(Mar-2023) GCFA Exam Dumps Contains FREE Real Quesions from the Actual Exam [Q155-Q170]

4/5 - (2 votes)

(Mar-2023) GCFA Exam Dumps Contains FREE Real Quesions from the Actual Exam

Free Test Engine Verified By GIAC Information Security Certified Experts

QUESTION 155
You are responsible for maintaining and troubleshooting PC’s at your company. The receptionist reports her screen has gone blue. When you get there you notice the ‘blue screen of death’ with an error message NTFS_FILE_SYSTEM. What is the most likely cause of this error?

 
 
 
 

QUESTION 156
Which of the following statements are true about routers?
Each correct answer represents a complete solution. Choose all that apply.

 
 
 
 

QUESTION 157
Which of the following registry hives stores configuration information specific to a particular user who is currently logged on to the computer?

 
 
 
 

QUESTION 158
You are the Security Consultant and have been hired to check security for a client’s network. Your client has stated that he has many concerns but the most critical is the security of Web applications on their Web server. What should be your highest priority then in checking his network?

 
 
 
 

QUESTION 159
Which of the following types of firewall ensures that the packets are part of the established session?

 
 
 
 

QUESTION 160
Which of the following commands is used to enforce checking of a file system even if the file system seems to be clean?

 
 
 
 

QUESTION 161
Adam works as a Security Administrator for Umbrella Technology Inc. He reported a breach in security to his senior members, stating that “security defenses has been breached and exploited for 2 weeks by hackers.” The hackers had accessed and downloaded 50,000 addresses containing customer credit cards and passwords. Umbrella Technology was looking to law enforcement officials to protect their intellectual property. The intruder entered through an employee’s home machine, which was connected to Umbrella Technology’s corporate VPN network. The application called BEAST Trojan was used in the attack to open a “back door” allowing the hackers undetected access. The security breach was discovered when customers complained about the usage of their credit cards without their knowledge. The hackers were traced back to Shanghai, China through e-mail address evidence. The credit card information was sent to that same e-mail address. The passwords allowed the hackers to access Umbrella Technology’s network from a remote location, posing as employees.
Which of the following actions can Adam perform to prevent such attacks from occurring in future?

 
 
 
 

QUESTION 162
Convention on Cybercrime, created by the Council of Europe, is the treaty seeking to address Computer crime and Internet crimes by harmonizing national laws, improving investigative techniques, and increasing cooperation among nations. Which of the following chapters of Convention of Cybercrime contains the provisions for mutual assistances and extradition rules related to cybercrimes?

 
 
 
 

QUESTION 163
Which of the following protocols allows computers on different operating systems to share files and disk storage?

 
 
 
 

QUESTION 164
Adam works as an Incident Handler for Umbrella Inc. He is informed by the senior authorities that the server of the marketing department has been affected by a malicious hacking attack. Supervisors are also claiming that some sensitive data are also stolen. Adam immediately arrived to the server room of the marketing department and identified the event as an incident. He isolated the infected network from the remaining part of the network and started preparing to image the entire system. He captures volatile data, such as running process, ram, and network connections.
Which of the following steps of the incident handling process is being performed by Adam?

 
 
 
 

QUESTION 165
You work as a professional Computer Hacking Forensic Investigator. A project has been assigned to you to investigate Plagiarism occurred in the source code files of C#. Which of the following tools will you use to detect the software plagiarism?

 
 
 
 

QUESTION 166
Which of the following standard technologies is not used to interface hard disk with the computer?

 
 
 
 

QUESTION 167
Which status is a problem, assigned when its cause has been recognized?

 
 
 
 

QUESTION 168
TCP FIN scanning is a type of stealth scanning through which the attacker sends a FIN packet to the target port. If the port is closed, the victim assumes that this packet was sent mistakenly by the attacker and sends the RST packet to the attacker. If the port is open, the FIN packet will be ignored and the port will drop the packet. Which of the following operating systems can be easily identified with the help of TCP FIN scanning?

 
 
 
 

QUESTION 169
Nathan works as a Computer Hacking Forensic Investigator for SecureEnet Inc. He uses Visual TimeAnalyzer software to track all computer usage by logging into individual users account or specific projects and compile detailed accounts of time spent within each program. Which of the following functions are NOT performed by Visual TimeAnalyzer?
Each correct answer represents a complete solution. Choose all that apply.

 
 
 
 

QUESTION 170
You work as a Network Administrator for Tech Perfect Inc. The company has a Linux-based network.
Users complain that they are unable to access resources on the network. However, there was no such problem the previous day. They are receiving the following error messages regularly:
Unable to resolve host name
As your primary step for resolving the issue, which of the following services will you verify whether it is running or not?

 
 
 
 

Use Real GIAC Achieve the GCFA Dumps – 100% Exam Passing Guarantee: https://www.braindumpspass.com/GIAC/GCFA-practice-exam-dumps.html

More Posts

Recent Comments
    Categories

    Post: (Mar-2023) GCFA Exam Dumps Contains FREE Real Quesions from the Actual Exam [Q155-Q170]

    Leave a Reply

    Your email address will not be published. Required fields are marked *

    Enter the text from the image below