Question 6 of 318
Which of the following modules of OS X kernel (XNU) provides the primary system program interface?
    Correct Answer: A

    The BSD subsystem in the OS X kernel (XNU) provides the primary system program interface. BSD is a key component responsible for user-level functionalities and system interfaces, making it the correct answer.

Question 7 of 318
You work as a Network Administrator for Blue Bell Inc. You want to install Windows XP Professional on your computer, which already has Windows Me installed.
You want to configure your computer to dual boot between Windows Me and Windows XP Professional. You have a single 40GB hard disk.
Which of the following file systems will you choose to dual-boot between the two operating systems?
    Correct Answer: B

Question 8 of 318
John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He receives the following e- mail:
Exam GCFA: Question 8 - Image 1
The e-mail that John has received is an example of __________.
    Correct Answer: D

    The email John received is an example of a chain letter. Chain letters are messages sent over email that urge the recipient to forward the email to a certain number of people. They often promise rewards for doing so or threats for not complying. In this case, the email promises prizes for forwarding it to many people, fitting the description of a chain letter perfectly.

Question 9 of 318
Which of the following Acts enacted in United States allows the FBI to issue National Security Letters (NSLs) to Internet service providers (ISPs) ordering them to disclose records about their customers?
    Correct Answer: D

    The Electronic Communications Privacy Act of 1986 (ECPA) allows the FBI to issue National Security Letters (NSLs) to Internet service providers (ISPs) ordering them to disclose records about their customers. This act was designed to extend government restrictions on wire taps from telephone calls to include transmissions of electronic data by computer, thus making it applicable to ISPs.

Question 10 of 318
TCP FIN scanning is a type of stealth scanning through which the attacker sends a FIN packet to the target port. If the port is closed, the victim assumes that this packet was sent mistakenly by the attacker and sends the RST packet to the attacker. If the port is open, the FIN packet will be ignored and the port will drop the packet. Which of the following operating systems can be easily identified with the help of TCP FIN scanning?
    Correct Answer: D

    Windows can be easily identified with the help of TCP FIN scanning because unlike most Unix-based systems, Windows does not conform to the standard protocol behavior for handling FIN packets on open ports. When a FIN packet is sent to an open port in Windows, it responds with a RST packet instead of dropping the packet, making it easily identifiable via FIN scanning.