GAQM CFA-001 Exam
Certified Forensic Analyst (Page 9 )

Updated On: 1-Feb-2026

Computer security logs contain information about the events occurring within an organization's systems and networks.
Which of the following security logs contains Logs of network and host-based security software?

  1. Operating System (OS) logs
  2. Application logs
  3. Security software logs
  4. Audit logs

Answer(s): C



What is the "Best Evidence Rule"?

  1. It states that the court only allows the original evidence of a document, photograph, or recording at the trial rather than a copy
  2. It contains system time, logged-on user(s), open files, network information, process information, process-to-port mapping, process memory, clipboard contents, service/driver information, and command history
  3. It contains hidden files, slack space, swap file, index.dat files, unallocated clusters, unused partitions, hidden partitions, registry settings, and event logs
  4. It contains information such as open network connection, user logout, programs that reside in memory, and cache data

Answer(s): A



SIM is a removable component that contains essential information about the subscriber. It has both volatile and non-volatile memory. The file system of a SIM resides in _____________ memory.

  1. Volatile
  2. Non-volatile

Answer(s): B



Which of the following passwords are sent over the wire (and wireless) network, or stored on some media as it is typed without any alteration?

  1. Clear text passwords
  2. Obfuscated passwords
  3. Hashed passwords
  4. Hex passwords

Answer(s): A



In Windows 7 system files, which file reads the Boot.ini file and loads Ntoskrnl.exe. Bootvid.dll.
Hal.dll, and boot-start device drivers?

  1. Ntldr
  2. Gdi32.dll
  3. Kernel32.dll
  4. Boot.in

Answer(s): A



Viewing page 9 of 37
Viewing questions 41 - 45 out of 180 questions



Post your Comments and Discuss GAQM CFA-001 exam prep with other Community members:

Join the CFA-001 Discussion