CramX Logo
2023 GFACT Computer Science Certification Exam With Answers (162 Solved Questions) - Document preview page 1

2023 GFACT Computer Science Certification Exam With Answers (162 Solved Questions) - Page 1

Document preview content for 2023 GFACT Computer Science Certification Exam With Answers (162 Solved Questions)

2023 GFACT Computer Science Certification Exam With Answers (162 Solved Questions)

2023 GFACT Computer Science Certification Exam With Answers provides an insight into real exam scenarios with past test papers.

Olivia Parker
Contributor
4.8
0
12 months ago
Preview (9 of 27 Pages)
100%
Log in to unlock
Page 1 of 9
2023 GFACT Computer Science Certification Exam With Answers (162 Solved Questions) - Page 1 preview imageGFACT Certification Exam 2023Questions and Answers CorrectWhat does it mean when a computer program is "multi-threaded"?A) It calls multiple external librariesB) It has multiple serial number for different usersC) It can run multiple chunks of code concurrentlyD) It has multiple functions defined in the programAnswer- It can run multiple chunksof code concurrentlyWhich of the following is a common result of a reflected cross-site scripting attack?A)Tricking a user into making an authenticated transactionB)Sending a website user's session cookie to an attackerC) Embedding the attacker's malware in web application source codeD) Stealing password hashes from a website's back end databaseAnswer- Sending awebsite user's session cookie to an attackerWhat tool can be used to fingerprint the operating system of a host?A)netstatB)digC)nslookupD)nmapAnswer- NmapWhat type of vulnerability is illustrated where there is code in the web page?A)File InclusionB) ClickjackingC)Cross-Site ScriptingD) SQL injectionAnswer- File InclusionAn alert indicates that a compromised host was used by an attacker to run thecommand below. What was the attacker attempting to do?$ nmap -sS 192.168.10.0/24A)Map a network drive to a remote hostB)Identify services running on network hostsC)Execute a script on a remote hostD)Send Spoofed packets to network hostsAnswer- Identify services running onnetwork hosts
Page 2 of 9
2023 GFACT Computer Science Certification Exam With Answers (162 Solved Questions) - Page 2 preview image
Page 3 of 9
2023 GFACT Computer Science Certification Exam With Answers (162 Solved Questions) - Page 3 preview imageWhat type of artifact can a blue team member use to identify the name that isassociated to the file?A)MetadataB)Windows security logsC)PrefetchD)File OwnershipAnswer- MetadataWhat is HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Runconsidered to be?A)Domain NameB)Log File PathC) Registry KeyD) Yo Mama's NumberAnswer- A Registry KeyIf a user agent is used, where would it be found in the HTTP Protocol?A)In the response headerB)In the response bodyC)Delimited by an h1 tagD) In a GET RequestAnswer- In a GET RequestWhat benefit does moving from local logging to using a log server provideorganizations?A) Enables the use of network intrusion detection systems (NIDS)B) Harder for attackers to overwrite logsC) Attackers will have to pivot through an extra server to infiltrate the networkD)Less complex logging infrastructureAnswer- Harder for attackers to overwrite logsWhat is the only way to mitigate an integer overflow/underflow?A) Takin the absolute value of negative results prior to running the equationB) Checking that the result of any change to a signed integer falls within an allowedrangeC) Randomizing salt values prior to hashing user contentD) Sanitizing user input to block special characters from being enteredAnswer-Checking that the result of any change to a signed integer falls within an allowed rangeWhich Variable name will cause Python to produce an error?A)2nd_phone_numberB)LASTNAM_C)streetAddress
Page 4 of 9
2023 GFACT Computer Science Certification Exam With Answers (162 Solved Questions) - Page 4 preview imageD)_firstnameAnswer- 2nd_phone_numberWhat is the following command attempting to accomplish in Kali Linux?dnsmap myfakedomain.local -w /usr/share/wordlists/dnsmap.txtA)Search for subdomains based upon the wordlist providedB) Check for users based on the wordlist providedC)Run checks on the applications based on the wordlist providedD)Call yo mamaAnswer- Search for subdomains based upon the wordlist providedHow do you remove data from a Solid State Drive?A) Destroy itB) Place Magnets upon itC) Snap itD) Yo mama sit on itAnswer- Destroy itWhere are the wordlists located in Kali?A)/var/opt/wordlistsB)/etc/default/wordlistsC)/etc/security/wordlistsD)/var/adm/wordlistsE)/usr/share/wordlistsAnswer- /usr/share/wordlistsWhat is the outcome of the command below?ps aux | grep -i sshd | grep rootA) Enabling logging for all root logins for the ssh serviceB)Terminating the secure shell serviceC)List of secure shell processes running under the root userD)Starting up the ssh service as the root userAnswer- List of secure shell processesrunning under the root userWhen would a security analyst create a "TCP Socket" in a Python Program?A) When scanning the host computer for malicious softwareB) When creating a script to run against a network serviceC) When collecting information about the host computer's hardwareD) When the host is running network services in the background during Python programexecutionAnswer- When creating a script to run against a network serviceWhat is used to access the address of a variable in the C Programming Language?
Page 5 of 9
2023 GFACT Computer Science Certification Exam With Answers (162 Solved Questions) - Page 5 preview imageA) &giacB)*giacC) {giac}D) 8=giac=DAnswer- &giacWhat does the home folder contain?A) User Directories for every user on the system excluding the root userB)Yo MamaC)All of the directories on a systemD) Only the Guest directories on a systemAnswer- User Directories for every user onthe system excluding the root userWhat does the Local Users Management Console do?A)Create users within WindowsB) Create groups within WindowsC) Yo Mama (insert giggle)D) Change your passwordAnswer- Create users within Windows, create groups withinWindows, Change your passwordWhat kind of storage system are in USB's?A)exFATB)FAT32C)NTFSD)HFS PlusAnswer- exFATWhen a new File is created what permissions are inherited?A) Parent FolderB) You set them when you open the folderC) Root PermissionsD) Default File PermissionsAnswer- Parent FolderWhat command will generate a makefile that is tuned to the system that it is installedto?A)source makefile.amB)source configure.inC) ./install-shD) ./configureAnswer- ./configureWhat might a captcha do to a scanner?A) Redirect the scanner to the same page in a loop
Page 6 of 9
2023 GFACT Computer Science Certification Exam With Answers (162 Solved Questions) - Page 6 preview imageB) Proceed to the website as per normalC) Shut the scanner downD) Lock you out of the websiteAnswer- Redirect the scanner to the same page in aloopThe user starts Microsoft Word and clicks File | Open. What does word do as a result?A) Generates a software interruptB) Loads the KernalC) Opens the appropriate output HIDD) Yo MamaAnswer- Generates a software interruptWhat attack is being attempted by the command shown below?root@kali: ~/target# dirb https:www.sans.org /usr/share/wordlists/dirb/small.txtA) Dictionary attack against known user accounts on a websiteB) Dictionary attack against unknown user accounts on a websiteC) Search for valid accounts using a wordlist against a websiteD) Search for directories not link to public areas of a websiteAnswer- Search fordirectories not linked to public areas of a websiteWhere is the data from the GDB output shown in the image stored on the host?A) Master Boot RecordB) BIOSC) CPUD) Random Access MemoryAnswer- CPUWhat command is used to generate lists of images that are stored locally and providesarguments for handling them?A) docker imagesB) docker pullC) docker runD) vi DockerfileE) docker psAnswer- docker imagesWhat is the significance of the items listed in pwbdbg's backtrace?A) They are all of the functions called up to this pointB) They are functions currently loaded in the CPU cacheC) It is a list of functions that are about to be calledD) They are pointed to by the _GLOBAL_OFFSET_TABLE_Answer- They are all ofthe functions called up to this point
Page 7 of 9
2023 GFACT Computer Science Certification Exam With Answers (162 Solved Questions) - Page 7 preview imageWhich packet header field characteristic is a strong indicator of data exfiltration?A) TCP Packets in a session with varying message data sizesB) ICMP echo requests with varying data field sizesC) UDP packets with invalid checksumsD) Yo mamaAnswer- ICMP echo requests with varying data field sizesDuring which stage of incident response should the adequacy of policies be examined?A) Lessons learnedB) EradicationC) RecoveryAnswer- Lessons LearnedWhat is a way to check the symmetric or asymmetric encryption?A) The Website's SSL certificateB) The Public KeyC) The Private KeyD) Yo MamaAnswer- The Website's SSL certificateWhich of the follow C:\Windows\System32 subdirectories may provide storedcredentials from unattended installs?A) RestoreB) BootC) SysprepD) DismAnswer- SysprepWhich of the following is one of the four User Account Control (UAC) settings on aWindows system?A) Access this compute from the networkB) Full controlC) Run as AdministratorD) Always NotifyAnswer- Always notifyWhat HTTP protocol request asks a web server to retrieve metadata without the data?A) PUTB) HEADC) GETD) POSTAnswer- HEADWhat command will change your directory to the current home folder?A) cd ~
Page 8 of 9
2023 GFACT Computer Science Certification Exam With Answers (162 Solved Questions) - Page 8 preview imageB) cd ..C) cd //D) cd Yo MamaAnswer- cd ~What does the home folder contain?A) The user directories for every user other than the rootB) All directories under the Windows machineC) The specific user's directoryD) Yo MamaAnswer- The user directories for every user other than the rootExamine the list from a Python program below. Which statement will display Oregon?PNW_states = [ 'Washington' , 'Oregon' , 'Idaho' , 'Montana' , 'Wyoming' ]A) print(PNW_states[2])B) print(PNW_states(2))C) print(PNW_states[1])D) print(PNW_states[0][2])Answer- print(PNW_states[1])If you run the command "Python" on a Linux system where it is installed, what willhappen?A)Python will list all currently installed libraries and modulesB) The computer will run Python in the background upon rebootC) The operating system will prompt you for a Python code file to openD) An interactive console will open for writing simple Python codeAnswer- Aninteractive console will open for writing simple Python codeA Web application is configured to validate a unique token value for each submitteduser request. What threat is being mitigated?A) Local file inclusionB) Cross site request forgeryC) Drive-by downloadsD) Command injectionAnswer- Cross site request forgeryIn the Python programming language, cast_list, shown below, is which of the following?A) DictionaryB) TupleC) ArrayD) ListAnswer- DictionaryWhich of the following is the name given to the behaviors that objects have in objectoriented programming?
Page 9 of 9
2023 GFACT Computer Science Certification Exam With Answers (162 Solved Questions) - Page 9 preview imageA) MethodsB) FunctionsC) ModulesD) ProceduresAnswer- MethodsWhich of the following services would be a target for privilege escalation?1: Microsoft Office Click-to-Run Service"C:\Program Files\Common Files\ Microsoft Shared\ClickToRun\OfficeClickToRun.exe"2: CodeMeter Runtime ServerC:\Program Files (x86)\CodeMeter\Runtime\bin\CodeMeter.exe3: TP AutoConnect Service"C:\Program Files\VMWare\VMware Tools\TPAutoConnsvc.exe" ManualA) Microsoft Office Click To Run ServiceB) CodeMeter Runtime ServerC) TP AutoConnect ServiceD) Yo MamaAnswer- CodeMeter Runtime ServerIn both the TCP handshake and teardown, the ACK number increases by one. Howmuch data is being sent?A) Zero bytesB) Two bytesC) One byteD) Three bytesAnswer- Zero bytesWhat can an Apache server administrator do to prevent version information fromleaking?A) Run Apache as a non-root userB) Enable HTTPSC) Set permission on /var/www/html to 700D) Disable the bannerAnswer- Disable the bannerWhen debugging a program with pwngdb what is the significance of the s in x/s0x80484ef command shown in the command below:pwndbg> x/s 0x80484ef0x80484ef <main+4>:A) Tells the command to step into the address 0x80484efB) Identifies the output format for data at address 0x80484efC) Tells the command to stop after the address 0x80484ef
Preview Mode

This document has 27 pages. Sign in to access the full document!