GAQM CFA-001 Exam Questions
Certified Forensic Analyst (Page 10 )

Updated On: 24-Feb-2026

Ron. a computer forensics expert, Is Investigating a case involving corporate espionage. He has recovered several mobile computing devices from the crime scene. One of the evidence that Ron possesses is a mobile phone from Nokia that was left in on condition. Ron needs to recover the IMEI number of the device to establish the identity of the device owner.
Which of the following key combinations he can use to recover the IMEI number?

  1. #*06*#
  2. *#06#
  3. #06r
  4. *1MEI#

Answer(s): B



Who is responsible for the following tasks?
· Secure the scene and ensure that it is maintained In a secure state until the Forensic Team advises
· Make notes about the scene that will eventually be handed over to the Forensic Team

  1. Non-Laboratory Staff
  2. System administrators
  3. Local managers or other non-forensic staff
  4. Lawyers

Answer(s): A



A system with a simple logging mechanism has not been given much attention during development, this system is now being targeted by attackers, if the attacker wants to perform a new line injection attack, what will he/she inject into the log file?

  1. Plaintext
  2. Single pipe character
  3. Multiple pipe characters
  4. HTML tags

Answer(s): A



During the seizure of digital evidence, the suspect can be allowed touch the computer system.

  1. True
  2. False

Answer(s): B



Which of the following password cracking techniques works like a dictionary attack, but adds some numbers and symbols to the words from the dictionary and tries to crack the password?

  1. Brute forcing attack
  2. Hybrid attack
  3. Syllable attack
  4. Rule-based attack

Answer(s): B






Post your Comments and Discuss GAQM CFA-001 exam dumps with other Community members:

Join the CFA-001 Discussion