100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

GFACT Certification Exam 2025- COMPLETE EXAM QUESTIONS & VERIFIED ANSWERS -100- SOLVED -

Rating
-
Sold
-
Pages
36
Grade
A+
Uploaded on
04-06-2025
Written in
2024/2025

GFACT Certification Exam 2025- COMPLETE EXAM QUESTIONS & VERIFIED ANSWERS -100- SOLVED -

Institution
Gfact
Course
Gfact











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Gfact
Course
Gfact

Document information

Uploaded on
June 4, 2025
Number of pages
36
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

Oxford Cambridge and RSA

End Term Exam

GFACT Certification Exam 2025 | COMPLETE EXAM
QUESTIONS & VERIFIED ANSWERS | 100% SOLVED |
REAL TESTED QUESTIONS
Time allowed:




A+
* J 2 5 7 0 1 *




INSTRUCTIONS
• Write your answer to each question in the space provided. If you need extra space
use the lined pages at the end of this booklet. The question numbers must be clearly
shown.
• Answer all the questions.
• Where appropriate, your answer should be supported with working. Marks might
be given for using a correct method, even if your answer is wrong.


ADVICE
• Read each question carefully before you start your answer.
© OCR 2025 [UTYYTEXAM] DC NSIGHTPAPERS)

Turn over

,Which of the following services would be a target for privilege escalation?



1: Microsoft Office Click-to-Run Service

"C:\Program Files\Common Files\ Microsoft Shared\ClickToRun\OfficeClickToRun.exe"

2: CodeMeter Runtime Server

C:\Program Files (x86)\CodeMeter\Runtime\bin\CodeMeter.exe

3: TP AutoConnect Service

"C:\Program Files\VMWare\VMware Tools\TPAutoConnsvc.exe" Manual




A) Microsoft Office Click To Run Service

B) CodeMeter Runtime Server

C) TP AutoConnect Service

D) Yo Mama - ✔✔CodeMeter Runtime Server



In both the TCP handshake and teardown, the ACK number increases by one. How much data is being sent?



A) Zero bytes

B) Two bytes

C) One byte

D) Three bytes - ✔✔Zero bytes



(B1, Pg340-341) What can an Apache server administrator do to prevent version information from leaking?



A) Run Apache as a non-root user

B) Enable HTTPS

C) Set permission on /var/www/html to 700

D) Disable the banner - ✔✔Disable the banner



(B2, Pg351) When debugging a program with pwngdb what is the significance of the s in x/s 0x80484ef command shown
in the command below:

,pwndbg> x/s 0x80484ef

0x80484ef <main+4>:



A) Tells the command to step into the address 0x80484ef

B) Identifies the output format for data at address 0x80484ef

C) Tells the command to stop after the address 0x80484ef

D) Identifies the next breakpoint is address 0x80484ef



*HINT* For debugging with pwngdb, x = hexadecimal, s = string - ✔✔Identifies the output format for data at address
ox80484ef



(B2, Pg11) What is it called when a user makes a change to the master code in a Git repository?



A) Pull

B) Clone

C) Branch

D) Commit - ✔✔Commit



(B3, Pg168) A GIAC administrator has configured their company's web server to send an X -Frame-Options header in
every request to an HTTP page. The admin has configured the option to use the values DENY,SAMEORGIN, or ALLOW-
FROM.

What attack is the administrator addressing with the techniques described above?



A) SQL injection

B) Cross-Site request forgery

C) Cross-Site scripting

D) Directory traversal

E) Clickjacking - ✔✔Clickjacking



(B3, Pg158) How do prepared statements help prevent SQL injection attacks?



A) Query parameters are sent in the body of a POST request

B) Queries are appended with an authorization token

, C) Query language is kept separate from user supplied data

D) Queries submitted by users are HTML entity encoded - ✔✔Query language is kept separate from user supplied data



(B1, Pg 236) If the user agent is used, where would it be found in the HTTP protocol?



A) In the response body

B)In the response header

C) Delimited by an h1 tag

D) In a GET Request - ✔✔In a GET Request



(B3, Pg170) A web application is configured to validate a unique token value for each submitted user request. What
threat is being mitigated?



A)Local file inclusion

B) Cross Site request forgery

C)Drive-By downloads

D) Command injection - ✔✔Cross Site request forgery



(B3, Pg142) Which exploit takes advantage of a web-page field that does not validate input?



A) Session hijacking

B) Command injection

C)Password cracking

D) Steganography - ✔✔Command injection



Which computer component manages ongoing access to a computer's shared RAM and drive storage resources?



A)Memory Registers

B)BIOS

C)Kernel

D)Bootloader - ✔✔Kernel
$7.99
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
InsightPapers

Get to know the seller

Seller avatar
InsightPapers Havard School
View profile
Follow You need to be logged in order to follow users or courses
Sold
4
Member since
10 months
Number of followers
0
Documents
489
Last sold
1 day ago
edutech papers shop selling study exams elaborations :

High-quality exams and answers, summaries, exam guides, and practice questions created for top-performing students. Perfect for boosting your grades and preparing efficiently—organized by course and institution.

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions