DumpsFiles
 Request Exam  Contact
  • Home
  • PRACTICE EXAMS
    Oracle
    Fortinet
    Juniper
    Microsoft
    Cisco
    Citrix
    CompTIA
    VMware
    SAP
    EMC
    PMI
    HP
    Salesforce
    Other
  • View All Exams
  • New Dumps Files
  • Upload
  • Oracle
    Oracle
  • Fortinet
    Fortinet
  • Juniper
    Juniper
  • Microsoft
    Microsoft
  • Cisco
    Cisco
  • Citrix
    Citrix
  • CompTIA
    CompTIA
  • VMware
    VMware
  • SAP
    SAP
  • EMC
    EMC
  • PMI
    PMI
  • HP
    HP
  • Salesforce
    Salesforce
  1. Home
  2. GIAC
  3. GIAC Certified Forensics Analyst
  4. GIAC.GCFA.v2023-05-19.q139
  5. Question 1

Join the discussion

Question 1/139

Which of the following is a nonvolatile form of memory that can be reprogrammed by using a special programming device, and need not to be removed from the PC to be reprogrammed?

Correct Answer: E

Add Comments

Your email address will not be published. Required fields are marked *

insert code
Type the characters from the picture.
Rating:
Other Question (139q)
Q1. Which of the following is a nonvolatile form of memory that can be reprogrammed by using a...
Q2. Which of the following tools works by using standard set of MS-DOS commands and can create...
Q3. Which of the following is a documentation of guidelines that computer forensics experts us...
Q4. Which of the following two cryptography methods are used by NTFS Encrypting File System (E...
Q5. Sandra, a novice computer user, works on Windows environment. She experiences some problem...
Q6. Which of the following methods can be used to start the Disk Defragmenter utility in Windo...
Q7. John, a novice web user, makes a new E-mail account and keeps his password as "apple", his...
Q8. Which of the following types of virus makes changes to a file system of a disk?...
Q9. Which of the following types of attack can guess a hashed password?...
Q10. In the United States, Title VII of the 1964 Civil Rights Act was formulated to protect an ...
Q11. By gaining full control of router, hackers often acquire full control of the network. Whic...
Q12. SIMULATION Fill in the blank with the appropriate file system. Alternate Data Streams (ADS...
Q13. Which of the following Windows XP system files handles memory management, I/O operations, ...
Q14. Which of the following U.S. Federal laws addresses computer crime activities in communicat...
Q15. Your Windows XP hard drive has 2 partitions. The system partition is NTFS and the other is...
Q16. Mark works as a Network Administrator for Net Perfect Inc. The company has a Linux-based n...
Q17. Victor is a novice Ethical Hacker. He is learning the hacking process, i.e., the steps tak...
Q18. On which of the following locations does the Windows NT/2000 operating system contain the ...
Q19. Which of the following representatives of incident response team takes forensic backups of...
Q20. You are the Security Consultant and have been hired to check security for a client's netwo...
Q21. Mark is the Administrator of a Linux computer. He wants to check the status of failed Teln...
Q22. Which of the following is the process of comparing cryptographic hash functions of system ...
Q23. Which of the following tools can be used to perform tasks such as Windows password crackin...
Q24. Which of the following firewalls depends on the three-way handshake of the TCP protocol?...
Q25. On which of the following locations does the Windows NT/2000 operating system contain the ...
Q26. Based on the case study, to implement more security, which of the following additional tec...
Q27. Which of the following is used to store configuration settings and options on Microsoft Wi...
Q28. Victor is a novice Ethical Hacker. He is learning the hacking process, i.e., the steps tak...
Q29. Which of the following standard technologies is not used to interface hard disk with the c...
Q30. Nathan works as a Computer Hacking Forensic Investigator for SecureEnet Inc. He uses Visua...
Q31. Which of the following switches of the XCOPY command copies attributes while copying files...
Q32. Which of the following directories cannot be placed out of the root filesystem? Each corre...
Q33. Which of the following graphical tools is used to navigate through directory structures?...
Q34. Which of the following tools is used to block email, Instant Message, Web site, or other m...
Q35. You work as a Network Administrator for NetTech Inc. The company's network is connected to...
Q36. Which of the following types of attacks cannot be prevented by technical measures only?...
Q37. John works as a professional Ethical Hacker. He has been assigned a project to test the se...
Q38. Which of the following are known as the three laws of OPSEC? Each correct answer represent...
Q39. Which of the following prevents malicious programs from attacking a system?...
Q40. John works as a professional Ethical Hacker. He has been assigned the project of testing t...
Q41. You work as a Network Administrator for Net Perfect Inc. The company has a Windows Server ...
Q42. An attacker attempts to gain information about a network by specifically targeting the net...
Q43. Adam works as a Security Administrator for Umbrella Inc. He is responsible for securing al...
Q44. Victor works as a professional Ethical Hacker for SecureEnet Inc. He has been assigned a j...
Q45. Which of the following directories in Linux operating system contains device files, which ...
Q46. Which of the following precautionary steps are taken by the supervisors or employers to av...
Q47. Which of the following firewalls depends on the three-way handshake of the TCP protocol?...
Q48. You are the Network Administrator and your company has recently implemented encryption for...
Q49. Which of the following types of evidence is considered as the best evidence?...
Q50. What is the name of the Secondary IDE slave, fourth partition in Linux operating system ac...
Q51. Adam works as a Computer Hacking Forensic Investigator in a law firm. He has been assigned...
Q52. Which of the following file systems is designed by Sun Microsystems?...
Q53. You work as a Network Administrator for NetTech Inc. To ensure the security of files, you ...
Q54. Which of the following precautionary steps are taken by the supervisors or employers to av...
Q55. Adam works as a professional Computer Hacking Forensic Investigator. A project has been as...
Q56. Which of the following is a correct sequence of different layers of Open System Interconne...
Q57. Which of the following statements about the compression feature of the NTFS file system ar...
Q58. Which of the following file systems provides integrated security?...
Q59. You work as a Network Administrator for Peach Tree Inc. The company currently has a FAT-ba...
Q60. Which of the following directories contains administrative commands and daemon processes i...
Q61. Mark works as a security manager for SofTech Inc. He is using a technique for monitoring w...
Q62. Mark is the Administrator of a Linux computer. He wants to check the status of failed Teln...
Q63. In which of the following security tests does the security testing team simulate as an emp...
Q64. Adam works as a Security Administrator for Umbrella Technology Inc. He reported a breach i...
Q65. Adam works as a professional Computer Hacking Forensic Investigator. A project has been as...
Q66. Adam works as a professional Computer Hacking Forensic Investigator, a project has been as...
Q67. Which of the following statements is true for a file in the UNIX operating system?...
Q68. You work as a Network Administrator for Perfect Solutions Inc. You have to install Windows...
Q69. Which of the following Acts enacted in United States allows the FBI to issue National Secu...
Q70. John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-b...
Q71. On your dual booting computer, you want to set Windows 98 as the default operating system ...
Q72. John is a black hat hacker. FBI arrested him while performing some email scams. Under whic...
Q73. An organization wants to mitigate the risks associated with the lost or stolen laptops and...
Q74. Which of the following log files are used to collect evidences before taking the bit-strea...
Q75. Adam works as a professional Computer Hacking Forensic Investigator. He works with the loc...
Q76. Which of the following tools is a wireless sniffer and analyzer that works on the Windows ...
Q77. You work as a Network Administrator for NetTech Inc. To ensure the security of files, you ...
Q78. Which of the following file systems contains hardware settings of a Linux computer?...
Q79. Which of the following needs to be documented to preserve evidences for presentation in co...
Q80. Which of the following terms refers to a mechanism which proves that the sender really sen...
Q81. Which of the following is a set of exclusive rights granted by a state to an inventor or h...
Q82. Sandra wants to create a full system state backup of her computer, which is running on Mic...
Q83. John works as a professional Ethical Hacker. He has been assigned the task of testing the ...
Q84. Which of the following standard technologies is not used to interface hard disk with the c...
Q85. John works as a professional Ethical Hacker. He is assigned a project to test the security...
Q86. Which of the following tools can be used to perform a whois query? Each correct answer rep...
Q87. John works as a Technical Support Executive in ABC Inc. The company's network consists of ...
Q88. Which of the following is a correct sequence of different layers of Open System Interconne...
Q89. You work as a Network Administrator for a bank. For securing the bank's network, you confi...
Q90. Which of the following file systems are supported by Windows 2000 operating systems? Each ...
Q91. Peter, an expert computer user, attached a new sound card to his computer. He then restart...
Q92. Which of the following are the benefits of information classification for an organization?...
Q93. In which of the following access control models can a user not grant permissions to other ...
Q94. Which of the following are advantages of NTFS file system over FAT32 and FAT? Each correct...
Q95. Which of the following involves changing data prior to or during input to a computer in an...
Q96. You are the Security Consultant and have been hired to check security for a client's netwo...
Q97. Which of the following directories contains administrative commands on a UNIX computer?...
Q98. Which of the following tools is used to extract human understandable interpretation from t...
Q99. In which of the following security tests does the security testing team simulate as an emp...
Q100. Adam, a malicious hacker has successfully gained unauthorized access to the Linux system o...
Q101. You want to retrieve information whether your system is in promiscuous mode or not. Which ...
Q102. Which of the following Windows XP system files handles memory management, I/O operations, ...
Q103. Which of the following tools works by using standard set of MS-DOS commands and can create...
Q104. Sandra, an expert computer user, hears five beeps while booting her computer that has AMI ...
Q105. Which of the following types of evidence is considered as the best evidence?...
Q106. Which of the following is the Windows feature on which the file management can be performe...
Q107. You work as a Network Administrator for Tech Perfect Inc. The company has a Linux-based ne...
Q108. You work as a Network Administrator for Blue Well Inc. Your company's network has a Window...
Q109. What is the name of the group of blocks which contains information used by the operating s...
Q110. Which of the following is the first computer virus that was used to infect the boot sector...
Q111. John works as a Network Administrator for DigiNet Inc. He wants to investigate failed logo...
Q112. Your network has a Windows 2000 Server computer with FAT file system, shared by several us...
Q113. Which of the following tools are used to determine the hop counts of an IP packet? Each co...
Q114. Which of the following provides high availability of data?...
Q115. Which of the following is the correct order of digital investigations Standard Operating P...
Q116. You work as a Network Administrator for uCertify Inc. You want to edit the MSDOS.SYS file,...
Q117. Which of the following laws enacted in United States makes it illegal for an Internet Serv...
Q118. Adam works as a Computer Hacking Forensic Investigator. He has been assigned a project to ...
Q119. Which of the following tools can be used to perform tasks such as Windows password crackin...
Q120. Which of the following Linux file systems is a journaled file system?...
Q121. John works as a contract Ethical Hacker. He has recently got a project to do security chec...
Q122. Which of the following NIST RA process steps has the goal to identify the potential threat...
Q123. This type of virus infects programs that can execute and load into memory to perform prede...
Q124. Adam works as a professional Computer Hacking Forensic Investigator. He works with the loc...
Q125. Which of the following describes software technologies that improve portability, manageabi...
Q126. Which of the following laws or acts, formed in Australia, enforces prohibition against cyb...
Q127. Which of the following files starts the initialization process in booting sequence of the ...
Q128. You are handling technical support calls for an insurance company. A user calls you compla...
Q129. You are reviewing a Service Level Agreement between your company and a Web development ven...
Q130. Which of the following encryption methods uses AES technology?...
Q131. Which of the following statements about registry is true? Each correct answer represents a...
Q132. Which of the following tools is used to locate lost files and partitions to restore data f...
Q133. Which of the following tools is a wireless sniffer and analyzer that works on the Windows ...
Q134. Adam works as a professional Penetration tester. A project has been assigned to him to emp...
Q135. Which of the following is the process of overwriting all addressable locations on a disk?...
Q136. Convention on Cybercrime, created by the Council of Europe, is the treaty seeking to addre...
Q137. In 2001, the Council of Europe passed a convention on cybercrime. It was the first interna...
Q138. Which of the following is used to authenticate asymmetric keys?...
Q139. Which of the following types of firewall functions at the Session layer of OSI model?...
[×]

Download PDF File

Enter your email address to download GIAC.GCFA.v2023-05-19.q139.pdf

Email:

DumpsFiles

Our website provides the Largest and the most Latest vendors Certification Exam materials around the world.

Using dumps we provide to Pass the Exam, we has the Valid Dumps with passing guranteed just which you need.

  • DMCA
  • About
  • Contact Us
  • Privacy Policy
  • Terms & Conditions
©2025 DumpsFiles

www.dumpsfiles.com materials do not contain actual questions and answers from Cisco's certification exams.