Free CFA-001 Exam Braindumps (page: 6)

Page 5 of 46

Wireless access control attacks aim to penetrate a network by evading WLAN access control measures, such as AP MAC filters and Wi-Fi port access controls.
Which of the following wireless access control attacks allows the attacker to set up a rogue access point outside the corporate perimeter, and then lure the employees of the organization to connect to it?

  1. War driving
  2. Rogue access points
  3. MAC spoofing
  4. Client mis-association

Answer(s): D



File deletion is a way of removing a file from a computer's file system.
What happens when a file is deleted in windows7?

  1. The last letter of a file name is replaced by a hex byte code E5h
  2. The operating system marks the file's name in the MFT with a special character that indicates that the file has been deleted
  3. Corresponding clusters in FAT are marked as used
  4. The computer looks at the clusters occupied by that file and does not avails space to store a new file

Answer(s): B



What is cold boot (hard boot)?

  1. It is the process of starting a computer from a powered-down or off state
  2. It is the process of restarting a computer that is already turned on through the operating system
  3. It is the process of shutting down a computer from a powered-on or on state
  4. It is the process of restarting a computer that is already in sleep mode

Answer(s): A



When a file or folder is deleted, the complete path, including the original file name, is stored in a special hidden file called "INF02" in the Recycled folder. If the INF02 file is deleted, it is re-created when you___________.

  1. Restart Windows
  2. Kill the running processes in Windows task manager
  3. Run the antivirus tool on the system
  4. Run the anti-spyware tool on the system

Answer(s): A






Post your Comments and Discuss GAQM CFA-001 exam with other Community members:

CFA-001 Discussions & Posts