Question 85

Which of the following partitions contains the system files that are used to start the operating system?

Correct Answer:B

Question 86

You are using the TRACERT utility to trace the route to CertLeader.com. You receive the following output:
Which of the following conclusions can you draw from viewing the output?
Each correct answer represents a complete solution. Choose two.

Correct Answer:BC

Question 87

Which of the following tools can be used to check whether the network interface is in promiscuous mode or not?

Correct Answer:C

Question 88

Where is the Hypertext Transfer Protocol (HTTP) used?

Correct Answer:E

Question 89

Which of the following cryptographic methods are used in EnCase to ensure the integrity of the data, which is acquired for the investigation?
Each correct answer represents a complete solution. Choose two.

Correct Answer:AD

Question 90

Host-based IDS (HIDS) is an Intrusion Detection System that runs on the system to be monitored. HIDS monitors only the data that it is directed to, or originates from the system on which HIDS is installed. Besides monitoring network traffic for detecting attacks, it can also monitor other parameters of the system such as running processes, file system access and integrity, and user logins for identifying malicious activities. Which of the following tools are examples of HIDS?
Each correct answer represents a complete solution. Choose all that apply.

Correct Answer:BC

START GCIA EXAM