GAQM CFA-001 Certified Forensic Analyst CFA Exam Practice Test

Page: 1 / 14
Total 180 questions
Question 1

An intrusion detection system (IDS) gathers and analyzes information from within a computer or a network to identify any possible violations of security policy, including unauthorized access, as well as misuse.

Which of the following intrusion detection systems audit events that occur on a specific host?



Answer : B


Question 2

When NTFS Is formatted, the format program assigns the __________ sectors to the boot sectors and to the bootstrap code



Answer : B


Question 3

Why is it Important to consider health and safety factors in the work carried out at all stages of the forensic process conducted by the forensic analysts?



Answer : A


Question 4

SMTP (Simple Mail Transfer protocol) receives outgoing mail from clients and validates source and destination addresses, and also sends and receives emails to and from other SMTP servers.



Answer : A


Question 5

Which of the following commands shows you the username and IP address used to access the system via a remote login session and the Type of client from which they are accessing the system?



Answer : A


Question 6

A mobile operating system manages communication between the mobile device and other compatible devices like computers, televisions, or printers.

Which mobile operating system architecture is represented here?



Answer : C


Question 7

Operating System logs are most beneficial for Identifying or Investigating suspicious activities involving a particular host. Which of the following Operating System logs contains information about operational actions performed by OS components?



Answer : A


Page:    1 / 14   
Total 180 questions