Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free GIAC GCFA Practice Exam with Questions & Answers | Set: 8

Questions 71

Which of the following are the benefits of information classification for an organization?

Each correct answer represents a complete solution. Choose two.

Options:
A.

It ensures that modifications are not made to data by unauthorized personnel or processes.

B.

It helps identify which information is the most sensitive or vital to an organization.

C.

It helps reduce the Total Cost of Ownership (TCO).

D.

It helps identify which protections apply to which information.

GIAC GCFA Premium Access
Questions 72

Which of the following firewalls depends on the three-way handshake of the TCP protocol?

Options:
A.

Proxy-based firewall

B.

Stateful firewall

C.

Packet filter firewall

D.

Endian firewall

Questions 73

Which of the following U.S. Federal laws addresses computer crime activities in communication lines, stations, or systems?

Options:
A.

18 U.S.C. 1030

B.

18 U.S.C. 1362

C.

18 U.S.C. 2701

D.

18 U.S.C. 2510

E.

18 U.S.C. 1029

Questions 74

Which of the following wireless network standards operates on the 5 GHz band and transfers data at a rate of 54 Mbps?

Options:
A.

802.11a

B.

802.11u

C.

802.11g

D.

802.11b

Questions 75

Mark works as a Network administrator for SecureEnet Inc. His system runs on Mac OS X. He wants to boot his system from the Network Interface Controller (NIC). Which of the following snag keys will Mark use to perform the required function?

Options:
A.

N

B.

D

C.

C

D.

Z

Questions 76

Convention on Cybercrime, created by the Council of Europe, is the treaty seeking to address

Computer crime and Internet crimes by harmonizing national laws, improving investigative techniques, and increasing cooperation among nations. Which of the following chapters of Convention of Cybercrime contains the provisions for mutual assistances and extradition rules related to cybercrimes?

Options:
A.

Chapter II

B.

Chapter IV

C.

Chapter III

D.

Chapter I

Questions 77

You are responsible for tech support at your company. You have been instructed to make certain that all desktops support file and folder encryption. Which file system should you use when installing Windows XP?

Options:
A.

FAT

B.

EXT4

C.

FAT32

D.

NTFS

Questions 78

Which of the following Incident handling process phases is responsible for defining rules, collaborating human workforce, creating a back-up plan, and testing the plans for an enterprise?

Options:
A.

Recovery phase

B.

Eradication phase

C.

Identification phase

D.

Containment phase

E.

Preparation phase

Questions 79

Which of the following statements are true about routers?

Each correct answer represents a complete solution. Choose all that apply.

Options:
A.

Routers organize addresses into classes, which are used to determine how to move packets from one network to another.

B.

Routers are responsible for making decisions about which of several paths network (or Internet) traffic will follow.

C.

Routers do not limit physical broadcast traffic.

D.

Routers act as protocol translators and bind dissimilar networks.

Questions 80

Trinity wants to send an email to her friend. She uses the MD5 generator to calculate cryptographic hash of her email to ensure the security and integrity of the email. MD5 generator, which Trinity is using operates in two steps:

Creates check file

Verifies the check file

Which of the following MD5 generators is Trinity using?

Options:
A.

MD5 Checksum Verifier

B.

Mat-MD5

C.

Chaos MD5

D.

Secure Hash Signature Generator