GIAC Certified Forensics Analyst
GCFA Exam

Which of the following is the first computer virus that was used to infect the boot sector of storage media formatted with the DOS File Allocation Table (FAT) file system?

  1. Melissa
  2. Tequila
  3. Brain
  4. I love you

Answer(s): C



Which of the following attacks saturates network resources and disrupts services to a specific computer?

  1. Teardrop attack
  2. Polymorphic shell code attack
  3. Denial-of-Service (DoS) attack
  4. Replay attack

Answer(s): C



Peter works as a Technical Representative in a CSIRT for SecureEnet Inc. His team is called to investigate the computer of an employee, who is suspected for classified data theft. Suspect's computer runs on Windows operating system. Peter wants to collect data and evidences for further analysis. He knows that in Windows operating system, the data is searched in pre-defined steps for proper and efficient analysis. Which of the following is the correct order for searching data on a Windows based system?

  1. Volatile data, file slack, registry, memory dumps, file system, system state backup, internet traces
  2. Volatile data, file slack, registry, system state backup, internet traces, file system, memory dumps
  3. Volatile data, file slack, internet traces, registry, memory dumps, system state backup, file system
  4. Volatile data, file slack, file system, registry, memory dumps, system state backup, internet traces

Answer(s): D



Adam works as a Security Administrator for Umbrella Inc. He is responsible for securing all 15 servers of the company. To successfully accomplish the task, he enables the hardware and software firewalls and disables all unnecessary services on all the servers. Sales manager of the company asks Adam to run emulation software on one of the servers that requires the telnet service to function properly. Adam is concerned about the security of the server, as telnet can be a very large security risk in an organization. Adam decides to perform some footprinting, scanning, and penetration testing on the server to checkon the server to check the security. Adam telnets into the server and writes the following command:
HEAD / HTTP/1.0
After pressing enter twice, Adam gets the following results:



Which of the following tasks has Adam just accomplished?

  1. Poisoned the local DNS cache of the server.
  2. Submitted a remote command to crash the server.
  3. Grabbed the banner.
  4. Downloaded a file to his local computer.

Answer(s): C




Micheal
Thanks for your study guides, i have passed it. All questions in your material, we study this only 2 days. Thanks very very much!!!!!
- UNITED STATES
Upvote


L. Woo
Thanks very much for your study guides, with your help i only use 3 weeks to take the MCSE. Your study guides are very very good.
- China
Upvote


Mick H.
I passed the CCIE Written exam 350-001 last Friday, Thanks very much for your study guide and your help.
- UNITED STATES
Upvote


Hagit
i ust wanted to thank you folks at braindumgalaxy.com for your assistance. I used your CCNP exams for practice and to identify my weak areas. Passed the CCNP recert on Tuesday without any big problems.
- Israel
Upvote


Cisco Engineer
I have found that your resources are probably the best on the market...and I work at Cisco.
- UNITED STATES
Upvote


Koshani
A well Good morning Dear braindumpgalaxy.com Team I wanna say that I passed the 000-888 yesterday and i am happy
- UNITED STATES
Upvote


Aized
I took the A+ hardware exam yesterday and thanks to your excellent and helping preparation material. I got a nice score.
- Pakistan
Upvote


Nazanin
I passed the exam with great distinction!
- CANADA
Upvote


Xiwan W
Great Price....Great Product. Keep up the good work!
- China
Upvote


Ashwin
So far your practice exams are extremely helpful. My test scores keep on going up every time I do them and I feel very confident now.
- India
Upvote

Read more ...