Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free GIAC GCFA Practice Exam with Questions & Answers | Set: 9

Questions 81

Which utility enables you to access files from a Windows .CAB file?

Options:
A.

ACCESS.EXE

B.

WINZIP.EXE

C.

XCOPY.EXE

D.

EXTRACT.EXE

GIAC GCFA Premium Access
Questions 82

Which of the following tools in Helix Windows Live is used to reveal the database password of password protected MDB files created using Microsoft Access or with Jet Database Engine?

Options:
A.

Asterisk logger

B.

FAU

C.

Galleta

D.

Access Pass View

Questions 83

You want to retrieve information whether your system is in promiscuous mode or not. Which of the following commands will you use?

Each correct answer represents a complete solution. Choose all that apply.

Options:
A.

grep Promisc /var/log/messages

B.

ip link

C.

ifconfig | grep PROMISC

D.

show promisc

Questions 84

Which of the following tools is used to block email, Instant Message, Web site, or other media if inappropriate words such as pornography, violence etc. is used?

Options:
A.

iProtect

B.

Reveal

C.

iProtectYou

D.

Child Exploitation Tracking System

Questions 85

You are responsible for maintaining and troubleshooting PC's at your company. The receptionist reports her screen has gone blue. When you get there you notice the 'blue screen of death' with an error message NTFS_FILE_SYSTEM. What is the most likely cause of this error?

Options:
A.

The hard disk is corrupt

B.

A virus

C.

Windows was installed improperly.

D.

Get the latest patch for Windows.

Questions 86

Which of the following statements best describes the consequences of the disaster recovery plan test?

Options:
A.

If no deficiencies were found during the test, then the plan is probably perfect.

B.

The results of the test should be kept secret.

C.

The plan should not be changed no matter what the results of the test would be.

D.

If no deficiencies were found during the test, then the test was probably flawed.

Questions 87

Victor works as a professional Ethical Hacker for SecureNet Inc. He wants to use Steganographic file system method to encrypt and hide some secret information. Which of the following disk spaces will he use to store this secret information?

Each correct answer represents a complete solution. Choose all that apply.

Options:
A.

Hidden partition

B.

Slack space

C.

Dumb space

D.

Unused Sectors

Questions 88

Which of the following statements is true for a file in the UNIX operating system?

Options:
A.

It is a collection of information, which cannot be data or documents.

B.

It is a directory entry that points to an original file somewhere else.

C.

It is a collection of information, which can be data, an application, or documents.

D.

It is a collection of information, which can be only documents.

Questions 89

Which of the following Windows XP system files handles memory management, I/O operations, and interrupts?

Options:
A.

Ntoskrnl.exe

B.

Win32k.sys

C.

Advapi32.dll

D.

Kernel32.dll

Questions 90

Which of the following tools is used to modify registry permissions in Windows?

Options:
A.

POLEDIT

B.

REGEDIT

C.

REGEDT32

D.

SECEDIT