DumpsFiles
 Request Exam  Contact
  • Home
  • PRACTICE EXAMS
    Oracle
    Fortinet
    Juniper
    Microsoft
    Cisco
    Citrix
    CompTIA
    VMware
    SAP
    EMC
    PMI
    HP
    Salesforce
    Other
  • View All Exams
  • New Dumps Files
  • Upload
  • Oracle
    Oracle
  • Fortinet
    Fortinet
  • Juniper
    Juniper
  • Microsoft
    Microsoft
  • Cisco
    Cisco
  • Citrix
    Citrix
  • CompTIA
    CompTIA
  • VMware
    VMware
  • SAP
    SAP
  • EMC
    EMC
  • PMI
    PMI
  • HP
    HP
  • Salesforce
    Salesforce
  1. Home
  2. GIAC
  3. GIAC Certified Forensics Analyst
  4. GIAC.GCFA.v2023-11-20.q170
  5. Question 1

Join the discussion

Question 1/170

Which of the following statements about an extended partition are true?
Each correct answer represents a complete solution. Choose two.

Correct Answer: C,D

Add Comments

Your email address will not be published. Required fields are marked *

insert code
Type the characters from the picture.
Rating:
Other Question (170q)
Q1. Which of the following statements about an extended partition are true? Each correct answe...
Q2. Peter works as a Computer Hacking Forensic Investigator for SecureEnet Inc. He has been as...
Q3. A customer comes to you stating that his hard drive has crashed. He had backed up the hard...
Q4. On which of the following locations does the Windows NT/2000 operating system contain the ...
Q5. Which of the following firewalls depends on the three-way handshake of the TCP protocol?...
Q6. Which of the following tools works by using standard set of MS-DOS commands and can create...
Q7. John works as a Network Administrator for DigiNet Inc. He wants to investigate failed logo...
Q8. Which of the following file systems provides integrated security?...
Q9. Which of the following registry hives stores information about the file extensions that ar...
Q10. John works as a professional Ethical Hacker. He is assigned a project to test the security...
Q11. You work as a Network Administrator for Perfect Solutions Inc. The company has a Linux-bas...
Q12. Which of the following enables an inventor to legally enforce his right to exclude others ...
Q13. Joseph works as a Software Developer for WebTech Inc. He wants to protect the algorithms a...
Q14. You are working with a team that will be bringing in new computers to a sales department a...
Q15. Which of the following are the primary goals of the incident handling team? Each correct a...
Q16. Which of the following layers protocols handles file transfer and network management?...
Q17. Which of the following statements is true for a file in the UNIX operating system?...
Q18. Which of the following layers protocols handles file transfer and network management?...
Q19. Which of the following files starts the initialization process in booting sequence of the ...
Q20. Which of the following two cryptography methods are used by NTFS Encrypting File System (E...
Q21. Adam works as a Security Administrator for Umbrella Technology Inc. He reported a breach i...
Q22. You work as the Network Administrator for McNeil Inc. The company has a Unix-based network...
Q23. The incident response team has turned the evidence over to the forensic team. Now, it is t...
Q24. Which of the following is a documentation of guidelines that computer forensics experts us...
Q25. Which of the following switches is used with Pslist command on the command line to show th...
Q26. Which of the following is the correct order of digital investigations Standard Operating P...
Q27. Which of the following file systems supports disk quotas?...
Q28. An attacker attempts to gain information about a network by specifically targeting the net...
Q29. Which of the following file systems is designed by Sun Microsystems?...
Q30. Adam works as a professional Computer Hacking Forensic Investigator. A project has been as...
Q31. Which of the following is used to back up forensic evidences or data folders from the netw...
Q32. Which of the following articles defines illegal access to the computer or network in Chapt...
Q33. Which of the following files contains the salted passwords in the Linux operating system?...
Q34. The incident response team has turned the evidence over to the forensic team. Now, it is t...
Q35. Which of the following are the benefits of information classification for an organization?...
Q36. Which of the following is the Windows feature on which the file management can be performe...
Q37. Which of the following types of virus makes changes to a file system of a disk?...
Q38. You work as a Network Administrator for Net World International. You have configured the h...
Q39. The promiscuous mode is a configuration of a network card that makes the card pass all tra...
Q40. Which of the following commands is used to create or delete partitions on Windows XP?...
Q41. You work as a Computer Hacking Forensic Investigator for SecureNet Inc. You want to invest...
Q42. Which of the following protocols allows computers on different operating systems to share ...
Q43. You work as a Network Administrator for Tech Perfect Inc. The company has a Linux-based ne...
Q44. You work as a Forensic Investigator. Which of the following rules will you follow while wo...
Q45. Adam works as a professional Computer Hacking Forensic Investigator. A project has been as...
Q46. Which of the following statements about SD cards are true? Each correct answer represents ...
Q47. Which of the following file systems is designed by Sun Microsystems?...
Q48. Which of the following is used to store configuration settings and options on Microsoft Wi...
Q49. In 2001, the Council of Europe passed a convention on cybercrime. It was the first interna...
Q50. Which of the following tools can be used to perform a whois query? Each correct answer rep...
Q51. Adam works as a professional Computer Hacking Forensic Investigator. A project has been as...
Q52. Adam works as a professional Computer Hacking Forensic Investigator. A project has been as...
Q53. Adam, a malicious hacker, hides a hacking tool from a system administrator of his company ...
Q54. You work as a Network Administrator for a bank. For securing the bank's network, you confi...
Q55. Which of the following tools is an asterisk password revealer tool?...
Q56. Which of the following tools is a wireless sniffer and analyzer that works on the Windows ...
Q57. Which of the following switches of the XCOPY command copies file ownerships and NTFS permi...
Q58. Fill in the blank with the appropriate file system. Alternate Data Streams (ADS) is a feat...
Q59. Which of the following log files are used to collect evidences before taking the bit-strea...
Q60. Which of the following commands is used to enforce checking of a file system even if the f...
Q61. On which of the following locations does the Windows NT/2000 operating system contain the ...
Q62. In which of the following security tests does the security testing team simulate as an emp...
Q63. John works as a Technical Support Executive in ABC Inc. The company's network consists of ...
Q64. John works as a professional Ethical Hacker. He has been assigned the project of testing t...
Q65. Adam works as a professional Computer Hacking Forensic Investigator with the local police ...
Q66. Which of the following are the benefits of information classification for an organization?...
Q67. Which of the following statements are true about Compact Disc (CD) and Digital Versatile D...
Q68. Which two technologies should research groups use for secure VPN access while traveling? (...
Q69. Sandra, a novice computer user, works on Windows environment. She experiences some problem...
Q70. Which of the following is a correct sequence of different layers of Open System Interconne...
Q71. Mark is the Administrator of a Linux computer. He wants to check the status of failed Teln...
Q72. Mark works as a Network administrator for SecureEnet Inc. His system runs on Mac OS X. He ...
Q73. Adam works as a Computer Hacking Forensic Investigator in a law firm. He has been assigned...
Q74. Which of the following directories in Linux operating system contains device files, which ...
Q75. Which of the following types of computers is used for attracting potential intruders?...
Q76. Sandra wants to create a full system state backup of her computer, which is running on Mic...
Q77. John works as a Network Security Professional. He is assigned a project to test the securi...
Q78. Which of the following modules of OS X kernel (XNU) provides the primary system program in...
Q79. Which of the following is the initiative of United States Department of Justice, which pro...
Q80. Which of the following statements best describes the consequences of the disaster recovery...
Q81. Which of the following is the correct order of digital investigations Standard Operating P...
Q82. Which of the following evidences are the collection of facts that, when considered togethe...
Q83. John works as a Technical Support Executive in ABC Inc. The company's network consists of ...
Q84. Adam, a malicious hacker, hides a hacking tool from a system administrator of his company ...
Q85. Which of the following statements is true for a file in the UNIX operating system?...
Q86. Which of the following is the first computer virus that was used to infect the boot sector...
Q87. Which of the following types of evidence proves or disproves a specific act through oral t...
Q88. You work as the Network Administrator for McNeil Inc. The company has a Unix-based network...
Q89. In which of the following files does the Linux operating system store passwords?...
Q90. Which of the following is the process of overwriting all addressable locations on a disk?...
Q91. Adam works as a professional Computer Hacking Forensic Investigator, a project has been as...
Q92. You work as a Web developer for ABC Inc. You want to investigate the Cross-Site Scripting ...
Q93. In which of the following files does the Linux operating system store passwords?...
Q94. Which of the following tools is used to locate lost files and partitions to restore data f...
Q95. You work as a Network Administrator for Peach Tree Inc. The company currently has a FAT-ba...
Q96. You work as a Network Administrator for Perfect Solutions Inc. You have to install Windows...
Q97. You are the Security Consultant working with a client who uses a lot of outdated systems. ...
Q98. Which of the following needs to be documented to preserve evidences for presentation in co...
Q99. Which of the following prevents malicious programs from attacking a system?...
Q100. You work as a Network Administrator for McNeel Inc. You want to encrypt each user's MY DOC...
Q101. Which of the following graphical tools is used to navigate through directory structures?...
Q102. A Web-based credit card company had collected financial and personal details of Mark befor...
Q103. Adam works as a professional Computer Hacking Forensic Investigator. He has been assigned ...
Q104. The promiscuous mode is a configuration of a network card that makes the card pass all tra...
Q105. By gaining full control of router, hackers often acquire full control of the network. Whic...
Q106. Which of the following two cryptography methods are used by NTFS Encrypting File System (E...
Q107. Which of the following cryptographic methods are used in EnCase to ensure the integrity of...
Q108. A customer comes to you stating that his hard drive has crashed. He had backed up the hard...
Q109. Maria works as a professional Ethical Hacker. She recently got a project to test the secur...
Q110. John works as a professional Ethical Hacker. He has been assigned a project to test the se...
Q111. Which of the following uses hard disk drive space to provide extra memory for a computer?...
Q112. Adam works as an Incident Handler for Umbrella Inc. He is informed by the senior authoriti...
Q113. Adam works as an Incident Handler for Umbrella Inc. He is informed by the senior authoriti...
Q114. Which of the following file systems supports the hot fixing feature?...
Q115. Brutus is a password cracking tool that can be used to crack the following authentications...
Q116. Which of the following types of evidence proves or disproves a specific act through oral t...
Q117. Which of the following is a name, symbol, or slogan with which a product is identified?...
Q118. Which of the following IP addresses are private addresses? Each correct answer represents ...
Q119. Which of the following statements are true about Compact Disc (CD) and Digital Versatile D...
Q120. John works as a contract Ethical Hacker. He has recently got a project to do security chec...
Q121. Joseph works as a Software Developer for WebTech Inc. He wants to protect the algorithms a...
Q122. Adam works as a professional Computer Hacking Forensic Investigator with the local police ...
Q123. You work as a Network Administrator for uCertify Inc. You want to edit the MSDOS.SYS file,...
Q124. Which of the following is used for remote file access by UNIX/Linux systems?...
Q125. You want to change the attribute of a file named ACE.TXT to Hidden. Which command line wil...
Q126. Which of the following tools are used for footprinting? Each correct answer represents a c...
Q127. Which of the following diagnostic codes sent by POST to the internal port h80 refers to th...
Q128. Which of the following password cracking attacks is based on a pre-calculated hash table t...
Q129. Which of the following directories contains administrative commands on a UNIX computer?...
Q130. Which of the following is a nonvolatile form of memory that can be reprogrammed by using a...
Q131. Adam works as a professional Computer Hacking Forensic Investigator. A project has been as...
Q132. Which of the following describes software technologies that improve portability, manageabi...
Q133. You work as the Network Administrator for McNeil Inc. The company has a Unix-based network...
Q134. You want to upgrade a partition in your computer's hard disk drive from FAT to NTFS. Which...
Q135. Which of the following is described in the following statement? "It is a 512 bytes long bo...
Q136. Which of the following is used to detect the bad sectors in a hard disk under Linux enviro...
Q137. Which of the following statements are true about routers? Each correct answer represents a...
Q138. HOTSPOT Identify the port in the image given below, which can be connected to the hub to e...
Q139. Which of the following are advantages of NTFS file system over FAT32 and FAT? Each correct...
Q140. Adam works as a professional Computer Hacking Forensic Investigator. He has been called by...
Q141. An organization monitors the hard disks of its employees' computers from time to time. Whi...
Q142. Which of the following directories cannot be placed out of the root filesystem? Each corre...
Q143. Joseph works as a Web Designer for WebTech Inc. He creates a Web site and wants to protect...
Q144. Which of the following Incident handling process phases is responsible for defining rules,...
Q145. Joseph works as a Web Designer for WebTech Inc. He creates a Web site and wants to protect...
Q146. Which of the following file systems cannot be used to install an operating system on the h...
Q147. Your network has a Windows 2000 Server computer with FAT file system, shared by several us...
Q148. You are a professional Computer Hacking forensic investigator. You have been called to col...
Q149. You work as a Network Administrator for Perfect Solutions Inc. The company has a Linux-bas...
Q150. John works as a professional Ethical Hacker. He has been assigned a project for testing th...
Q151. Which of the following types of evidence is considered as the best evidence?...
Q152. Adam works as a Security Administrator for Umbrella Technology Inc. He reported a breach i...
Q153. You work as a professional Computer Hacking Forensic Investigator for DataEnet Inc. You wa...
Q154. Peter works as a Technical Representative in a CSIRT for SecureEnet Inc. His team is calle...
Q155. Mark works as a Network Administrator for Net Perfect Inc. The company has a Linux-based n...
Q156. Which of the following tools can be used to perform tasks such as Windows password crackin...
Q157. In the United States, Title VII of the 1964 Civil Rights Act was formulated to protect an ...
Q158. Which of the following directories in Linux operating system contains device files, which ...
Q159. Adam works as a professional Computer Hacking Forensic Investigator. He works with the loc...
Q160. Peter works as a Technical Representative in a CSIRT for SecureEnet Inc. His team is calle...
Q161. Which of the following parameters is NOT used for calculating the capacity of the hard dis...
Q162. Adam works as a professional Computer Hacking Forensic Investigator. A project has been as...
Q163. Which of the following command line tools are available in Helix Live acquisition tool on ...
Q164. Adam works as a professional Computer Hacking Forensic Investigator. A project has been as...
Q165. The Klez worm is a mass-mailing worm that exploits a vulnerability to open an executable a...
Q166. You work as a Network Administrator for Blue Well Inc. Your company's network has a Window...
Q167. Which of the following tools can be used to perform a whois query? Each correct answer rep...
Q168. You work as a Network Administrator for Tech Perfect Inc. The company has a TCP/IP-based n...
Q169. Which of the following directories cannot be placed out of the root filesystem? Each corre...
Q170. You are a professional Computer Hacking forensic investigator. You have been called to col...
[×]

Download PDF File

Enter your email address to download GIAC.GCFA.v2023-11-20.q170.pdf

Email:

DumpsFiles

Our website provides the Largest and the most Latest vendors Certification Exam materials around the world.

Using dumps we provide to Pass the Exam, we has the Valid Dumps with passing guranteed just which you need.

  • DMCA
  • About
  • Contact Us
  • Privacy Policy
  • Terms & Conditions
©2025 DumpsFiles

www.dumpsfiles.com materials do not contain actual questions and answers from Cisco's certification exams.