PRACTICE GFACT CERTIFICATION EXAM WITH CORRECT ANSWERS AND QUESTION A)Metadata B)Windows security logs C)Prefetch D)File Ownership - correct answerMetadata-correct answersWhat is HKEY_LOCAL_MACHINESoftwareMicrosoftWindowsCurrentVersion
PRACTICE GFACT CERTIFICATION EXAM WITH CORRECT ANSWERS AND QUESTION A)Metadata B)Windows security logs C)Prefetch D)File Ownership - correct answerMetadata-correct answersWhat is HKEY_LOCAL_MACHINESoftwareMicrosoftWindowsCurrentVersionRun considered to be? A)Domain Name B)Log File Path C) Registry Key D) Yo Mama's Number - correct answerA Registry Key-correct answersIf a user agent is used, where would it be found in the HTTP Protocol? A)In the response header B)In the response body C)Delimited by an h1 tag D) In a GET Request - correct answerIn a GET Request-correct answersWhat benefit does moving from local logging to using a log server provide organizations? A) Enables the use of network intrusion detection systems (NIDS) B) Harder for attackers to overwrite logs C) Attackers will have to pivot through an extra server to infiltrate the network D)Less complex logging infrastructure - correct answerHarder for attackers to overwrite logs-correct answersWhat is the only way to mitigate an integer overflow/underflow? A) Takin the absolute value of negative results prior to running the equation B) Checking that the result of any change to a signed integer falls within an allowed range C) Randomizing salt values prior to hashing user content D) Sanitizing user input to block special characters from being entered - correct answerChecking that the result of any change to a signed integer falls within an allowed range-correct answersWhich Variable name will cause Python to produce an error? A)2nd_phone_number B)LASTNAM_ C)streetAddress D)_firstname - correct answer2nd_phone_number-correct answersWhat is the following command attempting to accomplish in Kali Linux? dnsmap -w /usr/share/wordlists/ A)Search for subdomains based upon the wordlist provided B) Check for users based on the wordlist provided C)Run checks on the applications based on the wordlist provided D)Call yo mama - correct answerSearch for subdomains based upon the wordlist provided-correct answersHow do you remove data from a Solid State Drive? A) Destroy it B) Place Magnets upon it C) Snap it D) Yo mama sit on it - correct answerDestroy it-correct answersWhere are the wordlists located in Kali? A)/var/opt/wordlists B)/etc/default/wordlists C)/etc/security/wordlists D)/var/adm/wordlists E)/usr/share/wordlists - correct answer/usr/share/wordlists-correct answersWhat is the outcome of the command below? ps aux | grep -i sshd | grep root A) Enabling logging for all root logins for the ssh service B)Terminating the secure shell service C)List of secure shell processes running under the root user D)Starting up the ssh service as the root user - correct answerList of secure shell processes running under the root user-correct answersWhen would a security analyst create a "TCP Socket" in a Python Program
Written for
- Institution
- PRACTICE GFACT CERTIFICATION
- Course
- PRACTICE GFACT CERTIFICATION
Document information
- Uploaded on
- July 31, 2024
- Number of pages
- 31
- Written in
- 2023/2024
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
practice gfact certification exam with correct an
-
practice gfact certification exam with correct
-
practice gfact certification exam
-
practice gfact certification