2019 Free Microsoft EnsurePass GCFA Dumps VCE and PDF Download Part 8

EnsurePass
Exam Dumps
GCFA Dumps VCE and PDF
2019 GCFA Dumps Practice Exams

QUESTION 71

Adam works as a professional Computer Hacking Forensic Investigator. He has been assigned with the project of investigating an iPod, which is suspected to contain some explicit material. Adam wants to connect the compromised iPod to his system, which is running on Windows XP (SP2) operating system. He doubts that connecting the iPod with his computer may change some evidences and settings in the iPod. He wants to set the iPod to read-only mode. This can be done by changing the registry key within the Windows XP (SP2) operating system. Which of the following registry keys will Adam change to accomplish the task?

 

A.

HKEY_LOCAL_MACHINE\System\CurrentControlset\Control\StorageDevicePolicies

B.

HKEY_LOCAL_MACHINE\CurrentControlset\Control\StorageDevicePolicies

C.

HKEY_LOCAL_MACHINE\System\CurrentControlset\StorageDevicePolicies

D.

HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion

 

Correct Answer: A

 

 

QUESTION 72

HOTSPOT

Identify the port in the image given below, which can be connected to the hub to extend the number of ports, and up to 127 devices can be connected to it?

 

image011

 

Correct Answer:

image013

 

 

QUESTION 73

Nathan works as a Computer Hacking Forensic Investigator for SecureEnet Inc. He uses Visual TimeAnalyzer software to track all computer usage by logging into individual users account or specific projects and compile detailed accounts of time spent within each program. Which of the following functions are NOT performed by Visual TimeAnalyzer? Each correct answer represents a complete solution. Choose all that apply.

 

A.

It monitors all user data such as passwords and personal documents.

B.

It gives parents control over their children’s use of the personal computer.

C.

It tracks work time, pauses, projects, costs, software, and internet usage.

D.

It records specific keystrokes and run screen captures as a background process.

 

Correct Answer: AD

 

 

 

QUESTION 74

Which of the following IP addresses are private addresses? Each correct answer represents a complete solution. Choose all that apply.

 

A.

19.3.22.17

B.

192.168.15.2

C.

192.166.54.32

D.

10.0.0.3

 

Correct Answer: BD

 

 

QUESTION 75

Sandra, a novice computer user, works on Windows environment. She experiences some problem regarding bad sectors formed in a hard disk of her computer. She wants to run CHKDSK command to check the hard disk for bad sectors and to fix the errors, if any, occurred. Which of the following switches will she use with CHKDSK command to accomplish the task?

 

A.

CHKDSK /I

B.

CHKDSK /C /L

C.

CHKDSK /V /X

D.

CHKDSK /R /F

 

Correct Answer: D

 

 

QUESTION 76

Which of the following statements about an extended partition are true? Each correct answer represents a complete solution. Choose two.

 

A.

It can be sub-divided into logical drives.

B.

It cannot be formatted or assigned a drive letter.

C.

A maximum of four extended partitions can exist on a single basic disk.

D.

It cannot contain more than one logical drive.

 

Correct Answer: AB

 

 

QUESTION 77

You are reviewing a Service Level Agreement between your company and a Web development vendor. Which of the following are security requirements you should look for in this SLA? Each correct answer represents a complete solution. Choose all that apply.

 

A.

Time to respond to bug reports

B.

Encryption standards

C.

Security Monitoring

D.

Guarantees on known security flaws

 

Correct Answer: ABCD

 

 

 

 

QUESTION 78

Which of the following is used to detect the bad sectors in a hard disk under Linux environment?

 

A.

Badblocks

B.

CheckDisk

C.

ScanDisk

D.

CHKDSK

 

Correct Answer: A

 

 

QUESTION 79

Which of the following statements are NOT true about volume boot record or Master Boot Record? Each correct answer represents a complete solution. Choose all that apply.

 

A.

The end of MBR marker is h55CC.

B.

The actual program can be 512 bytes long.

C.

Volume boot sector is present at cylinder 0, head 0, and sector 1 of the default boot drive.

D.

Four 16 bytes master partition records are present in MBR.

 

Correct Answer: AB

 

 

QUESTION 80

Which of the following tools can be used by a user to hide his identity? Each correct answer represents a complete solution. Choose all that apply.

 

A.

Proxy server

B.

Anonymizer

C.

Rootkit

D.

IPchains

E.

War dialer

 

Correct Answer: ABD

20190508admin

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.