2019 Free Microsoft EnsurePass GCFA Dumps VCE and PDF Download Part 7

EnsurePass
Exam Dumps
GCFA Dumps VCE and PDF
2019 GCFA Dumps Practice Exams

QUESTION 61

Mark is the Administrator of a Linux computer. He wants to check the status of failed Telnet-based login attempts on the Linux computer. Which of the following shell commands will he use to accomplish the task?

 

A.

GREP

B.

CP

C.

FSCK

D.

CAT

 

Correct Answer: A

 

 

QUESTION 62

Which of the following tools are used for footprinting? Each correct answer represents a complete solution. Choose all that apply.

 

A.

Sam spade

B.

Traceroute

C.

Whois

D.

Brutus

 

Correct Answer: ABC

 

 

QUESTION 63

You work as a Network Administrator for Peach Tree Inc. The company currently has a FAT- based Windows NT network. All client computers run Windows 98. The management wants all client computers to be able to boot in Windows XP Professional. You want to accomplish the following goals:

 

image008The file system should support file compression and file level security.

image008[1]All the existing data and files can be used by the new file system.

image008[2]Users should be able to dual-boot their computers.

image008[3]You take the following steps to accomplish these goals:

image008[4]Convert the FAT file system to NTFS using the CONVERT utility.

image008[5]Install Windows XP and choose to upgrade the existing operating system during setup.

 

Which of the following goals will you be able to accomplish? Each correct answer represents a complete solution. Choose all that apply.

 

A.

The file system supports file compression and file level security.

B.

All the existing data and files can be used by the new file system.

C.

Users are able to dual-boot their computers.

D.

None of the goals are accomplished.

 

Correct Answer: AB

 

 

QUESTION 64

You work as the Network Administrator for McNeil Inc. The company has a Unix-based network. You want to allow direct access to the filesystems data structure. Which of the following Unix commands can you use to accomplish the task?

 

A.

du

B.

debugfs

C.

df

D.

dosfsck

 

Correct Answer: B

 

 

QUESTION 65

You work as a Network Administrator for Web World Inc. You want to host an e-commerce Web site on your network. You want to ensure that storage of credit card information is secure. Which of the following conditions should be met to accomplish this? Each correct answer represents a complete solution. Choose all that apply.

 

A.

NT authentication should be required for all customers before they provide their credit card numbers.

B.

Strong encryption software should be used to store credit card information.

C.

Only authorized access should be allowed to credit card information.

D.

The NTFS file system should be implemented on a client computer.

 

Correct Answer: BC

 

 

 

QUESTION 66

You work as a Network Security Analyzer. You got a suspicious email while working on a forensic project. Now, you want to know the IP address of the sender so that you can analyze various information such as the actual location, domain information, operating system being used, contact information, etc. of the email sender with the help of various tools and resources. You also want to check whether this email is fake or real. You know that analysis of email headers is a good starting point in such cases. The email header of the suspicious email is given below:

 

image009

 

What is the IP address of the sender of this email?

 

A.

172.16.10.90

B.

209.191.91.180

C.

216.168.54.25

D.

141.1.1.1

 

Correct Answer: C

 

 

QUESTION 67

You work as a Network Administrator for uCertify Inc. You want to edit the MSDOS.SYS file, in your computer, from the DOS prompt. You are unable to find the file. What is the most likely cause?

 

A.

It is a read-only file.

B.

It is a built-in command in the COMMAND.COM file.

C.

Someone has deleted the file.

D.

It is a hidden file.

 

Correct Answer: D

 

 

 

 

 

QUESTION 68

John works for an Internet Service Provider (ISP) in the United States. He discovered child pornography material on a Web site hosted by the ISP. John immediately informed law enforcement authorities about this issue. Under which of the following Acts is John bound to take such an action?

 

A.

Civil Rights Act of 1991

B.

PROTECT Act

C.

Civil Rights Act of 1964

D.

Sexual Predators Act

 

Correct Answer: D

 

 

QUESTION 69

Adam works as a professional Computer Hacking Forensic Investigator with the local police of his area. A project has been assigned to him to investigate a PDA seized from a local drug dealer. It is expected that many valuable and important information are stored in this PDA. Adam follows investigative methods, which are required to perform in a pre-defined sequential manner for the successful forensic investigation of the PDA. Which of the following is the correct order to perform forensic investigation of PDA?

 

A.

Identification, Collection, Examination, Documentation

B.

Examination, Collection, Identification, Documentation

C.

Documentation, Examination, Identification, Collection

D.

Examination, Identification, Collection, Documentation

 

Correct Answer: D

 

 

QUESTION 70

The incident response team has turned the evidence over to the forensic team. Now, it is the time to begin looking for the ways to improve the incident response process for next time. What are the typical areas for improvement? Each correct answer represents a complete solution. Choose all that apply.

 

A.

Information dissemination policy

B.

Additional personnel security controls

C.

Incident response plan

D.

Electronic monitoring statement

 

Correct Answer: ABCD

Leave a Reply

Your email address will not be published. Required fields are marked *

Proudly powered by WordPress