2019 Free Microsoft EnsurePass GCFA Dumps VCE and PDF Download Part 4

EnsurePass
Exam Dumps
GCFA Dumps VCE and PDF
2019 GCFA Dumps Practice Exams

QUESTION 31

Adam works as a professional Penetration tester. A project has been assigned to him to employ penetration testing on the network of Umbrella Inc. He is running the test from home and had downloaded every security scanner from the Internet. Despite knowing the IP range of all of the systems, and the exact network configuration, Adam is unable to get any useful results. Which of the following is the most like cause of this problem? Each correct answer represents a complete solution. Choose all that apply.

 

A.

Security scanners are only as smart as their database and cannot find unpublished vulnerabilities.

B.

Security scanners cannot perform vulnerability linkage.

C.

Security scanners are smart as their database and can find unpublished vulnerabilities.

D.

Security scanners are not designed to do testing through a firewall.

 

Correct Answer: ABD

 

 

QUESTION 32

An organization monitors the hard disks of its employees’ computers from time to time. Which policy does this pertain to?

 

A.

Network security policy

B.

User password policy

C.

Privacy policy

D.

Backup policy

 

Correct Answer: C

 

 

QUESTION 33

You work as a Network Administrator for Net World International. You have configured the hard disk drive of your computer as shown in the image below:

 

image005

 

The computer is configured to dual-boot with Windows 2000 Server and Windows 98. While working on Windows 2000 Server, you save a file on the 6GB partition. You are unable to find the file while working on Windows 98. You are not even able to access the partition on which the file is saved. What is the most likely cause?

 

A.

The file is corrupt.

B.

The 6GB partition is corrupt.

C.

Windows 98 does not support the NTFS file system.

D.

Files saved in Windows 98 are not supported by Windows 2000.

 

Correct Answer: C

 

 

QUESTION 34

Peter works as a Computer Hacking Forensic Investigator. He has been called by an organization to conduct a seminar to give necessary information related to sexual harassment within the work place. Peter started with the definition and types of sexual harassment. He then wants to convey that it is important that records of the sexual harassment incidents should be maintained, which helps in further legal prosecution. Which of the following data should be recorded in this documentation? Each correct answer represents a complete solution. Choose all that apply.

 

A.

Names of the victims

B.

Date and time of incident

C.

Nature of harassment

D.

Location of each incident

 

Correct Answer: ABD

 

 

QUESTION 35

Which of the following types of computers is used for attracting potential intruders?

 

A.

Bastion host

B.

Data pot

C.

Files pot

D.

Honey pot

 

Correct Answer: D

 

 

QUESTION 36

Which of the following standard file formats is used by Apple’s iPod to store contact information?

 

A.

HFS+

B.

hCard

C.

vCard

D.

FAT32

 

Correct Answer: C

 

 

QUESTION 37

Which of the following file systems cannot be used to install an operating system on the hard disk drive? Each correct answer represents a complete solution. Choose two.

 

A.

Windows NT file system (NTFS)

B.

High Performance File System (HPFS)

C.

Log-structured file system (LFS)

D.

Compact Disc File System (CDFS)

E.

Novell Storage Services (NSS)

 

Correct Answer: CD

 

 

 

 

QUESTION 38

Which of the following types of evidence proves or disproves a specific act through oral testimony based on information gathered through the witness’s five senses?

 

A.

Conclusive evidence

B.

Best evidence

C.

Hearsay evidence

D.

Direct evidence

 

Correct Answer: D

 

 

QUESTION 39

Which of the following two cryptography methods are used by NTFS Encrypting File System (EFS) to encrypt the data stored on a disk on a file-by-file basis?

 

A.

Digital certificates

B.

Public key

C.

RSA

D.

Twofish

 

Correct Answer: AB

 

 

QUESTION 40

Which of the following sections of an investigative report covers the background and summary of the report including the outcome of the case and the list of allegations?

 

A.

Section 2

B.

Section 4

C.

Section 3

D.

Section 1

 

Correct Answer: A

Leave a Reply

Your email address will not be published. Required fields are marked *