GAQM CFA 001
Q: 1
What is the first step that needs to be carried out to crack the password?
Options
Q: 2
Operating System logs are most beneficial for Identifying or Investigating suspicious activities
involving a particular host. Which of the following Operating System logs contains information about
operational actions performed by OS components?
Options
Q: 3
Deposition enables opposing counsel to preview an expert witness's testimony at trial. Which of the
following deposition is not a standard practice?
Options
Q: 4
Email archiving is a systematic approach to save and protect the data contained in emails so that it
can tie easily accessed at a later date.
Options
Q: 5
You have been given the task to investigate web attacks on a Windows-based server.
Which of the following commands will you use to look at which sessions the machine has opened
with other systems?
Options
Q: 6
Wireless access control attacks aim to penetrate a network by evading WLAN access control
measures, such as AP MAC filters and Wi-Fi port access controls.
Which of the following wireless access control attacks allows the attacker to set up a rogue access
point outside the corporate perimeter, and then lure the employees of the organization to connect to
it?
Options
Q: 7
TCP/IP (Transmission Control Protocol/Internet Protocol) is a communication protocol used to
connect different hosts in the Internet. It contains four layers, namely the network interface layer.
Internet layer, transport layer, and application layer.
Which of the following protocols works under the transport layer of TCP/IP?
Options
Q: 8
FAT32 is a 32-bit version of FAT file system using smaller clusters and results in efficient storage
capacity. What is the maximum drive size supported?
Options
Q: 9
Data acquisition system is a combination of tools or processes used to gather, analyze and record
Information about some phenomenon. Different data acquisition system are used depends on the
location, speed, cost. etc. Serial communication data acquisition system is used when the actual
location of the data is at some distance from the computer. Which of the following communication
standard is used in serial communication data acquisition system?
Options
Q: 10
Which of the following network attacks refers to sending huge volumes of email to an address in an
attempt to overflow the mailbox, or overwhelm the server where the email address is hosted, to
cause a denial-of-service attack?
Options
Question 1 of 10