Which of the following methods is used by forensic investigators to acquire an image over the network in a secure manner?
A. Linux Live CD
B. EnCase with a hardware write blocker
C. Secure Authentication for EnCase (SAFE)
D. DOS boot disk
正解:C
質問 2:
Choose the proper transport protocol and port number used for Domain Name System. You should be concerned only with DNS lookups.
A. tcp, port 67
B. tcp, port 53
C. udp, port 53
D. udp, port 67
正解:C
質問 3:
Which of the following statements about a host-based intrusion prevention system (HIPS) are true?
Each correct answer represents a complete solution. Choose two.
A. It is a technique that allows multiple computers to share one or more IP addresses.
B. It cannot detect events scattered over the network.
C. It can handle encrypted and unencrypted traffic equally.
D. It can detect events scattered over the network.
正解:B,C
質問 4:
Which of the following standard file formats is used by Apple's iPod to store contact information?
A. vCard
B. HFS+
C. FAT32
D. hCard
正解:A
質問 5:
Adam works as a professional Computer Hacking Forensic Investigator. A project has been assigned to him to investigate a compromised system of a cyber criminal, who hides some information in his computer. This computer runs on Linux operating system. Adam wants to extract the data units of a file, which is specified by its meta-data address. He is using the Sleuth Kit for this purpose. Which of the following commands in the Sleuth kit will he use to accomplish the task?
A. istat
B. ifind
C. icat
D. dcat
正解:C
質問 6:
Which of the following tools is used to recover data and partitions, and can run on Windows, Linux, SunOS, and Macintosh OS X operating systems?
A. TestDisk
B. Active@ Disk Image
C. GetDataBack
D. Acronis Recovery Expert
正解:A
質問 7:
Andrew works as a Forensic Investigator for PassGuide Inc. The company has a Windows-based environment. The company's employees use Microsoft Outlook Express as their e-mail client program. E-mails of some employees have been deleted due to a virus attack on the network.
Andrew is therefore assigned the task to recover the deleted mails. Which of the following tools can Andrew use to accomplish the task?
Each correct answer represents a complete solution. Choose two.
A. eMailTrackerPro
B. FINALeMAIL
C. EventCombMT
D. R-mail
正解:B,D
Kitamura -
GCIA問題集を購入し、よく勉強し、今日はGCIA試験に合格しました。本当に嬉しかったです。GCIA問題集は本当に効果がある商品です。