GCFA Exam Question 76
Which of the following files contains the salted passwords in the Linux operating system?
GCFA Exam Question 77
You work as a Network Administrator for NetTech Inc. The company has a network that consists of 200 client computers and ten database servers. One morning, you find that an unauthorized user is accessing data on a database server on the network. Which of the following actions will you take to preserve the evidences?
Each correct answer represents a complete solution. Choose three.
Each correct answer represents a complete solution. Choose three.
GCFA Exam Question 78
Adam works as a Computer Hacking Forensic Investigator. He has been assigned a project to
investigate child pornography. As the first step, Adam found that the accused is using a Peer-topeer application to network different computers together over the internet and sharing pornographic materials of children with others. Which of the following are Peer-to-Peer applications?
Each correct answer represents a complete solution. Choose all that apply.
investigate child pornography. As the first step, Adam found that the accused is using a Peer-topeer application to network different computers together over the internet and sharing pornographic materials of children with others. Which of the following are Peer-to-Peer applications?
Each correct answer represents a complete solution. Choose all that apply.
GCFA Exam Question 79
What is the name of the group of blocks which contains information used by the operating system in Linux system?
GCFA Exam Question 80
Which of the following is included in a memory dump file?