Weekend Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

GCFA Exam Dumps - GIAC Forensics Questions and Answers

Question # 24

You work as a Network Administrator for Perfect Solutions Inc. You have to install Windows 2000 on a computer that will work as a file server. You have to format the hard disk of the computer, using a file system that supports encryption. Which of the following file systems will you use to accomplish this?

Options:

A.

NTFS

B.

FAT32

C.

HPFS

D.

FAT16

Buy Now
Question # 25

Which of the following tables is formed by NTFS file system to keep the track of files, to store metadata, and their location?

Options:

A.

The Master File Table

B.

The System File Table

C.

The Master Allocation Table

D.

The File Allocation Table

Buy Now
Question # 26

Which of the following fsck commands will you use to check all filesystems listed in /etc/fstab?

Options:

A.

fsck -f

B.

fsck -P

C.

fsck -A

D.

fsck -y

Buy Now
Question # 27

Adam works as a professional Computer Hacking Forensic Investigator. A project has been assigned to him to investigate computer of an unfaithful employee of SecureEnet Inc. Suspect's computer runs on Windows operating system. Which of the following sources will Adam investigate on a Windows host to collect the electronic evidences?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Swap files

B.

Unused and hidden partition

C.

Slack spaces

D.

Allocated cluster

Buy Now
Question # 28

Peter works as a Security Administrator for SecureEnet Inc. He observes that the database server of the company has been compromised and the data is stolen. Peter immediately wants to report this crime to the law enforcement authorities. Which of the following organizations looks after the computer crimes investigations in the United States?

Options:

A.

Federal Bureau of Investigation

B.

Local or National office of the US secret service

C.

Incident response team

D.

National Institute of Standards and Technology

Buy Now
Question # 29

Which of the following are the two different file formats in which Microsoft Outlook saves e-mail messages based on system configuration?

Each correct answer represents a complete solution. Choose two.

Options:

A.

.pst

B.

.xst

C.

.txt

D.

.ost

Buy Now
Question # 30

Which of the following is used to back up forensic evidences or data folders from the network or locally attached hard disk drives?

Options:

A.

WinHex

B.

Device Seizure

C.

FAR system

D.

Vedit

Buy Now
Question # 31

John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. He enters the following command on the Linux terminal:

chmod 741 secure.c

Considering the above scenario, which of the following statements are true?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

By the octal representation of the file access permission, John is restricting the group members to only read the secure.c file.

B.

The textual representation of the file access permission of 741 will be -rwxr--rw-.

C.

John is restricting a guest to only write or execute the secure.c file.

D.

John is providing all rights to the owner of the file.

Buy Now
Question # 32

Adam works as a professional Penetration tester. A project has been assigned to him to employ penetration testing on the network of Umbrella Inc. He is running the test from home and had downloaded every security scanner from the Internet. Despite knowing the IP range of all of the systems, and the exact network configuration, Adam is unable to get any useful results.

Which of the following is the most like cause of this problem?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Security scanners are only as smart as their database and cannot find unpublished vulnerabilities.

B.

Security scanners cannot perform vulnerability linkage.

C.

Security scanners are smart as their database and can find unpublished vulnerabilities.

D.

Security scanners are not designed to do testing through a firewall.

Buy Now
Question # 33

Which of the following types of evidence proves or disproves a specific act through oral testimony based on information gathered through the witness's five senses?

Options:

A.

Conclusive evidence

B.

Best evidence

C.

Hearsay evidence

D.

Direct evidence

Buy Now
Exam Code: GCFA
Exam Name: GIACCertified Forensics Analyst
Last Update: Aug 24, 2025
Questions: 318
GCFA pdf

GCFA PDF

$25.5  $84.99
GCFA Engine

GCFA Testing Engine

$28.5  $94.99
GCFA PDF + Engine

GCFA PDF + Testing Engine

$40.5  $134.99