Weekend Sale - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dm70dm

GCFA GIACCertified Forensics Analyst Questions and Answers

Questions 4

An organization wants to mitigate the risks associated with the lost or stolen laptops and the associated disclosure laws, while reporting data breaches. Which of the following solutions will be best for the organization?

Options:

A.

Hashing function

B.

Digital signature

C.

Trusted Platform Module

D.

Whole disk encryption

Buy Now
Questions 5

In a Windows 98 computer, which of the following utilities is used to convert a FAT16 partition to FAT32?

Options:

A.

CVT16.EXE

B.

CVT1.EXE

C.

CONVERT16.EXE

D.

CONVERT.EXE

Buy Now
Questions 6

Joseph works as a Software Developer for WebTech Inc. He wants to protect the algorithms and the techniques of programming that he uses in developing an application. Which of the following laws are used to protect a part of software?

Options:

A.

Trademark laws

B.

Code Security law

C.

Patent laws

D.

Copyright laws

Buy Now
Questions 7

What is the name of the Secondary IDE slave, fourth partition in Linux operating system according to the Linux naming convention?

Options:

A.

SDB3

B.

HDC4

C.

HDA4

D.

HDD4

Buy Now
Questions 8

You work as the Network Administrator for McNeil Inc. The company has a Unix-based network. You want to set the hard disk geometry parameters, cylinders, heads, and sectors. Which of the following Unix commands can you use to accomplish the task?

Options:

A.

mkfs

B.

mkswap

C.

mke2fs

D.

hdparm

Buy Now
Questions 9

Which of the following registry hives stores information about the file extensions that are mapped to their corresponding applications?

Options:

A.

HKEY_CURRENT_USER

B.

HKEY_USERS

C.

HKEY_CLASSES_ROOT

D.

HKEY_LOCAL_MACHINE

Buy Now
Questions 10

A customer comes to you stating that his hard drive has crashed. He had backed up the hard drive, but some files on it were encrypted with Windows Encrypted File System (EFS). What do you need to do to be able to give him access to those restored encrypted files?

Options:

A.

Nothing, they are unrecoverable.

B.

You need the encryption key. If that was not saved/backed up, then there is no chance of recovery.

C.

Nothing, when you restore, he will have access.

D.

You need to make sure that when you restore, you give the new machine the same user account so that he can open the encrypted files.

Buy Now
Questions 11

In which of the following security tests does the security testing team simulate as an employee or other person with an authorized connection to the organization's network?

Options:

A.

Remote network

B.

Remote dial-up network

C.

Stolen equipment

D.

Local network

Buy Now
Questions 12

Which of the following registry hives contains information about all users who have logged on to the system?

Options:

A.

HKEY_CLASSES_ROOT

B.

HKEY_CURRENT_USERS

C.

HKEY_USERS

D.

HKEY_CURRENT_CONFIG

Buy Now
Questions 13

Fill in the blank with the appropriate file system.

Alternate Data Streams (ADS) is a feature of the_____ file system, which allows more than one data stream to be associated with a filename.

Options:

A.

NTFS

Buy Now
Questions 14

Which of the following steps should be performed in order to optimize a system performance?

Each correct answer represents a complete solution. Choose three.

Options:

A.

Run anti-spyware program regularly

B.

Defragment the hard disk drive

C.

Edit registry regularly

D.

Delete the temporary files

Buy Now
Questions 15

Which of the following laws or acts, formed in Australia, enforces prohibition against cyber stalking?

Options:

A.

Stalking by Electronic Communications Act (2001)

B.

Malicious Communications Act (1998)

C.

Anti-Cyber-Stalking law (1999)

D.

Stalking Amendment Act (1999)

Buy Now
Questions 16

Adrian, the Network Administrator for Peach Tree Inc., wants to install a new computer on the company's network. He asks his assistant to make a boot disk with minimum files. The boot disk will be used to boot the computer, which does not have an operating system installed, yet. Which of the following files will he include on the disk?

Options:

A.

IO.SYS, MSDOS.SYS, COMMAND.COM, and AUTOEXEC.BAT.

B.

IO.SYS, MSDOS.SYS, and COMMAND.COM.

C.

IO.SYS, MSDOS.SYS, COMMAND.COM, and CONFIG.SYS.

D.

IO.SYS, MSDOS.SYS, COMMAND.COM, and FDISK.

Buy Now
Questions 17

You work as the Network Administrator for McNeil Inc. The company has a Unix-based network. You want to query an image root device and RAM disk size. Which of the following Unix commands can you use to accomplish the task?

Options:

A.

rdev

B.

mount

C.

setfdprm

D.

rdump

Buy Now
Questions 18

Which of the following statements about registry is true?

Each correct answer represents a complete solution. Choose three.

Options:

A.

It is divided in many areas known as hives.

B.

It was first introduced with Windows 95 operating system.

C.

It is a centralized configuration database that stores information related to a Windows computer.

D.

It can be edited using SCANREG utility.

Buy Now
Questions 19

Brutus is a password cracking tool that can be used to crack the following authentications:

HTTP (Basic Authentication)

HTTP (HTML Form/CGI)

POP3 (Post Office Protocol v3)

FTP (File Transfer Protocol)

SMB (Server Message Block)

Telnet

Which of the following attacks can be performed by Brutus for password cracking?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Replay attack

B.

Dictionary attack

C.

Man-in-the-middle attack

D.

Hybrid attack

E.

Brute force attack

Buy Now
Questions 20

Which of the following file systems supports disk quotas?

Options:

A.

FAT32

B.

NTFS

C.

FAT

D.

CDFS

Buy Now
Questions 21

Which of the following protocols allows computers on different operating systems to share files and disk storage?

Options:

A.

Domain Name System (DNS)

B.

Network File System (NFS)

C.

Trivial File Transfer Protocol (TFTP)

D.

Simple Network Management Protocol (SNMP)

Buy Now
Questions 22

Your network has a Windows 2000 Server computer with FAT file system, shared by several users.

This system stores sensitive data. You decide to encrypt this data to protect it from unauthorized access. You want to accomplish the following goals:

Data should be secure and encrypted.

Administrative efforts should be minimum.

You should have the ability to recover encrypted files in case the file owner leaves the company.

Other permissions on encrypted files should be unaffected.

File-level security is required on the disk where data is stored.

Encrypting or decrypting of files should not be the responsibility of the file owner.

You take the following steps to accomplish these goals :

Convert the FAT file system to Windows 2000 NTFS file system.

Use Encrypting File System (EFS) to encrypt data.

Which of the following goals will you be able to accomplish?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

File-level security is available on the disk where data is stored.

B.

You have the ability to recover encrypted files in case the file owner leaves the company.

C.

Encrypting or decrypting of files is no longer the responsibility of the file owner.

D.

Data are secured and encrypted.

E.

Administrative efforts are minimum.

F.

Other permissions on encrypted files are unaffected.

Buy Now
Questions 23

John works as a professional Ethical Hacker. He has been assigned the task of testing the security of www.we-are-secure.com. He has performed the footprinting step and now he has enough information to begin scanning in order to detect active computers. He sends a ping request to a computer using ICMP type 13. What kind of ICMP message is John using to send the ICMP ping request message?

Options:

A.

Address mask request

B.

Echo request

C.

Information request (obsolete)

D.

Timestamp request (obsolete)

Buy Now
Questions 24

Adam works as a Computer Hacking Forensic Investigator. He has been assigned a project to

investigate child pornography. As the first step, Adam found that the accused is using a Peer-to-peer application to network different computers together over the internet and sharing pornographic materials of children with others. Which of the following are Peer-to-Peer applications?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Gnutella

B.

Kismet

C.

Hamachi

D.

Freenet

Buy Now
Questions 25

Which of the following type of files is NOT deleted by Disk Cleanup program of Windows XP?

Options:

A.

Old data files

B.

Temporary Setup Files

C.

Temporary Internet Files

D.

Offline Files

Buy Now
Questions 26

You are a professional Computer Hacking forensic investigator. You have been called to collect the evidences of Buffer Overflows or Cookie snooping attack. Which of the following logs will you review to accomplish the task?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

System logs

B.

Event logs

C.

Web server logs

D.

Program logs

Buy Now
Questions 27

In the United States, Title VII of the 1964 Civil Rights Act was formulated to protect an employee from discrimination on the basis of religion, color, race, national origin, and sex. This law makes discrimination in employment illegal. Which of the following was the original emphasis of the Act?

Options:

A.

Protect fundamental rights of an employee

B.

Equal position to all employees

C.

Protect woman in the workplace

D.

Prevent child pornography

Buy Now
Questions 28

Mark has been hired by a company to work as a Network Assistant. He is assigned the task to

configure a dial-up connection. He is configuring a laptop. Which of the following protocols should he disable to ensure that the password is encrypted during remote access?

Options:

A.

MSCHAP

B.

SPAP

C.

MSCHAP V2

D.

PAP

Buy Now
Questions 29

Which of the following is a password-cracking program?

Options:

A.

Netcat

B.

L0phtcrack

C.

SubSeven

D.

NetSphere

Buy Now
Questions 30

Adam works as a Computer Hacking Forensic Investigator in a law firm. He has been assigned with his first project. Adam collected all required evidences and clues. He is now required to write an investigative report to present before court for further prosecution of the case. He needs guidelines to write an investigative report for expressing an opinion. Which of the following are the guidelines to write an investigative report in an efficient way?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

All ideas present in the investigative report should flow logically from facts to conclusions.

B.

There should not be any assumptions made about any facts while writing the investigative report.

C.

Opinion of a lay witness should be included in the investigative report.

D.

The investigative report should be understandable by any reader.

Buy Now
Questions 31

Which of the following file systems is used by both CD and DVD?

Options:

A.

Network File System (NFS)

B.

New Technology File System (NTFS)

C.

Compact Disk File System (CDFS)

D.

Universal Disk Format (UDF)

Buy Now
Questions 32

John works as a professional Ethical Hacker. He has been assigned a project for testing the security of www.we-are-secure.com. He wants to corrupt an IDS signature database so that performing attacks on the server is made easy and he can observe the flaws in the We-are-secure server. To perform his task, he first of all sends a virus that continuously changes its signature to avoid detection from IDS. Since the new signature of the virus does not match the old signature, which is entered in the IDS signature database, IDS becomes unable to point out the malicious virus. Which of the following IDS evasion attacks is John performing?

Options:

A.

Evasion attack

B.

Session splicing attack

C.

Insertion attack

D.

Polymorphic shell code attack

Buy Now
Questions 33

Which of the following tools can be used by a user to hide his identity?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Proxy server

B.

Anonymizer

C.

Rootkit

D.

IPchains

E.

War dialer

Buy Now
Questions 34

Normally, RAM is used for temporary storage of data. But sometimes RAM data is stored in the hard disk, what is this method called?

Options:

A.

Cache memory

B.

Static memory

C.

Virtual memory

D.

Volatile memory

Buy Now
Questions 35

Which of the following file systems contains hardware settings of a Linux computer?

Options:

A.

/var

B.

/etc

C.

/proc

D.

/home

Buy Now
Questions 36

You work as a Network Administrator for Perfect Solutions Inc. You install Windows 98 on a computer. By default, which of the following folders does Windows 98 setup use to keep the registry tools?

Options:

A.

$SYSTEMROOT$REGISTRY

B.

$SYSTEMROOT$WINDOWS

C.

$SYSTEMROOT$WINDOWSREGISTRY

D.

$SYSTEMROOT$WINDOWSSYSTEM32

Buy Now
Questions 37

Which of the following tools can be used to perform tasks such as Windows password cracking, Windows enumeration, and VoIP session sniffing?

Options:

A.

John the Ripper

B.

L0phtcrack

C.

Obiwan

D.

Cain

Buy Now
Questions 38

Which of the following statements about an extended partition are true?

Each correct answer represents a complete solution. Choose two.

Options:

A.

It can be sub-divided into logical drives.

B.

It cannot be formatted or assigned a drive letter.

C.

A maximum of four extended partitions can exist on a single basic disk.

D.

It cannot contain more than one logical drive.

Buy Now
Questions 39

Adam works as a professional Computer Hacking Forensic Investigator. A project has been assigned to him by the chief security officer of a cloth manufacturing company who suspects that one of the employees is selling the design of the clothes outside the company. The security officer asked Adam to investigate the iPhone of the employee, as he suspects that there might be some sensitive information stored in his iPhone. On investigation Adam found out that the employee tries to destroy the evidence on his iPhone. He presses and holds the Home and Power buttons until the device is forced into recovery mode. Which of the following actions occurred when iPhone is set into recovery mode?

Options:

A.

iPhone will be prevented from booting temporarily.

B.

The file system will be destroyed.

C.

Nothing will happen.

D.

Data will be destroyed.

Buy Now
Questions 40

Which of the following standard file formats is used by Apple's iPod to store contact information?

Options:

A.

HFS+

B.

hCard

C.

vCard

D.

FAT32

Buy Now
Questions 41

You are reviewing a Service Level Agreement between your company and a Web development vendor.

Which of the following are security requirements you should look for in this SLA?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Time to respond to bug reports

B.

Encryption standards

C.

Security Monitoring

D.

Guarantees on known security flaws

Buy Now
Questions 42

Which of the following attacks saturates network resources and disrupts services to a specific computer?

Options:

A.

Teardrop attack

B.

Polymorphic shell code attack

C.

Denial-of-Service (DoS) attack

D.

Replay attack

Buy Now
Questions 43

Mark is the Administrator of a Linux computer. He wants to check the status of failed Telnet-based login attempts on the Linux computer. Which of the following shell commands will he use to accomplish the task?

Options:

A.

GREP

B.

CP

C.

FSCK

D.

CAT

Buy Now
Questions 44

Adam works as a professional Computer Hacking Forensic Investigator. He works with the local police. A project has been assigned to him to investigate an iPod, which was seized from a student of the high school. It is suspected that the explicit child pornography contents are stored in the iPod. Adam wants to investigate the iPod extensively. Which of the following operating systems will Adam use to carry out his investigations in more extensive and elaborate manner?

Options:

A.

Linux

B.

MINIX 3

C.

Windows XP

D.

Mac OS

Buy Now
Questions 45

Which of the following is the process of comparing cryptographic hash functions of system executables and configuration files?

Options:

A.

Spoofing

B.

File integrity auditing

C.

Reconnaissance

D.

Shoulder surfing

Buy Now
Questions 46

Which of the following tools can be used to perform a whois query?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Sam Spade

B.

SuperScan

C.

Traceroute

D.

WsPingPro

Buy Now
Questions 47

Which of the following are the primary goals of the incident handling team?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Prevent any further damage.

B.

Freeze the scene.

C.

Repair any damage caused by an incident.

D.

Inform higher authorities.

Buy Now
Exam Code: GCFA
Exam Name: GIACCertified Forensics Analyst
Last Update: Jun 30, 2025
Questions: 318

PDF + Testing Engine

$49.5  $164.99

Testing Engine

$37.5  $124.99
buy now GCFA testing engine

PDF (Q&A)

$31.5  $104.99
buy now GCFA pdf
dumpsmate guaranteed to pass
24/7 Customer Support

DumpsMate's team of experts is always available to respond your queries on exam preparation. Get professional answers on any topic of the certification syllabus. Our experts will thoroughly satisfy you.

Site Secure

mcafee secure

TESTED 05 Jul 2025