GIAC GCFA - GIACCertified Forensics Analyst Exam

Page:    1 / 64   
Total 318 questions

Which of the following tools are used for footprinting?
Each correct answer represents a complete solution. Choose all that apply.

  • A. Sam spade
  • B. Traceroute
  • C. Whois
  • D. Brutus


Answer : A,B,C

The MBR of a hard disk is a collection of boot records that contain disk information such as disk architecture, cluster size, and so on. The main work of the MBR is to locate and run necessary operating system files that are required to run a hard disk. In the context of the operating system, MBR is also known as the boot loader. Which of the following viruses can infect the MBR of a hard disk?
Each correct answer represents a complete solution. Choose two.

  • A. Stealth
  • B. Boot sector
  • C. Multipartite
  • D. File


Answer : B,C

Which of the following file systems provides file-level security?

  • A. CDFS
  • B. FAT
  • C. FAT32
  • D. NTFS


Answer : D

Which of the following is a set of exclusive rights granted by a state to an inventor or his assignee for a fixed period of time in exchange for the disclosure of an invention?

  • A. Snooping
  • B. Copyright
  • C. Utility model
  • D. Patent


Answer : D

Fill in the blank with the appropriate name.
_____is a list, which specifies the order of volatility of data in a Windows based system.

  • A. RFC 3227


Answer : A

Page:    1 / 64   
Total 318 questions