Free GCIA Exam Dumps

Question 106

Which of the following password cracking attacks is implemented by calculating all the possible hashes for a set of characters?

Correct Answer:C

Question 107

Peter works as a Computer Hacking Forensic Investigator. He has been called by an organization to conduct a seminar to give necessary information related to sexual harassment within the work place. Peter started with the definition and types of sexual harassment. He then wants to convey that it is important that records of the sexual harassment incidents should be maintained, which helps in further legal prosecution. Which of the following data should be recorded in this documentation?
Each correct answer represents a complete solution. Choose all that apply.

Correct Answer:ABD

Question 108

Which of the following attacks is used to hack simple alphabetical passwords?

Correct Answer:A

Question 109

Which of the following types of scan does not open a full TCP connection?

Correct Answer:C

Question 110

Adam works as a Computer Hacking Forensic Investigator in a law firm. He has been assigned with his first project. Adam collected all required evidences and clues. He is now required to write an investigative report to present before court for further prosecution of the case. He needs guidelines to write an investigative report for expressing an opinion. Which of the following are the guidelines to write an investigative report in an efficient way?
Each correct answer represents a complete solution. Choose all that apply.

Correct Answer:ACD