Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

GIAC GCFA - GIACCertified Forensics Analyst

Page: 8 / 10
Total 318 questions

You work as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. You are working as a root user on the Linux operating system. While performing some security investigation, you want to see the hostname and IP address from where users logged in.

Which of the following commands will you use to accomplish the task?

A.

Dig

B.

Netstat

C.

Nslookup

D.

Last

Which of the following types of evidence is considered as the best evidence?

A.

The original document

B.

A copy of the original document

C.

A computer-generated record

D.

Information gathered through the witness's senses

On your dual booting computer, you want to set Windows 98 as the default operating system at startup. In which file will you define this?

A.

NTBOOTDD.SYS

B.

BOOT.INI

C.

NTDETECT.COM

D.

BOOTSECT.DOS

Which of the following is included in a memory dump file?

A.

Security ID

B.

List of loaded drivers

C.

The kernel-mode call stack for the thread that stopped the process from execution

D.

Stop message and its parameters

You work as a Network Administrator for NetTech Inc. The company has a network that consists of 200 client computers and ten database servers. One morning, you find that an unauthorized user is accessing data on a database server on the network. Which of the following actions will you take to preserve the evidences?

Each correct answer represents a complete solution. Choose three.

A.

Prevent the company employees from entering the server room.

B.

Detach the network cable from the database server.

C.

Prevent a forensics experts team from entering the server room.

D.

Preserve the log files for a forensics expert.

Which of the following encryption methods use the RC4 technology?

Each correct answer represents a complete solution. Choose all that apply.

A.

Dynamic WEP

B.

TKIP

C.

Static WEP

D.

CCMP

You want to perform passive footprinting against we-are-secure Inc. Web server. Which of the following tools will you use?

A.

Netcraft

B.

Ettercap

C.

Ethereal

D.

Nmap

Which of the following commands can you use to create an ext3 file system?

Each correct answer represents a complete solution. Choose two.

A.

mke2fs

B.

mkfs.ext3

C.

mke2fs -j

D.

mkfs.ext2

John works as a professional Ethical Hacker. He is assigned a project to test the security of www.weare-secure.com. He enters a single quote in the input field of the login page of the We-are-secure Web site and receives the following error message:

Microsoft OLE DB Provider for ODBC Drivers error '0x80040E14'

This error message shows that the We-are-secure Website is vulnerable to __________.

A.

An XSS attack

B.

A SQL injection attack

C.

A Denial-of-Service attack

D.

A buffer overflow

Which of the following is NOT an example of passive footprinting?

A.

Querying the search engine.

B.

Analyzing job requirements.

C.

Scanning ports.

D.

Performing the whois query.