2019 Free Microsoft EnsurePass GCFA Dumps VCE and PDF Download Part 5

EnsurePass
Exam Dumps
GCFA Dumps VCE and PDF
2019 GCFA Dumps Practice Exams

QUESTION 41

Which of the following switches of the XCOPY command copies attributes while copying files?

 

A.

/o

B.

/p

C.

/k

D.

/s

 

Correct Answer: D

 

 

QUESTION 42

Which of the following directories in Linux operating system contains device files, which refers to physical devices?

 

A.

/boot

B.

/etc

C.

/dev

D.

/bin

 

Correct Answer: C

 

 

QUESTION 43

Which of the following directories cannot be placed out of the root filesystem? Each correct answer represents a complete solution. Choose all that apply.

 

A.

/sbin

B.

/etc

C.

/var

D.

/lib

 

Correct Answer: ABD

 

 

QUESTION 44

On which of the following locations does the Windows NT/2000 operating system contain the SAM, SAM.LOG, SECURITY.LOG, APPLICATION.LOG, and EVENT.LOG files?

 

A.

\%Systemroot%system32

B.

\%Systemroot%profiles

C.

\%Systemroot%system32config

D.

\%Systemroot%help

 

Correct Answer: C

 

 

QUESTION 45

You are handling technical support calls for an insurance company. A user calls you complaining that he cannot open a file, and that the file name appears in green while opening in Windows Explorer. What does this mean?

 

A.

The file is encrypted.

B.

The file belongs to another user.

C.

The file is infected with virus.

D.

The file is compressed.

 

Correct Answer: A

 

 

QUESTION 46

Which of the following is a name, symbol, or slogan with which a product is identified?

 

A.

Trade secret

B.

Patent

C.

Copyright

D.

Trademark

 

Correct Answer: D

 

QUESTION 47

Which of the following file systems supports the hot fixing feature?

 

A.

FAT16

B.

exFAT

C.

FAT32

D.

NTFS

 

Correct Answer: D

 

 

QUESTION 48

John works as a professional Ethical Hacker. He has been assigned a project for testing the security of www.we-are-secure.com. He wants to corrupt an IDS signature database so that performing attacks on the server is made easy and he can observe the flaws in the We-are-secure server. To perform his task, he first of all sends a virus that continuously changes its signature to avoid detection from IDS. Since the new signature of the virus does not match the old signature, which is entered in the IDS signature database, IDS becomes unable to point out the malicious virus. Which of the following IDS evasion attacks is John performing?

 

A.

Evasion attack

B.

Session splicing attack

C.

Insertion attack

D.

Polymorphic shell code attack

 

Correct Answer: D

 

 

QUESTION 49

You work as the Network Administrator for McNeil Inc. The company has a Unix-based network. You want to fix partitions on a hard drive. Which of the following Unix commands can you use to accomplish the task?

 

A.

fdformat

B.

exportfs

C.

fsck

D.

fdisk

 

Correct Answer: D

 

 

QUESTION 50

Which of the following is a type of intruder detection that involves logging network events to a file for an administrator to review later?

 

A.

Packet detection

B.

Passive detection

C.

Active detection

D.

Event detection

 

Correct Answer: B

You must be logged in to post a comment.

Proudly powered by WordPress   Premium Style Theme by www.gopiplus.com