 59

Which of the following is the correct order of digital investigations Standard Operating Procedure (SOP)?

 

A.

Initial analysis, request for service, data collection, data analysis, data reporting

B.

Initial analysis, request for service, data collection, data reporting, data analysis

C.

Request for service, initial analysis, data collection, data reporting, data analysis

D.

Request for service, initial analysis, data collection, data analysis, data reporting

 

Correct Answer: D

 

 

QUESTION 60

Which of the following is the initiative of United States Department of Justice, which provides state and local law enforcement agencies the tools to prevent Internet crimes against children, and catches the distributors of child pornography on the Internet?

 

A.

Innocent Images National Initiative (IINI)

B.

Internet Crimes Against Children (ICAC)

C.

Project Safe Childhood (PSC)

D.

Anti-Child Porn.org (ACPO)

 

Correct Answer: B

Comments are closed.