Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

GIAC GCFA - GIACCertified Forensics Analyst

Page: 6 / 10
Total 318 questions

Jason, a game lover, owns an Apple's iPod nano. He wants to play games on his iPod. He also wants to improve the quality of the audio recording of his iPod. Which of the following steps can Jason take to accomplish the task?

A.

Install iPodLinux.

B.

Install third party software.

C.

Upgrade Apple's firmware.

D.

Buy external add-ons.

Which of the following statements is NOT true about FAT16 file system?

Each correct answer represents a complete solution. Choose all that apply.

A.

FAT16 file system supports Linux operating system.

B.

FAT16 file system supports file-level compression.

C.

FAT16 file system works well with large disks because the cluster size increases as the disk partition size increases.

D.

FAT16 does not support file-level security.

John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. He wants to forward all the kernel messages to the remote host having IP address 192.168.0.1. Which of the following changes will he perform in the syslog.conf file to accomplish the task?

A.

kern.* @192.168.0.1

B.

!*.* @192.168.0.1

C.

*.* @192.168.0.1

D.

!kern.* @192.168.0.1

In Linux, which of the following files describes the processes that are started up during boot up?

A.

/etc/passwd

B.

/etc/profile

C.

/etc/inittab

D.

/etc/shadow

Every network device contains a unique built in Media Access Control (MAC) address, which is used to identify the authentic device to limit the network access. Which of the following addresses is a valid MAC address?

A.

132.298.1.23

B.

A3-07-B9-E3-BC-F9

C.

F936.28A1.5BCD.DEFA

D.

1011-0011-1010-1110-1100-0001

Which of the following cryptographic methods are used in EnCase to ensure the integrity of the data, which is acquired for the investigation?

Each correct answer represents a complete solution. Choose two.

A.

MD5

B.

CRC

C.

HAVAL

D.

Twofish

Peter, an expert computer user, attached a new sound card to his computer. He then restarts the computer, so that the BIOS can scan the hardware changes. What will be the memory range of ROM that the BIOS scan for additional code to be executed for proper working of soundcard?

A.

hC800 to hDF80

B.

hCA79 to hAC20

C.

hAA43 to hF345

D.

hDF80 to hFF80

Which of the following statutes is enacted in the U.S., which prohibits creditors from collecting data from applicants, such as national origin, caste, religion etc?

A.

The Electronic Communications Privacy Act

B.

The Privacy Act

C.

The Fair Credit Reporting Act (FCRA)

D.

The Equal Credit Opportunity Act (ECOA)

In a Windows 98 computer, which of the following utilities is used to convert a FAT16 partition to FAT32?

A.

CVT16.EXE

B.

CVT1.EXE

C.

CONVERT16.EXE

D.

CONVERT.EXE

Which of the following are the two different file formats in which Microsoft Outlook saves e-mail messages based on system configuration?

Each correct answer represents a complete solution. Choose two.

A.

.pst

B.

.xst

C.

.txt

D.

.ost