Weekend Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

GCFA Exam Dumps - GIAC Forensics Questions and Answers

Question # 14

John works as a professional Ethical Hacker. He has been assigned the task of testing the security of www.we-are-secure.com. He has performed the footprinting step and now he has enough information to begin scanning in order to detect active computers. He sends a ping request to a computer using ICMP type 13. What kind of ICMP message is John using to send the ICMP ping request message?

Options:

A.

Address mask request

B.

Echo request

C.

Information request (obsolete)

D.

Timestamp request (obsolete)

Buy Now
Question # 15

John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. Which of the following commands will John use to display information about all mounted file systems?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

du

B.

ls

C.

df

D.

df -m

Buy Now
Question # 16

What are the purposes of audit records on an information system?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Backup

B.

Investigation

C.

Upgradation

D.

Troubleshooting

Buy Now
Question # 17

A Web-based credit card company had collected financial and personal details of Mark before issuing him a credit card. The company has now provided Mark's financial and personal details to another company. Which of the following Internet laws has the credit card issuing company violated?

Options:

A.

Security law

B.

Privacy law

C.

Copyright law

D.

Trademark law

Buy Now
Question # 18

Which of the following steps should be performed in order to optimize a system performance?

Each correct answer represents a complete solution. Choose three.

Options:

A.

Run anti-spyware program regularly

B.

Defragment the hard disk drive

C.

Edit registry regularly

D.

Delete the temporary files

Buy Now
Question # 19

You work as the Network Administrator for McNeil Inc. The company has a Unix-based network. You want to set the hard disk geometry parameters, cylinders, heads, and sectors. Which of the following Unix commands can you use to accomplish the task?

Options:

A.

mkfs

B.

mkswap

C.

mke2fs

D.

hdparm

Buy Now
Question # 20

You want to perform passive footprinting against we-are-secure Inc. Web server. Which of the following tools will you use?

Options:

A.

Netcraft

B.

Ettercap

C.

Ethereal

D.

Nmap

Buy Now
Question # 21

Which of the following tools are used to determine the hop counts of an IP packet?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Netstat

B.

TRACERT

C.

IPCONFIG

D.

Ping

Buy Now
Question # 22

Which of the following components are usually found in an Intrusion detection system (IDS)?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Sensor

B.

Firewall

C.

Modem

D.

Gateway

E.

Console

Buy Now
Question # 23

Which of the following functionality within the Autopsy browser is specifically designed to aid in case management?

Options:

A.

Hash database

B.

File listing

C.

Image integrity

D.

Keyword searches

Buy Now
Exam Code: GCFA
Exam Name: GIACCertified Forensics Analyst
Last Update: Aug 24, 2025
Questions: 318
GCFA pdf

GCFA PDF

$25.5  $84.99
GCFA Engine

GCFA Testing Engine

$28.5  $94.99
GCFA PDF + Engine

GCFA PDF + Testing Engine

$40.5  $134.99