100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

GFACT UPDATED ACTUAL Questions and CORRECT Answers

Rating
-
Sold
-
Pages
8
Grade
A+
Uploaded on
28-09-2025
Written in
2025/2026

GFACT UPDATED ACTUAL Questions and CORRECT Answers

Institution
GFACT
Course
GFACT









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
GFACT
Course
GFACT

Document information

Uploaded on
September 28, 2025
Number of pages
8
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

GFACT UPDATED ACTUAL Questions and CORRECT Answers


/ qn Don't launch with a graphical user interface.

Don't try to run as administrator, run as a normal user instead (this
/i
won't matter because of AlwaysInstallElevated).

/quiet Don't show the user any messages.

1 kilobyte = 1024 bytes. IEC introduced KiB instead: 1 byte is 8
bits. 1 kibibyte (KiB) is 1024 bytes. 1 mebibyte (MiB) is 1024
1024?!
kibibytes. 1 gibibyte (GiB) is 1024 mebibytes. 1 tebibyte (TiB) is
1024 gibibytes.

A system that allows the server to communicate with Windows
desktops, allowing the administrator to easily configure all the
connected desktops from one location, amongst other uses
Active Directory
which we will cover in future modules. Active Directory allows
administrators to configure settings on Windows desktops that
are connected to a Windows server.

Adding a new user is as simple as running: net user /add
<username> <password> This command will create a new user
Adding a new user and set the password to what you specified. You can do so much
more when creating users this way, such as configuring account
expiry and setting times where the account can log on.

Microsoft Word allows for third parties to write 'add-ins', which
Add-ins
extend the functionality of Microsoft Word.

Volatility is one of the most widely used memory forensics tools.
Advanced Memory Forensics
Useful Volatility commands: imageinfo - vol.py or volatility -f
with Volatility
memdump.mem imageinfo

PowerShell comes with several aliases set up for common
Aliases
cmdlets. cat, cd, dir, ls, rm

We are very used to counting in base 10, but other number bases
Alternate Number Bases like base 16 (hex) or base 2 (binary) are incredibly useful in
computing.

, No two search engines are the same. Alternative Search Engines
Alternative Search Engines
- Google, Bing, Yahoo, DuckDuckGo, archive.org

Some administrators will configure this so that users can install
AlwaysInstall Elevated
software on their computers without administrator approval.

Analytics Collecting stats and analysing interactions on a web server.

Cyber criminals improve and modify their operational security
(OpSec) in order to avoid being caught. NotPetya is part of the
Anti Forensics
Petya family of encrypting ransomware that targets Microsoft
Windows based systems.

The Apple File System supports permissions and encryption, and
duplicate files can be stored without using additional space, with
APFS changes to one copy of a file being saved as a delta (the
difference between the old file and the new file) to lower space
requirements.

An example of an application layer protocol is something like
HTTP or FTP. HTTP GET request is an application layer protocol
Application Layer
because the web browser will form the request necessary for
displaying a page or submitting a form.

The 'apropos' tool is used to search man pages for keywords,
usually to find the 'appropriate' tool to use in a particular
apropos
situation. The 'apropos' command is used to find the 'appropriate'
tool for a particular job.

The apt command is incredibly useful to rapidly find, install, or
remove software. The way 'apt' works is by having a list of
apt-get 'sources'; these are servers which contain information about
available packages, download links and version information. 'apt
update' only updates the list of available packages.

The 'argc' variable is an integer which contains the number of
Arguments arguments passed to the program when it was executed. The
'argv' array contains the data passed in.

The Arithmetic Logic Unit is the part of the CPU responsible for
Arithmetic Logic Unit (ALU)
performing arithmetic and logical operations.

The Address Resolution Protocol translates IP addresses to MAC
ARP addresses for transmission purposes. ARP is only for the local
network.

ARP (address resolution protocol) is a protocol used on local
networks to map IP addresses to MAC addresses. When a
ARP Cache
computer receives an ARP response, it saves it into the ARP
cache.

The flaw in the ARP protocol comes because, if an ARP response
ARP Spoofing / Poisoning is sent to a computer, it will store that value in its ARP cache even
if it didn't make an ARP request asking for a response.

In C, you have to specify the type of the array when you create it,
Arrays and it can only ever hold that type of data. You can't mix and
match within the same array.

The AS keyword is used to assign an alias to a table or field.They
are used to make long SQL statements more readable, more
AS
descriptive or set the table headings for a query to make the
results more descriptive.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
MGRADES Stanford University
View profile
Follow You need to be logged in order to follow users or courses
Sold
1113
Member since
1 year
Number of followers
103
Documents
68972
Last sold
7 hours ago
MGRADES (Stanford Top Brains)

Welcome to MGRADES Exams, practices and Study materials Just think of me as the plug you will refer to your friends Me and my team will always make sure you get the best value from the exams markets. I offer the best study and exam materials for a wide range of courses and units. Make your study sessions more efficient and effective. Dive in and discover all you need to excel in your academic journey!

3.8

177 reviews

5
75
4
31
3
47
2
9
1
15

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions