Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

GIAC GCFA - GIACCertified Forensics Analyst

Page: 1 / 10
Total 318 questions

Which of the following directories contains administrative commands and daemon processes in the Linux operating system?

A.

/etc

B.

/dev

C.

/usr

D.

/sbin

You want to retrieve information whether your system is in promiscuous mode or not. Which of the following commands will you use?

Each correct answer represents a complete solution. Choose all that apply.

A.

grep Promisc /var/log/messages

B.

ip link

C.

ifconfig | grep PROMISC

D.

show promisc

Which of the following statements about registry is true?

Each correct answer represents a complete solution. Choose three.

A.

It is divided in many areas known as hives.

B.

It was first introduced with Windows 95 operating system.

C.

It is a centralized configuration database that stores information related to a Windows computer.

D.

It can be edited using SCANREG utility.

Which of the following registry hives stores configuration information specific to a particular user who is currently logged on to the computer?

A.

HKEY_USERS

B.

HKEY_CURRENT_USER

C.

HKEY_LOCAL_MACHINE

D.

HKEY_CLASSES_ROOT

In the United States, Title VII of the 1964 Civil Rights Act was formulated to protect an employee from discrimination on the basis of religion, color, race, national origin, and sex. This law makes discrimination in employment illegal. Which of the following was the original emphasis of the Act?

A.

Protect fundamental rights of an employee

B.

Equal position to all employees

C.

Protect woman in the workplace

D.

Prevent child pornography

Which of the following Incident handling process phases is responsible for defining rules, collaborating human workforce, creating a back-up plan, and testing the plans for an enterprise?

A.

Recovery phase

B.

Eradication phase

C.

Identification phase

D.

Containment phase

E.

Preparation phase

You are responsible for maintaining and troubleshooting PC's at your company. The receptionist reports her screen has gone blue. When you get there you notice the 'blue screen of death' with an error message NTFS_FILE_SYSTEM. What is the most likely cause of this error?

A.

The hard disk is corrupt

B.

A virus

C.

Windows was installed improperly.

D.

Get the latest patch for Windows.

Which of the following U.S. Federal laws addresses computer crime activities in communication lines, stations, or systems?

A.

18 U.S.C. 1030

B.

18 U.S.C. 1362

C.

18 U.S.C. 2701

D.

18 U.S.C. 2510

E.

18 U.S.C. 1029

Which of the following Windows XP system files handles memory management, I/O operations, and interrupts?

A.

Ntoskrnl.exe

B.

Win32k.sys

C.

Advapi32.dll

D.

Kernel32.dll

You work as a Network Administrator for a bank. For securing the bank's network, you configure a firewall and an IDS. In spite of these security measures, intruders are able to attack the network. After a close investigation, you find that your IDS is not configured properly and hence is unable to generate alarms when needed. What type of response is the IDS giving?

A.

False Positive

B.

True Negative

C.

True Positive

D.

False Negative