Weekend Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

GCFA Exam Dumps - GIAC Forensics Questions and Answers

Question # 44

Peter works as a Technical Representative in a CSIRT for SecureEnet Inc. His team is called to investigate the computer of an employee, who is suspected for classified data theft. Suspect's computer runs on Windows operating system. Peter wants to collect data and evidences for further analysis. He knows that in Windows operating system, the data is searched in pre-defined steps for proper and efficient analysis. Which of the following is the correct order for searching data on a Windows based system?

Options:

A.

Volatile data, file slack, registry, memory dumps, file system, system state backup, internet traces

B.

Volatile data, file slack, registry, system state backup, internet traces, file system, memory dumps

C.

Volatile data, file slack, internet traces, registry, memory dumps, system state backup, file system

D.

Volatile data, file slack, file system, registry, memory dumps, system state backup, internet traces

Buy Now
Question # 45

You work as the Network Administrator for McNeil Inc. The company has a Unix-based network. You want to fix partitions on a hard drive. Which of the following Unix commands can you use to accomplish the task?

Options:

A.

fdformat

B.

exportfs

C.

fsck

D.

fdisk

Buy Now
Question # 46

Which of the following file systems provides file-level security?

Options:

A.

CDFS

B.

FAT

C.

FAT32

D.

NTFS

Buy Now
Question # 47

Adam works as a professional Computer Hacking Forensic Investigator. A project has been assigned to him by the chief security officer of a cloth manufacturing company who suspects that one of the employees is selling the design of the clothes outside the company. The security officer asked Adam to investigate the iPhone of the employee, as he suspects that there might be some sensitive information stored in his iPhone. On investigation Adam found out that the employee tries to destroy the evidence on his iPhone. He presses and holds the Home and Power buttons until the device is forced into recovery mode. Which of the following actions occurred when iPhone is set into recovery mode?

Options:

A.

iPhone will be prevented from booting temporarily.

B.

The file system will be destroyed.

C.

Nothing will happen.

D.

Data will be destroyed.

Buy Now
Question # 48

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He has successfully completed the following pre-attack phases while testing the security of the server:

Footprinting

Scanning

Now he wants to conduct the enumeration phase. Which of the following tools can John use to conduct it?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

WinSSLMiM

B.

PsPasswd

C.

PsFile

D.

UserInfo

Buy Now
Question # 49

Which of the following wireless network standards operates on the 5 GHz band and transfers data at a rate of 54 Mbps?

Options:

A.

802.11a

B.

802.11u

C.

802.11g

D.

802.11b

Buy Now
Question # 50

Which of the following is described in the following statement?

"It is a 512 bytes long boot sector that is the first sector of a default boot drive. It is also known as Volume Boot Sector, if the boot drive is un-partitioned. "

Options:

A.

BIOS

B.

SBR

C.

POST

D.

MBR

Buy Now
Exam Code: GCFA
Exam Name: GIACCertified Forensics Analyst
Last Update: Aug 24, 2025
Questions: 318
GCFA pdf

GCFA PDF

$25.5  $84.99
GCFA Engine

GCFA Testing Engine

$28.5  $94.99
GCFA PDF + Engine

GCFA PDF + Testing Engine

$40.5  $134.99