GIAC GCFA Exam Practice Questions (P. 5)
- Full Access (318 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #41
Which of the following switches of the XCOPY command copies attributes while copying files?
send
light_mode
delete
Question #42
Which of the following directories in Linux operating system contains device files, which refers to physical devices?
send
light_mode
delete
Question #43
Which of the following directories cannot be placed out of the root filesystem?
Each correct answer represents a complete solution. Choose all that apply.
Each correct answer represents a complete solution. Choose all that apply.
send
light_mode
delete
Question #44
On which of the following locations does the Windows NT/2000 operating system contain the SAM, SAM.LOG, SECURITY.LOG, APPLICATION.LOG, and
EVENT.LOG files?
EVENT.LOG files?
- A\%Systemroot%system32
- B\%Systemroot%profiles
- C\%Systemroot%system32config
- D\%Systemroot%help
Correct Answer:
C
C
send
light_mode
delete
Question #45
You are handling technical support calls for an insurance company. A user calls you complaining that he cannot open a file, and that the file name appears in green while opening in Windows Explorer.
What does this mean?
What does this mean?
- AThe file is encrypted.
- BThe file belongs to another user.
- CThe file is infected with virus.
- DThe file is compressed.
Correct Answer:
A
A
send
light_mode
delete
Question #46
Which of the following is a name, symbol, or slogan with which a product is identified?
send
light_mode
delete
Question #47
Which of the following file systems supports the hot fixing feature?
send
light_mode
delete
Question #48
John works as a professional Ethical Hacker. He has been assigned a project for testing the security of www.we-are-secure.com. He wants to corrupt an IDS signature database so that performing attacks on the server is made easy and he can observe the flaws in the We-are-secure server. To perform his task, he first of all sends a virus that continuously changes its signature to avoid detection from IDS. Since the new signature of the virus does not match the old signature, which is entered in the IDS signature database, IDS becomes unable to point out the malicious virus. Which of the following IDS evasion attacks is John performing?
- AEvasion attack
- BSession splicing attack
- CInsertion attack
- DPolymorphic shell code attack
Correct Answer:
D
D
send
light_mode
delete
Question #49
You work as the Network Administrator for McNeil Inc. The company has a Unix-based network. You want to fix partitions on a hard drive. Which of the following
Unix commands can you use to accomplish the task?
Unix commands can you use to accomplish the task?
send
light_mode
delete
Question #50
Which of the following is a type of intruder detection that involves logging network events to a file for an administrator to review later?
- APacket detection
- BPassive detection
- CActive detection
- DEvent detection
Correct Answer:
B
B
send
light_mode
delete
All Pages