GIAC GCFA Exam Practice Questions (P. 3)
- Full Access (318 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #21
Which of the following is the correct order of loading system files into the main memory of the system, when the computer is running on Microsoft's Windows XP operating system?
- ANTLDR, BOOT.ini, HAL.dll, NTDETECT.com, NTOSKRNL.exe
- BNTLDR, BOOT.ini, NTDETECT.com, HAL.dll, NTOSKRNL.exe
- CNTLDR, BOOT.ini, HAL.dll, NTDETECT.com, NTOSKRNL.exe
- DBOOT.ini, HAL.dll, NTDETECT.com, NTLDR, NTOSKRNL.exe
Correct Answer:
B
B
send
light_mode
delete
Question #22
SIMULATION -
Fill in the blank with the appropriate name.
_____is a list, which specifies the order of volatility of data in a Windows based system.
Fill in the blank with the appropriate name.
_____is a list, which specifies the order of volatility of data in a Windows based system.
send
light_mode
delete
Question #23
Which of the following file systems provides file-level security?
send
light_mode
delete
Question #24
Adam works as an Incident Handler for Umbrella Inc. He is informed by the senior authorities that the server of the marketing department has been affected by a malicious hacking attack. Supervisors are also claiming that some sensitive data are also stolen. Adam immediately arrived to the server room of the marketing department and identified the event as an incident. He isolated the infected network from the remaining part of the network and started preparing to image the entire system. He captures volatile data, such as running process, ram, and network connections.
Which of the following steps of the incident handling process is being performed by Adam?
Which of the following steps of the incident handling process is being performed by Adam?
send
light_mode
delete
Question #25
Which of the following is the process of overwriting all addressable locations on a disk?
send
light_mode
delete
Question #26
An executive in your company reports odd behavior on her PDA. After investigation you discover that a trusted device is actually copying data off the PDA. The executive tells you that the behavior started shortly after accepting an e-business card from an unknown person. What type of attack is this?
send
light_mode
delete
Question #27
You work as a Network Administrator for Net Perfect Inc. The company has a Windows Server 2008 network environment. The network is configured as a
Windows Active Directory-based single forest single domain network. The network is configured on IP version 6 protocol. All the computers on the network are connected to a switch device. One day, users complain that they are unable to connect to a file server. You try to ping the client computers from the server, but the pinging fails. You try to ping the server's own loopback address, but it fails to ping. You restart the server, but the problem persists.
What is the most likely cause?
Windows Active Directory-based single forest single domain network. The network is configured on IP version 6 protocol. All the computers on the network are connected to a switch device. One day, users complain that they are unable to connect to a file server. You try to ping the client computers from the server, but the pinging fails. You try to ping the server's own loopback address, but it fails to ping. You restart the server, but the problem persists.
What is the most likely cause?
- AThe cable that connects the server to the switch is broken.
- BAutomatic IP addressing is not working.
- CThe switch device is not working.
- DThe server is configured with unspecified IP address.
- EThe server's NIC is not working.
Correct Answer:
E
E
send
light_mode
delete
Question #28
You want to upgrade a partition in your computer's hard disk drive from FAT to NTFS. Which of the following DOS commands will you use to accomplish this?
send
light_mode
delete
Question #29
A firewall is a combination of hardware and software, used to provide security to a network. It is used to protect an internal network or intranet against unauthorized access from the Internet or other outside networks. It restricts inbound and outbound access and can analyze all traffic between an internal network and the Internet. Users can configure a firewall to pass or block packets from specific IP addresses and ports. Which of the following tools works as a firewall for the Linux 2.4 kernel?
send
light_mode
delete
Question #30
You work as a Web developer for ABC Inc. You want to investigate the Cross-Site Scripting attack on your company's Web site. Which of the following methods of investigation can you use to accomplish the task?
Each correct answer represents a complete solution. Choose all that apply.
Each correct answer represents a complete solution. Choose all that apply.
- AReview the source of any HTML-formatted e-mail messages for embedded scripts or links in the URL to the company's site.
- BLook at the Web server's logs and normal traffic logging.
- CUse Wireshark to capture traffic going to the server and then searching for the requests going to the input page, which may give log of the malicious traffic and the IP address of the source.
- DUse a Web proxy to view the Web server transactions in real time and investigate any communication with outside servers.
Correct Answer:
ABD
ABD
send
light_mode
delete
All Pages