Cyber Monday Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmaspas7

Easiest Solution 2 Pass Your Certification Exams

GCFA GIACCertified Forensics Analyst Free Practice Exam Questions (2025 Updated)

Prepare effectively for your GIAC GCFA GIACCertified Forensics Analyst certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 1 / 5
Total 318 questions

Which of the following statements about SD cards are true?

Each correct answer represents a complete solution. Choose two.

A.

It is used with mobile phones and digital cameras.

B.

It is a type of non-volatile memory card.

C.

It is a 184-pin memory module.

D.

It is used as RAM on client computers and servers.

Which of the following functionality within the Autopsy browser is specifically designed to aid in case management?

A.

Hash database

B.

File listing

C.

Image integrity

D.

Keyword searches

Which of the following types of evidence is considered as the best evidence?

A.

The original document

B.

A copy of the original document

C.

A computer-generated record

D.

Information gathered through the witness's senses

You work as a Network Administrator for Blue Well Inc. Your company's network has a Windows 2000 server with the FAT file system. This server stores sensitive data. You want to encrypt this data to protect it from unauthorized access. You also have to accomplish the following goals:

Data should be encrypted and secure.

Administrative effort should be minimum.

You should have the ability to recover encrypted files in case the file owner leaves the company.

Other permissions on encrypted files should be unaffected.

File-level security is required on the disk where data is stored.

Encryption or decryption of files should not be the responsibility of the file owner.

You take the following steps to accomplish these goals:

Convert the FAT file system to NTFS file system.

Use third-party data encryption software.

What will happen after taking these steps?

Each correct answer represents a complete solution. Choose all that apply.

A.

File-level security will be available on the disk where data is stored.

B.

Data will be encrypted and secure.

C.

Encryption or decryption of files will no longer be the responsibility of the file owner.

D.

Other permissions on encrypted files will remain unaffected.

E.

Administrative effort will be minimum.

You work as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. You are working as a root user on the Linux operating system. While performing some security investigation, you want to see the hostname and IP address from where users logged in.

Which of the following commands will you use to accomplish the task?

A.

Dig

B.

Netstat

C.

Nslookup

D.

Last

Which of the following types of cyber stalking damage the reputation of their victim and turn other people against them by setting up their own Websites, blogs or user pages for this purpose?

A.

False victimization

B.

Encouraging others to harass the victim

C.

False accusations

D.

Attempts to gather information about the victim

Which of the following types of firewall ensures that the packets are part of the established session?

A.

Application-level firewall

B.

Circuit-level firewall

C.

Stateful inspection firewall

D.

Switch-level firewall

Which of the following data is NOT listed as a volatile data in RFC 3227 list for Windows based system?

A.

Kernel statistics

B.

Temporary file system

C.

Data on a hard disk

D.

Routing table

In Linux, which of the following files describes the processes that are started up during boot up?

A.

/etc/passwd

B.

/etc/profile

C.

/etc/inittab

D.

/etc/shadow

John works as a Network Administrator for DigiNet Inc. He wants to investigate failed logon attempts to a network. He uses Log Parser to detail out the failed logons over a specific time frame. He uses the following commands and query to list all failed logons on a specific date:

logparser.exe file:FailedLogons.sql -i:EVT -o:datagrid

SELECT

timegenerated AS LogonTime,

extract_token(strings, 0, '|') AS UserName

FROM Security

WHERE EventID IN (529;

530;

531;

532;

533;

534;

535;

537;

539)

AND to_string(timegenerated,'yyyy-MM-dd HH:mm:ss') like '2004-09%'

After investigation, John concludes that two logon attempts were made by using an expired account.

Which of the following EventID refers to this failed logon?

A.

529

B.

534

C.

531

D.

532

Which of the following articles defines illegal access to the computer or network in Chapter 2 of Section 1, i.e., Substantive criminal law of the Convention on Cybercrime passed by the Council of Europe?

A.

Article 2

B.

Article 5

C.

Article 16

D.

Article 3

You are the Security Consultant working with a client who uses a lot of outdated systems. Many of their clients PC's still have Windows 98. You are concerned about the security of passwords on a Windows 98 machine. What algorithm is used in Windows 98 to hash passwords?

A.

DES

B.

SHA

C.

LANMAN

D.

MD5

Which of the following encryption methods use the RC4 technology?

Each correct answer represents a complete solution. Choose all that apply.

A.

Dynamic WEP

B.

TKIP

C.

Static WEP

D.

CCMP

Which of the following directories contains administrative commands on a UNIX computer?

A.

/usr/local

B.

/sbin

C.

/bin

D.

/export

Victor is a novice Ethical Hacker. He is learning the hacking process, i.e., the steps taken by malicious hackers to perform hacking. Which of the following steps is NOT included in the hacking process?

A.

Reconnaissance

B.

gaining access

C.

Scanning

D.

Preparation

Which of the following are advantages of NTFS file system over FAT32 and FAT?

Each correct answer represents a part of the solution. Choose two.

A.

Support for file and folder level permissions.

B.

Support for audio files.

C.

Support for Encrypting File System (EFS).

D.

Support for dual-booting.

John works as a Technical Support Executive in ABC Inc. The company's network consists of ten computers with Windows XP professional installed on all of them. John is working with a computer on which he has enabled hibernation. He shuts down his computer using hibernation mode. Which of the following will happen to the data after powering off the system using hibernation?

A.

Data will be saved automatically before the system is switched off.

B.

Data will be stored on the ROM.

C.

Data will be saved before the system is switched off if you have configured hibernation to save data.

D.

Unsaved data will be lost when hibernation switches off the system.

Which of the following involves changing data prior to or during input to a computer in an effort to commit fraud?

A.

Data diddling

B.

Spoofing

C.

Eavesdropping

D.

Wiretapping

Which of the following files starts the initialization process in booting sequence of the Linux operating system?

A.

/etc/sbin/init

B.

/etc/inittab

C.

/etc/rc/rc.local

D.

/etc/rc/rc.sysinit

You want to perform passive footprinting against we-are-secure Inc. Web server. Which of the following tools will you use?

A.

Netcraft

B.

Ettercap

C.

Ethereal

D.

Nmap

Page: 1 / 5
Total 318 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved