Cyber Monday Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmaspas7

Easiest Solution 2 Pass Your Certification Exams

GCFA GIACCertified Forensics Analyst Free Practice Exam Questions (2025 Updated)

Prepare effectively for your GIAC GCFA GIACCertified Forensics Analyst certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 5 / 5
Total 318 questions

Normally, RAM is used for temporary storage of data. But sometimes RAM data is stored in the hard disk, what is this method called?

A.

Cache memory

B.

Static memory

C.

Virtual memory

D.

Volatile memory

You are working with a team that will be bringing in new computers to a sales department at a company. The sales team would like to keep not only their old files, but system settings as well on the new PC's. What should you do?

A.

Use the Disk Management tool to move everything to the new computer.

B.

Copy the files and the Windows Registry to a removable media then copy it onto the new machines.

C.

Do a system backup (complete) on each old machine, then restore it onto the new machines

D.

Use the User State Migration tool to move the system settings and files to the new machines.

Which of the following file systems supports the hot fixing feature?

A.

FAT16

B.

exFAT

C.

FAT32

D.

NTFS

You work as a Network Administrator for Web World Inc. You want to host an e-commerce Web site on your network. You want to ensure that storage of credit card information is secure. Which of the following conditions should be met to accomplish this?

Each correct answer represents a complete solution. Choose all that apply.

A.

NT authentication should be required for all customers before they provide their credit card numbers.

B.

Strong encryption software should be used to store credit card information.

C.

Only authorized access should be allowed to credit card information.

D.

The NTFS file system should be implemented on a client computer.

Which of the following file systems contains hardware settings of a Linux computer?

A.

/var

B.

/etc

C.

/proc

D.

/home

Which of the following types of computers is used for attracting potential intruders?

A.

Bastion host

B.

Data pot

C.

Files pot

D.

Honey pot

You work as a Network Administrator for Peach Tree Inc. The company currently has a FAT-based Windows NT network. All client computers run Windows 98. The management wants all client computers to be able to boot in Windows XP Professional. You want to accomplish the following goals:

The file system should support file compression and file level security.

All the existing data and files can be used by the new file system.

Users should be able to dual-boot their computers.

You take the following steps to accomplish these goals:

Convert the FAT file system to NTFS using the CONVERT utility.

Install Windows XP and choose to upgrade the existing operating system during setup.

Which of the following goals will you be able to accomplish?

Each correct answer represents a complete solution. Choose all that apply.

A.

The file system supports file compression and file level security.

B.

All the existing data and files can be used by the new file system.

C.

Users are able to dual-boot their computers.

D.

None of the goals are accomplished.

Which of the following is the correct order of loading system files into the main memory of the system, when the computer is running on Microsoft's Windows XP operating system?

A.

NTLDR, BOOT.ini, HAL.dll, NTDETECT.com, NTOSKRNL.exe

B.

NTLDR, BOOT.ini, NTDETECT.com, HAL.dll, NTOSKRNL.exe

C.

NTLDR, BOOT.ini, HAL.dll, NTDETECT.com, NTOSKRNL.exe

D.

BOOT.ini, HAL.dll, NTDETECT.com, NTLDR, NTOSKRNL.exe

You work as a Network Administrator for Perfect Solutions Inc. You install Windows 98 on a computer. By default, which of the following folders does Windows 98 setup use to keep the registry tools?

A.

$SYSTEMROOT$REGISTRY

B.

$SYSTEMROOT$WINDOWS

C.

$SYSTEMROOT$WINDOWSREGISTRY

D.

$SYSTEMROOT$WINDOWSSYSTEM32

Which of the following is the process of overwriting all addressable locations on a disk?

A.

Drive wiping

B.

Spoofing

C.

Sanitization

D.

Authentication

John works as a professional Ethical Hacker. He is assigned a project to test the security of www.weare-secure.com. He is working on the Linux operating system. He wants to sniff the we-are-secure network and intercept a conversation between two employees of the company through session hijacking. Which of the following tools will John use to accomplish the task?

A.

Ethercap

B.

Tripwire

C.

Hunt

D.

IPChains

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He receives the following e-mail:

The e-mail that John has received is an example of __________.

A.

Virus hoaxes

B.

Spambots

C.

Social engineering attacks

D.

Chain letters

Which of the following switches of the XCOPY command copies attributes while copying files?

A.

/o

B.

/p

C.

/k

D.

/s

Which of the following IP addresses are private addresses?

Each correct answer represents a complete solution. Choose all that apply.

A.

19.3.22.17

B.

192.168.15.2

C.

192.166.54.32

D.

10.0.0.3

You are the Network Administrator and your company has recently implemented encryption for all emails. You want to check to make sure that the email packages are being encrypted. What tool would you use to accomplish this?

A.

Password cracker

B.

Packet sniffer

C.

Performance Monitor

D.

Vulnerability analyzer

Page: 5 / 5
Total 318 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved