[Q166-Q181] Updated GCFA Dumps PDF – GCFA Real Valid Brain Dumps With 318 Questions!

March 5, 2023 0 Comments

Rate this post

Updated GCFA Dumps PDF – GCFA Real Valid Brain Dumps With 318 Questions!

100% Free GCFA Exam Dumps Use Real GIAC Information Security Dumps

QUESTION 166
Which of the following protocols allows computers on different operating systems to share files and disk storage?

 
 
 
 

QUESTION 167
You work as a Network Administrator for Blue Bell Inc. You want to install Windows XP Professional on your computer, which already has Windows Me installed. You want to configure your computer to dual boot between Windows Me and Windows XP Professional. You have a single 40GB hard disk.
Which of the following file systems will you choose to dual-boot between the two operating systems?

 
 
 
 

QUESTION 168
Which of the following is described in the following statement?
“It is a 512 bytes long boot sector that is the first sector of a default boot drive. It is also known as Volume Boot Sector, if the boot drive is un-partitioned. “

 
 
 
 

QUESTION 169
Which of the following are advantages of NTFS file system over FAT32 and FAT?
Each correct answer represents a part of the solution. Choose two.

 
 
 
 

QUESTION 170
Which of the following file systems is used by both CD and DVD?

 
 
 
 

QUESTION 171
Which of the following can be monitored by using the host intrusion detection system (HIDS)?
Each correct answer represents a complete solution. Choose two.

 
 
 
 

QUESTION 172
Which of the following commands is used to create or delete partitions on Windows XP?

 
 
 
 

QUESTION 173
Which of the following methods can be used to start the Disk Defragmenter utility in Windows 9x?
Each correct answer represents a complete solution. Choose two.

 
 
 
 

QUESTION 174
John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He has successfully completed the following pre-attack phases while testing the security of the server:
Footprinting

Scanning

Now he wants to conduct the enumeration phase. Which of the following tools can John use to conduct it?
Each correct answer represents a complete solution. Choose all that apply.

 
 
 
 

QUESTION 175
Which of the following is used for remote file access by UNIX/Linux systems?

 
 
 
 

QUESTION 176
You work as a Network Administrator for Net World International. You want to configure a Windows 2000 computer to dual boot with Windows 98. The hard disk drive of the computer will be configured as a single partition drive. Which of the following file systems will you use to accomplish this?

 
 
 
 

QUESTION 177
Which of the following Acts enacted in United States amends Civil Rights Act of 1964, providing technical changes affecting the length of time allowed to challenge unlawful seniority provisions, to sue the federal government for discrimination and to bring age discrimination claims?

 
 
 
 

QUESTION 178
Which of the following is used to authenticate asymmetric keys?

 
 
 
 

QUESTION 179
You work as a professional Computer Hacking Forensic Investigator. A project has been assigned to you to investigate Plagiarism occurred in the source code files of C#. Which of the following tools will you use to detect the software plagiarism?

 
 
 
 

QUESTION 180
Which of the following statements about the NTDETECT.COM file is true?
Each correct answer represents a complete solution. Choose three.

 
 
 
 

QUESTION 181
Your network has a Windows 2000 Server computer with FAT file system, shared by several users.
This system stores sensitive data. You decide to encrypt this data to protect it from unauthorized access. You want to accomplish the following goals:
* Data should be secure and encrypted.
* Administrative efforts should be minimum.
* You should have the ability to recover encrypted files in case the file owner leaves the company.
* Other permissions on encrypted files should be unaffected.
* File-level security is required on the disk where data is stored.
* Encrypting or decrypting of files should not be the responsibility of the file owner.
You take the following steps to accomplish these goals :
* Convert the FAT file system to Windows 2000 NTFS file system.
* Use Encrypting File System (EFS) to encrypt data.
Which of the following goals will you be able to accomplish?
Each correct answer represents a complete solution. Choose all that apply.

 
 
 
 
 
 

Pass Your GCFA Exam Easily With 100% Exam Passing Guarantee: https://www.topexamcollection.com/GCFA-vce-collection.html

Leave a Reply

Your email address will not be published. Required fields are marked *

Enter the text from the image below