Free Certification Practice Questions

GIAC-GCFA

Loading…
You are the Network Administrator and your company has recently implemented encryption for all emails. You want to check to make sure that the email packages are being encrypted. What tool would you use to accomplish this?
#31
Which of the following file systems contains hardware settings of a Linux computer?
#32
Which of the following is a set of exclusive rights granted by a state to an inventor or his assignee for a fixed period of time in exchange for the disclosure of an invention?
#33
Adam works as a professional Computer Hacking Forensic Investigator. A project has been assigned to him to investigate the main server of SecureEnet Inc. The server runs on Debian Linux operating system. Adam wants to investigate and review the GRUB configuration file of the server system.Which of the following files will Adam investigate to accomplish the task?
#34
Which utility enables you to access files from a Windows .CAB file?
#35
Which of the following anti-child pornography organizations helps local communities to create programs and develop strategies to investigate child exploitation?
#36
Your network has a Windows 2000 Server computer with FAT file system, shared by several users.This system stores sensitive data. You decide to encrypt this data to protect it from unauthorized access. You want to accomplish the following goals:✑ Data should be secure and encrypted.✑ Administrative efforts should be minimum.✑ You should have the ability to recover encrypted files in case the file owner leaves the company.✑ Other permissions on encrypted files should be unaffected.✑ File-level security is required on the disk where data is stored.✑ Encrypting or decrypting of files should not be the responsibility of the file owner.You take the following steps to accomplish these goals :✑ Convert the FAT file system to Windows 2000 NTFS file system.✑ Use Encrypting File System (EFS) to encrypt data.Which of the following goals will you be able to accomplish?Each correct answer represents a complete solution. Choose all that apply. E. Administrative efforts are minimum. F. Other permissions on encrypted files are unaffected.
#37
Which of the following statements are true about Compact Disc (CD) and Digital Versatile Disk (DVD)?Each correct answer represents a complete solution. Choose all that apply.
#38
Sandra wants to create a full system state backup of her computer, which is running on Microsoft Windows XP operating system. Which of the following is saved in full state system backup?Each correct answer represents a complete solution. Choose all that apply.
#39
John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He traceroutes the We-are- secure server and gets the following result:Considering the above traceroute result, which of the following statements can be true?Each correct answer represents a complete solution. Choose all that apply.
#40
Which of the following command line tools are available in Helix Live acquisition tool on Windows?Each correct answer represents a complete solution. Choose all that apply.
#41
Which of the following tools is used to extract human understandable interpretation from the computer binary files?
#42
Which of the following statements are true about routers?Each correct answer represents a complete solution. Choose all that apply.
#43
Which of the following type of files is NOT deleted by Disk Cleanup program of Windows XP?
#44
Which of the following tools is used to restore deleted files from Linux and Mac OS X file system?
#45
Which of the following Windows XP system files handles memory management, I/O operations, and interrupts?
#46
Which of the following representatives of incident response team takes forensic backups of the systems that are the focus of the incident?
#47
Which of the following statements is true for a file in the UNIX operating system?
#48
You work as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. You are creating a user account by using the USERADD command. Which of the following entries cannot be used for specifying a user ID?Each correct answer represents a complete solution. Choose all that apply.
#49