Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

GIAC GCFA - GIACCertified Forensics Analyst

Page: 4 / 10
Total 318 questions

Which of the following is the correct order of loading system files into the main memory of the system, when the computer is running on Microsoft's Windows XP operating system?

A.

NTLDR, BOOT.ini, HAL.dll, NTDETECT.com, NTOSKRNL.exe

B.

NTLDR, BOOT.ini, NTDETECT.com, HAL.dll, NTOSKRNL.exe

C.

NTLDR, BOOT.ini, HAL.dll, NTDETECT.com, NTOSKRNL.exe

D.

BOOT.ini, HAL.dll, NTDETECT.com, NTLDR, NTOSKRNL.exe

Adam works as a Computer Hacking Forensic Investigator for a garment company in the United States. A project has been assigned to him to investigate a case of a disloyal employee who is suspected of stealing design of the garments, which belongs to the company and selling those garments of the same design under different brand name. Adam investigated that the company does not have any policy related to the copy of design of the garments. He also investigated that the trademark under which the employee is selling the garments is almost identical to the original trademark of the company. On the grounds of which of the following laws can the employee be prosecuted?

A.

Trademark law

B.

Cyber law

C.

Copyright law

D.

Espionage law

A firewall is a combination of hardware and software, used to provide security to a network. It is used to protect an internal network or intranet against unauthorized access from the Internet or other outside networks. It restricts inbound and outbound access and can analyze all traffic between an internal network and the Internet. Users can configure a firewall to pass or block packets from specific IP addresses and ports. Which of the following tools works as a firewall for the Linux 2.4 kernel?

A.

OpenSSH

B.

IPTables

C.

IPChains

D.

Stunnel

Which of the following are the primary goals of the incident handling team?

Each correct answer represents a complete solution. Choose all that apply.

A.

Prevent any further damage.

B.

Freeze the scene.

C.

Repair any damage caused by an incident.

D.

Inform higher authorities.

Which of the following switches of the XCOPY command copies attributes while copying files?

A.

/o

B.

/p

C.

/k

D.

/s

Adam works as a professional Computer Hacking Forensic Investigator. A project has been assigned to him to investigate the main server of SecureEnet Inc. The server runs on Debian Linux operating system. Adam wants to investigate and review the GRUB configuration file of the server system.

Which of the following files will Adam investigate to accomplish the task?

A.

/boot/grub/menu.lst

B.

/boot/grub/grub.conf

C.

/boot/boot.conf

D.

/grub/grub.com

Which of the following attacks saturates network resources and disrupts services to a specific computer?

A.

Teardrop attack

B.

Polymorphic shell code attack

C.

Denial-of-Service (DoS) attack

D.

Replay attack

Mark works as a Network Administrator for Net Perfect Inc. The company has a Linux-based network. Mark installs a Checkpoint Firewall NGX on a SecurePlatform device. He performs a scheduled backup of his system settings and products configuration. Where are these backup files stored?

Each correct answer represents a complete solution. Choose all that apply.

A.

SCP

B.

TFTP

C.

Locally on the SecurePlatform machine hard drive

D.

On a PC in a file named userC

Which of the following types of evidence proves or disproves a specific act through oral testimony based on information gathered through the witness's five senses?

A.

Conclusive evidence

B.

Best evidence

C.

Hearsay evidence

D.

Direct evidence

Which of the following IP addresses are private addresses?

Each correct answer represents a complete solution. Choose all that apply.

A.

19.3.22.17

B.

192.168.15.2

C.

192.166.54.32

D.

10.0.0.3