GIAC GCFA - GIACCertified Forensics Analyst
Which of the following directories contains administrative commands and daemon processes in the Linux operating system?
You want to retrieve information whether your system is in promiscuous mode or not. Which of the following commands will you use?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following statements about registry is true?
Each correct answer represents a complete solution. Choose three.
Which of the following registry hives stores configuration information specific to a particular user who is currently logged on to the computer?
In the United States, Title VII of the 1964 Civil Rights Act was formulated to protect an employee from discrimination on the basis of religion, color, race, national origin, and sex. This law makes discrimination in employment illegal. Which of the following was the original emphasis of the Act?
Which of the following Incident handling process phases is responsible for defining rules, collaborating human workforce, creating a back-up plan, and testing the plans for an enterprise?
You are responsible for maintaining and troubleshooting PC's at your company. The receptionist reports her screen has gone blue. When you get there you notice the 'blue screen of death' with an error message NTFS_FILE_SYSTEM. What is the most likely cause of this error?
Which of the following U.S. Federal laws addresses computer crime activities in communication lines, stations, or systems?
Which of the following Windows XP system files handles memory management, I/O operations, and interrupts?
You work as a Network Administrator for a bank. For securing the bank's network, you configure a firewall and an IDS. In spite of these security measures, intruders are able to attack the network. After a close investigation, you find that your IDS is not configured properly and hence is unable to generate alarms when needed. What type of response is the IDS giving?