GCFA Exam Question 66

On which of the following locations does the Windows NT/2000 operating system contain the SAM, SAM.LOG, SECURITY.LOG, APPLICATION.LOG, and EVENT.LOG files?
  • GCFA Exam Question 67

    Sam works as a professional Computer Hacking Forensic Investigator. A project has been assigned to him to investigate a compromised system, which runs on Linux operating system. Sam wants to investigate and review local software, system libraries, and other application installed on the system.
    Which of the following directories in Linux will he review to accomplish the task?
  • GCFA Exam Question 68

    Which of the following statements about the compression feature of the NTFS file system are true?
    Each correct answer represents a complete solution. Choose two.
  • GCFA Exam Question 69

    Which of the following is a type of intruder detection that involves logging network events to a file for an administrator to review later?
  • GCFA Exam Question 70

    A firewall is a combination of hardware and software, used to provide security to a network. It is used to protect an internal network or intranet against unauthorized access from the Internet or other outside networks. It restricts inbound and outbound access and can analyze all traffic between an internal network and the Internet. Users can configure a firewall to pass or block packets from specific IP addresses and ports. Which of the following tools works as a firewall for the Linux 2.4 kernel?