EnsurePass
Exam Dumps
GCFA Dumps VCE and PDF
2019 GCFA Dumps Practice Exams
QUESTION 71
Adam works as a professional Computer Hacking Forensic Investigator. He has been assigned with the project of investigating an iPod, which is suspected to contain some explicit material. Adam wants to connect the compromised iPod to his system, which is running on Windows XP (SP2) operating system. He doubts that connecting the iPod with his computer may change some evidences and settings in the iPod. He wants to set the iPod to read-only mode. This can be done by changing the registry key within the Windows XP (SP2) operating system. Which of the following registry keys will Adam change to accomplish the task?
A. |
HKEY_LOCAL_MACHINE\System\CurrentControlset\Control\StorageDevicePolicies |
B. |
HKEY_LOCAL_MACHINE\CurrentControlset\Control\StorageDevicePolicies |
C. |
HKEY_LOCAL_MACHINE\System\CurrentControlset\StorageDevicePolicies |
D. |
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion |
Correct Answer: A
QUESTION 72
HOTSPOT
Identify the port in the image given below, which can be connected to the hub to extend the number of ports, and up to 127 devices can be connected to it?
Correct Answer:
QUESTION 73
Nathan works as a Computer Hacking Forensic Investigator for SecureEnet Inc. He uses Visual TimeAnalyzer software to track all computer usage by logging into individual users account or specific projects and compile detailed accounts of time spent within each program. Which of the following functions are NOT performed by Visual TimeAnalyzer? Each correct answer represents a complete solution. Choose all that apply.
A. |
It monitors all user data such as passwords and personal documents. |
B. |
It gives parents control over their children’s use of the personal computer. |
C. |
It tracks work time, pauses, projects, costs, software, and internet usage. |
D. |
It records specific keystrokes and run screen captures as a background process. |
Correct Answer: AD
QUESTION 74
Which of the following IP addresses are private addresses? Each correct answer represents a complete solution. Choose all that apply.
A. |
19.3.22.17 |
B. |
192.168.15.2 |
C. |
192.166.54.32 |
D. |
10.0.0.3 |
Correct Answer: BD
QUESTION 75
Sandra, a novice computer user, works on Windows environment. She experiences some problem regarding bad sectors formed in a hard disk of her computer. She wants to run CHKDSK command to check the hard disk for bad sectors and to fix the errors, if any, occurred. Which of the following switches will she use with CHKDSK command to accomplish the task?
A. |
CHKDSK /I |
B. |
CHKDSK /C /L |
C. |
CHKDSK /V /X |
D. |
CHKDSK /R /F |
Correct Answer: D
QUESTION 76
Which of the following statements about an extended partition are true? Each correct answer represents a complete solution. Choose two.
A. |
It can be sub-divided into logical drives. |
B. |
It cannot be formatted or assigned a drive letter. |
C. |
A maximum of four extended partitions can exist on a single basic disk. |
D. |
It cannot contain more than one logical drive. |
Correct Answer: AB
QUESTION 77
You are reviewing a Service Level Agreement between your company and a Web development vendor. Which of the following are security requirements you should look for in this SLA? Each correct answer represents a complete solution. Choose all that apply.
A. |
Time to respond to bug reports |
B. |
Encryption standards |
C. |
Security Monitoring |
D. |
Guarantees on known security flaws |
Correct Answer: ABCD
QUESTION 78
Which of the following is used to detect the bad sectors in a hard disk under Linux environment?
A. |
Badblocks |
B. |
CheckDisk |
C. |
ScanDisk |
D. |
CHKDSK |
Correct Answer: A
QUESTION 79
Which of the following statements are NOT true about volume boot record or Master Boot Record? Each correct answer represents a complete solution. Choose all that apply.
A. |
The end of MBR marker is h55CC. |
B. |
The actual program can be 512 bytes long. |
C. |
Volume boot sector is present at cylinder 0, head 0, and sector 1 of the default boot drive. |
D. |
Four 16 bytes master partition records are present in MBR. |
Correct Answer: AB
QUESTION 80
Which of the following tools can be used by a user to hide his identity? Each correct answer represents a complete solution. Choose all that apply.
A. |
Proxy server |
B. |
Anonymizer |
C. |
Rootkit |
D. |
IPchains |
E. |
War dialer |
Correct Answer: ABD