Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

GIAC GCFA - GIACCertified Forensics Analyst

Page: 5 / 10
Total 318 questions

Adam, a malicious hacker has successfully gained unauthorized access to the Linux system of

Umbrella Inc. Web server of the company runs on Apache. He has downloaded sensitive documents and database files from the computer. After performing these malicious tasks, Adam finally runs the following command on the Linux command box before disconnecting. for (( i = 0;i<11;i++ )); do

dd if=/dev/random of=/dev/hda && dd if=/dev/zero of=/dev/hda done

Which of the following actions does Adam want to perform by the above command?

A.

Making a bit stream copy of the entire hard disk for later download.

B.

Deleting all log files present on the system.

C.

Wiping the contents of the hard disk with zeros.

D.

Infecting the hard disk with polymorphic virus strings.

You want to upgrade a partition in your computer's hard disk drive from FAT to NTFS. Which of the following DOS commands will you use to accomplish this?

A.

FORMAT C: /s

B.

CONVERT C: /fs:ntfs

C.

SYS C:

D.

FDISK /mbr

Adam works as a Security Administrator for Umbrella Inc. He is responsible for securing all 15 servers of the company. To successfully accomplish the task, he enables the hardware and software firewalls and disables all unnecessary services on all the servers. Sales manager of the company asks Adam to run emulation software on one of the servers that requires the telnet service to function properly. Adam is concerned about the security of the server, as telnet can be a very large security risk in an organization. Adam decides to perform some footprinting, scanning, and penetration testing on the server to checkon the server to check the security. Adam telnets into the server and writes the following command:

HEAD / HTTP/1.0

After pressing enter twice, Adam gets the following results:

Which of the following tasks has Adam just accomplished?

A.

Poisoned the local DNS cache of the server.

B.

Submitted a remote command to crash the server.

C.

Grabbed the banner.

D.

Downloaded a file to his local computer.

Which of the following directories in Linux operating system contains device files, which refers to physical devices?

A.

/boot

B.

/etc

C.

/dev

D.

/bin

Which of the following tools can be used to perform a whois query?

Each correct answer represents a complete solution. Choose all that apply.

A.

Sam Spade

B.

SuperScan

C.

Traceroute

D.

WsPingPro

Adam works as a professional Computer Hacking Forensic Investigator. A project has been assigned to him to investigate the BlackBerry, which is suspected to be used to hide some important information. Which of the following is the first step taken to preserve the information in forensic investigation of the BlackBerry?

A.

Keep BlackBerry in 'ON' state.

B.

Remove the storage media.

C.

Eliminate the ability of the device to receive the push data.

D.

Turn off the BlackBerry.

Which of the following is the process of comparing cryptographic hash functions of system executables and configuration files?

A.

Spoofing

B.

File integrity auditing

C.

Reconnaissance

D.

Shoulder surfing

Which of the following is the process of overwriting all addressable locations on a disk?

A.

Drive wiping

B.

Spoofing

C.

Sanitization

D.

Authentication

An organization wants to mitigate the risks associated with the lost or stolen laptops and the associated disclosure laws, while reporting data breaches. Which of the following solutions will be best for the organization?

A.

Hashing function

B.

Digital signature

C.

Trusted Platform Module

D.

Whole disk encryption

Which of the following files in LILO booting process of Linux operating system stores the location of Kernel on the hard drive?

A.

/boot/map

B.

/boot/boot.b

C.

/etc/lilo.conf

D.

/sbin/lilo