This page was exported from Best Free Exam Guide [ http://free.exams4sures.com ]
Export date: Sat Mar 15 2:26:17 2025 / +0000 GMT

Prepare GCFA Question Answers - GCFA Exam Dumps [Q185-Q204]




Prepare GCFA Question Answers - GCFA Exam Dumps

Real GIAC GCFA Exam Questions [Updated 2023]

NEW QUESTION 185
Which of the following statements best describes the consequences of the disaster recovery plan test?

 
 
 
 

NEW QUESTION 186
In 2001, the Council of Europe passed a convention on cybercrime. It was the first international treaty seeking to address computer crime and Internet crimes by harmonizing national laws, improving investigative techniques, and increasing cooperation among nations. On 1 March 2006, the Additional Protocol to the Convention on Cybercrime came into force. Which of the following statements clearly describes this protocol?

 
 
 
 

NEW QUESTION 187
Which of the following is the initiative of United States Department of Justice, which provides state and local law enforcement agencies the tools to prevent Internet crimes against children, and catches the distributors of child pornography on the Internet?

 
 
 
 

NEW QUESTION 188
Peter works as a Security Administrator for SecureEnet Inc. He observes that the database server of the company has been compromised and the data is stolen. Peter immediately wants to report this crime to the law enforcement authorities. Which of the following organizations looks after the computer crimes investigations in the United States?

 
 
 
 

NEW QUESTION 189
Which of the following commands is used to enforce checking of a file system even if the file system seems to be clean?

 
 
 
 

NEW QUESTION 190
Which of the following tools is an asterisk password revealer tool?

 
 
 
 

NEW QUESTION 191
Which of the following directories cannot be placed out of the root filesystem?
Each correct answer represents a complete solution. Choose all that apply.

 
 
 
 

NEW QUESTION 192
Which of the following provides high availability of data?

 
 
 
 

NEW QUESTION 193
Trinity wants to send an email to her friend. She uses the MD5 generator to calculate cryptographic hash of her email to ensure the security and integrity of the email. MD5 generator, which Trinity is using operates in two steps:
* Creates check file
* Verifies the check file
Which of the following MD5 generators is Trinity using?

 
 
 
 

NEW QUESTION 194
Adam works as a Computer Hacking Forensic Investigator. He has been assigned a project to investigate child pornography. As the first step, Adam found that the accused is using a Peer-to-peer application to network different computers together over the internet and sharing pornographic materials of children with others. Which of the following are Peer-to-Peer applications?
Each correct answer represents a complete solution. Choose all that apply.

 
 
 
 

NEW QUESTION 195
Which of the following are the two different file formats in which Microsoft Outlook saves e-mail messages based on system configuration?
Each correct answer represents a complete solution. Choose two.

 
 
 
 

NEW QUESTION 196
John works as a contract Ethical Hacker. He has recently got a project to do security checking for www.we-are-secure.com. He wants to find out the operating system of the we-are-secure server in the information gathering step. Which of the following commands will he use to accomplish the task?
Each correct answer represents a complete solution. Choose two.

 
 
 
 

NEW QUESTION 197
John is a black hat hacker. FBI arrested him while performing some email scams. Under which of the following US laws will john be charged?

 
 
 
 

NEW QUESTION 198
Which of the following are the two different file formats in which Microsoft Outlook saves e-mail messages based on system configuration?
Each correct answer represents a complete solution. Choose two.

 
 
 
 

NEW QUESTION 199
Allen works as a professional Computer Hacking Forensic Investigator. A project has been assigned to him to investigate a computer, which is used by the suspect to sexually harass the victim using instant messenger program. Suspect’s computer runs on Windows operating system. Allen wants to recover password from instant messenger program, which suspect is using, to collect the evidence of the crime. Allen is using Helix Live for this purpose. Which of the following utilities of Helix will he use to accomplish the task?

 
 
 
 

NEW QUESTION 200
Sandra, a novice computer user, works on Windows environment. She experiences some problem regarding bad sectors formed in a hard disk of her computer. She wants to run CHKDSK command to check the hard disk for bad sectors and to fix the errors, if any, occurred. Which of the following switches will she use with CHKDSK command to accomplish the task?

 
 
 
 

NEW QUESTION 201
What are the purposes of audit records on an information system?
Each correct answer represents a complete solution. Choose two.

 
 
 
 

NEW QUESTION 202
Adam works as a professional Computer Hacking Forensic Investigator. A project has been assigned to him to investigate an iphone, which is being seized from a criminal. The local police suspect that this iphone contains some sensitive information. Adam knows that the storage partition of the iphone is divided into two partitions. The first partition is used for the operating system. Other data of iphone is stored in the second partition. Which of the following is the name with which the second partition is mounted on the iphone?

 
 
 
 

NEW QUESTION 203
Which of the following types of evidence is considered as the best evidence?

 
 
 
 

NEW QUESTION 204
Peter works as a Technical Representative in a CSIRT for SecureEnet Inc. His team is called to investigate the computer of an employee, who is suspected for classified data theft. Suspect’s computer runs on Windows operating system. Peter wants to collect data and evidences for further analysis. He knows that in Windows operating system, the data is searched in pre-defined steps for proper and efficient analysis. Which of the following is the correct order for searching data on a Windows based system?

 
 
 
 

GCFA Exam Dumps Pass with Updated 2023: https://www.exams4sures.com/GIAC/GCFA-practice-exam-dumps.html

Post date: 2023-06-05 09:22:13
Post date GMT: 2023-06-05 09:22:13
Post modified date: 2023-06-05 09:22:13
Post modified date GMT: 2023-06-05 09:22:13