GIAC GCFA Study Material, Prompt Updates GIAC GCFA Certification Online

Flydumps provides guarantee of GIAC https://www.pass4itsure.com/gcfa.html exam because Flydumps is an authenticated IT certifications site and the high class of the products are developed due to extensive hiring of the experts staff. GIAC GCFA study guide is updated with regular basis and the answers are rechecked of every exam.What’s more,you can download the free demos in PDF file,it would be a great help for your exam.All the dumps are updated and cover every aspect of the examination.

QUESTION NO: 26
An executive in your company reports odd behavior on her PDA. After investigation you discover that a trusted device is actually copying data off the PDA. The executive tells you that the behavior started shortly after accepting an e-business card from an unknown person. What type of attack is this?

A. Session Hijacking
B. Bluesnarfing
C. PDA Hijacking
D. Privilege Escalation
Answer: B
QUESTION NO: 27
You work as a Network Administrator for Net Perfect Inc. The company has a Windows Server 2008 network environment. The network is configured as a Windows Active Directory-based single forest single domain network. The network is configured on IP version 6 protocol. All the computers on the network are connected to a switch device. One day, users complain that they are unable to connect to a file server. You try to ping the client computers from the server, but the pinging fails. You try to ping the server’s own loopback address, but it fails to ping. You restart the server, but the problem persists.
What is the most likely cause?
A. The cable that connects the server to the switch is broken.
B. Automatic IP addressing is not working.
C. The switch device is not working.
D. The server is configured with unspecified IP address.
E. The server’s NIC is not working.
Answer: E
QUESTION NO: 28
You want to upgrade a partition in your computer’s hard disk drive from FAT to NTFS. Which of the following DOS commands will you use to accomplish this?
A. FORMAT C: /s
B. CONVERT C: /fs:ntfs
C. SYS C:
D. FDISK /mbr
Answer: B QUESTION NO: 29
A firewall is a combination of hardware and software, used to provide security to a network. It is used to protect an internal network or intranet against unauthorized access from the Internet or other outside networks. It restricts inbound and outbound access and can analyze all traffic between an internal network and the Internet. Users can configure a firewall to pass or block packets from specific IP addresses and ports. Which of the following tools works as a firewall for the Linux 2.4 kernel?
A. OpenSSH
B. IPTables
C. IPChains
D. Stunnel
Answer: B
QUESTION NO: 30
You work as a Web developer for ABC Inc. You want to investigate the Cross-Site Scripting attack on your company’s Web site. Which of the following methods of investigation can you use to accomplish the task?
Each correct answer represents a complete solution. Choose all that apply.
A. Review the source of any HTML-formatted e-mail messages for embedded scripts or links in the URL to the company’s site.
B. Look at the Web server’s logs and normal traffic logging.
C. Use Wireshark to capture traffic going to the server and then searching for the requests going to the input page, which may give log of the malicious traffic and the IP address of the source.
D. Use a Web proxy to view the Web server transactions in real time and investigate any communication with outside servers.
Answer: A,B,D
QUESTION NO: 31
Adam works as a professional Penetration tester. A project has been assigned to him to employ penetration testing on the network of Umbrella Inc. He is running the test from home and had downloaded every security scanner from the Internet. Despite knowing the IP range of all of the systems, and the exact network configuration, Adam is unable to get any useful results.
Which of the following is the most like cause of this problem?

Each correct answer represents a complete solution. Choose all that apply.
A. Security scanners are only as smart as their database and cannot find unpublished vulnerabilities.
B. Security scanners cannot perform vulnerability linkage.
C. Security scanners are smart as their database and can find unpublished vulnerabilities.
D. Security scanners are not designed to do testing through a firewall.
Answer: A,B,D
QUESTION NO: 32
An organization monitors the hard disks of its employees’ computers from time to time. Which policy does this pertain to?
A. Network security policy
B. User password policy
C. Privacy policy
D. Backup policy
Answer: C
QUESTION NO: 33
You work as a Network Administrator for Net World International. You have configured the hard disk drive of your computer as shown in the image below:

The computer is configured to dual-boot with Windows 2000 Server and Windows 98. While

working on Windows 2000 Server, you save a file on the 6GB partition. You are unable to find the file while working on Windows 98. You are not even able to access the partition on which the file is saved. What is the most likely cause?
A. The file is corrupt.
B. The 6GB partition is corrupt.
C. Windows 98 does not support the NTFS file system.
D. Files saved in Windows 98 are not supported by Windows 2000.
Answer: C
QUESTION NO: 34
Peter works as a Computer Hacking Forensic Investigator. He has been called by an organization to conduct a seminar to give necessary information related to sexual harassment within the work place. Peter started with the definition and types of sexual harassment. He then wants to convey that it is important that records of the sexual harassment incidents should be maintained, which helps in further legal prosecution. Which of the following data should be recorded in this documentation?
Each correct answer represents a complete solution. Choose all that apply.
A. Names of the victims
B. Date and time of incident
C. Nature of harassment
D. Location of each incident
Answer: A,B,D

QUESTION NO: 35
Which of the following types of computers is used for attracting potential intruders?
A. Bastion host
B. Data pot
C. Files pot
D. Honey pot
Answer: D
QUESTION NO: 36

Which of the following standard file formats is used by Apple’s iPod to store contact information?
A. HFS+
B. hCard
C. vCard
D. FAT32
Answer: C
QUESTION NO: 37
Which of the following file systems cannot be used to install an operating system on the hard disk drive?
Each correct answer represents a complete solution. Choose two.
A. Windows NT file system (NTFS)
B. High Performance File System (HPFS)
C. Log-structured file system (LFS)
D. Compact Disc File System (CDFS)
E. Novell Storage Services (NSS)
Answer: C,D
QUESTION NO: 38
Which of the following types of evidence proves or disproves a specific act through oral testimony based on information gathered through the witness’s five senses?
A. Conclusive evidence
B. Best evidence
C. Hearsay evidence
D. Direct evidence
Answer: D QUESTION NO: 39
Which of the following two cryptography methods are used by NTFS Encrypting File System (EFS) to encrypt the data stored on a disk on a file-by-file basis?
A. Digital certificates
B. Public key
C. RSA
D. Twofish
Answer: A,B
QUESTION NO: 40
Which of the following sections of an investigative report covers the background and summary of the report including the outcome of the case and the list of allegations?
A. Section 2
B. Section 4
C. Section 3
D. Section 1
Answer: A
QUESTION NO: 41
Which of the following switches of the XCOPY command copies attributes while copying files?
A. /o
B. /p
C. /k

D. /s
Answer: D
QUESTION NO: 42
Which of the following directories in Linux operating system contains device files, which refers to physical devices?

A. /boot
B. /etc
C. /dev
D. /bin
Answer: C
QUESTION NO: 43
Which of the following directories cannot be placed out of the root filesystem?
Each correct answer represents a complete solution. Choose all that apply.
A. /sbin
B. /etc
C. /var
D. /lib
Answer: A,B,D
QUESTION NO: 44
On which of the following locations does the Windows NT/2000 operating system contain the SAM, SAM.LOG, SECURITY.LOG, APPLICATION.LOG, and EVENT.LOG files?
A. \%Systemroot%system32
B. \%Systemroot%profiles
C. \%Systemroot%system32config
D. \%Systemroot%help
Answer: C
QUESTION NO: 45
You are handling technical support calls for an insurance company. A user calls you complaining that he cannot open a file, and that the file name appears in green while opening in Windows Explorer.
What does this mean?

A. The file is encrypted.
B. The file belongs to another user.
C. The file is infected with virus.
D. The file is compressed.
Answer: A

GIAC GCFA study materials is a product you can trust for timely, prompt and successful preparation of IT Certifications. Once you go through the Pass4itSure Microsoft certification exam GIAC https://www.pass4itsure.com/gcfa.html study materials thoroughly, it’s guaranteed that you will pass your GIAC GCFA exam at the first shot. The Pass4itSure GIAC GCFA study materials have designed and prepared the training kit for GIAC GCFA test. It’s designed to be relevant in today’s rapidly changing IT marketplace, GIAC GCFA study materials help you utilize evolving technologies, GIAC GCFA study materials you’re troubleshooting skills, and improve your job satisfaction.