Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free GIAC GCFA Practice Exam with Questions & Answers

Questions 1

You work as a professional Computer Hacking Forensic Investigator. A project has been assigned to you to investigate the DoS attack on a computer network of SecureEnet Inc. Which of the following methods will you perform to accomplish the task?

Each correct answer represents a complete solution. Choose all that apply.

Options:
A.

Look for unusual traffic on Internet connections and network segments.

B.

Seize all computers and transfer them to the Forensic lab.

C.

Look for core files or crash dumps on the affected systems.

D.

Sniff network traffic to the failing machine.

GIAC GCFA Premium Access
Questions 2

Which of the following directories contains administrative commands on a UNIX computer?

Options:
A.

/usr/local

B.

/sbin

C.

/bin

D.

/export

Questions 3

Which of the following tools are used to determine the hop counts of an IP packet?

Each correct answer represents a complete solution. Choose two.

Options:
A.

Netstat

B.

TRACERT

C.

IPCONFIG

D.

Ping

Questions 4

Based on the case study, to implement more security, which of the following additional technologies should you implement for laptop computers?

(Click the Exhibit button on the toolbar to see the case study.)

Each correct answer represents a complete solution. Choose two.

Options:
A.

PAP authentication

B.

Encrypting File System (EFS)

C.

Digital certificates

D.

Two-factor authentication

E.

Encrypted Data Transmissions

Questions 5

Which of the following switches is used with Pslist command on the command line to show the statistics for all active threads on the system, grouping these threads with their owning process?

Options:
A.

Pslist -m

B.

Pslist -d

C.

Pslist -x

D.

Pslist -t

Questions 6

Victor is a novice Ethical Hacker. He is learning the hacking process, i.e., the steps taken by malicious hackers to perform hacking. Which of the following steps is NOT included in the hacking process?

Options:
A.

Reconnaissance

B.

gaining access

C.

Scanning

D.

Preparation

Questions 7

You work as a Network Administrator for Net World International. Rick, a Sales Manager, complains that his Windows 98 computer is not displaying the taskbar. You reboot his computer and find that the taskbar is still missing. How will you resolve the issue?

Options:
A.

Replace WIN.INI from backup.

B.

Copy the registry from backup.

C.

Use Registry Editor to delete the following registry key:

HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionExplorerStuckRects

D.

Reinstall Windows 98 on Rick's computer.

Questions 8

Jason, a game lover, owns an Apple's iPod nano. He wants to play games on his iPod. He also wants to improve the quality of the audio recording of his iPod. Which of the following steps can Jason take to accomplish the task?

Options:
A.

Install iPodLinux.

B.

Install third party software.

C.

Upgrade Apple's firmware.

D.

Buy external add-ons.

Questions 9

What are the purposes of audit records on an information system?

Each correct answer represents a complete solution. Choose two.

Options:
A.

Backup

B.

Investigation

C.

Upgradation

D.

Troubleshooting

Questions 10

John works as a contract Ethical Hacker. He has recently got a project to do security checking for www.we-are-secure.com. He wants to find out the operating system of the we-are-secure server in the information gathering step. Which of the following commands will he use to accomplish the task?

Each correct answer represents a complete solution. Choose two.

Options:
A.

nc 208.100.2.25 23

B.

nmap -v -O <a href="www.we-are-secure.com">www.we-are-secure.com</a>

C.

nc -v -n 208.100.2.25 80

D.

nmap -v -O 208.100.2.25