Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

GFACT STUDY GUIDE 2026 COMPLETE QUESTIONS WITH CORRECT SOLUTIONS GRADED A+

Rating
-
Sold
-
Pages
104
Grade
A+
Uploaded on
10-04-2026
Written in
2025/2026

GFACT STUDY GUIDE 2026 COMPLETE QUESTIONS WITH CORRECT SOLUTIONS GRADED A+

Institution
GFACT
Course
GFACT

Content preview

GFACT CERTIFICATION TEST 2026
FULL QUESTIONS AND ANSWERS
GRADED A+


◉ quiet. Answer: Don't show the user any messages.


◉ 1024?!. Answer: 1 kilobyte = 1024 bytes. IEC introduced KiB
instead: 1 byte is 8 bits. 1 kibibyte (KiB) is 1024 bytes. 1 mebibyte
(MiB) is 1024 kibibytes. 1 gibibyte (GiB) is 1024 mebibytes. 1 tebibyte
(TiB) is 1024 gibibytes.


◉ Active Directory. Answer: A system that allows the server to
communicate with Windows desktops, allowing the administrator to
easily configure all the connected desktops from one location,
amongst other uses which we will cover in future modules. Active
Directory allows administrators to configure settings on Windows
desktops that are connected to a Windows server.


◉ Adding a new user. Answer: Adding a new user is as simple as
running: net user /add <username> <password> This command will
create a new user and set the password to what you specified. You
can do so much more when creating users this way, such as
configuring account expiry and setting times where the account can
log on.

, ◉ Add-ins. Answer: Microsoft Word allows for third parties to write
'add-ins', which extend the functionality of Microsoft Word.


◉ Advanced Memory Forensics with Volatility. Answer: Volatility is
one of the most widely used memory forensics tools. Useful Volatility
commands: imageinfo - vol.py or volatility -f memdump.mem
imageinfo


◉ Aliases. Answer: PowerShell comes with several aliases set up for
common cmdlets. cat, cd, dir, ls, rm


◉ Alternate Number Bases. Answer: We are very used to counting in
base 10, but other number bases like base 16 (hex) or base 2 (binary)
are incredibly useful in computing.


◉ Alternative Search Engines. Answer: No two search engines are
the same. Alternative Search Engines - Google, Bing, Yahoo,
DuckDuckGo, archive.org


◉ AlwaysInstall Elevated. Answer: Some administrators will
configure this so that users can install software on their computers
without administrator approval.


◉ Analytics. Answer: Collecting stats and analysing interactions on a
web server.

, ◉ Anti Forensics. Answer: Cyber criminals improve and modify their
operational security (OpSec) in order to avoid being caught. NotPetya
is part of the Petya family of encrypting ransomware that targets
Microsoft Windows based systems.


◉ APFS. Answer: The Apple File System supports permissions and
encryption, and duplicate files can be stored without using additional
space, with changes to one copy of a file being saved as a delta (the
difference between the old file and the new file) to lower space
requirements.


◉ Application Layer. Answer: An example of an application layer
protocol is something like HTTP or FTP. HTTP GET request is an
application layer protocol because the web browser will form the
request necessary for displaying a page or submitting a form.


◉ apropos. Answer: The 'apropos' tool is used to search man pages
for keywords, usually to find the 'appropriate' tool to use in a
particular situation. The 'apropos' command is used to find the
'appropriate' tool for a particular job.


◉ apt-get. Answer: The apt command is incredibly useful to rapidly
find, install, or remove software. The way 'apt' works is by having a
list of 'sources'; these are servers which contain information about
available packages, download links and version information. 'apt
update' only updates the list of available packages.

, ◉ Arguments. Answer: The 'argc' variable is an integer which
contains the number of arguments passed to the program when it
was executed. The 'argv' array contains the data passed in.


◉ Arithmetic Logic Unit (ALU). Answer: The Arithmetic Logic Unit is
the part of the CPU responsible for performing arithmetic and logical
operations.


◉ ARP. Answer: The Address Resolution Protocol translates IP
addresses to MAC addresses for transmission purposes. ARP is only
for the local network.


◉ ARP Cache. Answer: ARP (address resolution protocol) is a
protocol used on local networks to map IP addresses to MAC
addresses. When a computer receives an ARP response, it saves it
into the ARP cache.


◉ ARP Spoofing / Poisoning. Answer: The flaw in the ARP protocol
comes because, if an ARP response is sent to a computer, it will store
that value in its ARP cache even if it didn't make an ARP request
asking for a response.


◉ Arrays. Answer: In C, you have to specify the type of the array
when you create it, and it can only ever hold that type of data. You
can't mix and match within the same array.

Written for

Institution
GFACT
Course
GFACT

Document information

Uploaded on
April 10, 2026
Number of pages
104
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$12.99
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller
Seller avatar
klein254

Get to know the seller

Seller avatar
klein254 Michigan State University
Follow You need to be logged in order to follow users or courses
Sold
-
Member since
4 weeks
Number of followers
0
Documents
404
Last sold
-
KLEINDEMIA

Stop guessing and start passing.

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions