GFACT FINAL PAPER 2026 SOLVED
QUESTIONS GRADED A+
◉ Which tool is commonly used for network exploration and security
auditing?. Answer: Nmap--widely recognized as a powerful tool for
network exploration and security auditing. It enables users to
discover hosts and services on a computer network by sending
packets and analyzing the responses.
◉ What is a hashing algorithm?. Answer: Creates a unique
representation of a data set, often referred to as a hash value or hash
code.
This representation is designed to ensure data integrity by allowing
users to verify that a specific piece of data has not been altered.
Each unique input generates a specific hash output, making it
efficient for checking the integrity of files or messages.
◉ Data Exfiltration. Answer: The unauthorized transfer of data from
a computer or network.
◉ Encryption. Answer: The process of converting information into a
code to prevent unauthorized access.
, ◉ Data Breach. Answer: An incident where unauthorized access to
confidential data occurs.
◉ Network Security. Answer: Measures taken to protect a computer
network from intruders.
◉ Firewall. Answer: A network security device that monitors and
controls incoming and outgoing network traffic.
◉ DLP (Data Loss Prevention). Answer: Strategies and tools used to
prevent data breaches and ensure sensitive data is not lost or
misused.
◉ Social Engineering. Answer: Manipulating individuals into
divulging confidential information for fraudulent purposes.
◉ VPN (Virtual Private Network). Answer: A service that creates a
secure connection over the internet, often used to protect data.
◉ Data Masking. Answer: The process of obscuring specific data
within a database to protect it.
◉ What packet header field is a strong indicator of data exfiltration?.
Answer: ICMP echo requests with varying data field sizes.
QUESTIONS GRADED A+
◉ Which tool is commonly used for network exploration and security
auditing?. Answer: Nmap--widely recognized as a powerful tool for
network exploration and security auditing. It enables users to
discover hosts and services on a computer network by sending
packets and analyzing the responses.
◉ What is a hashing algorithm?. Answer: Creates a unique
representation of a data set, often referred to as a hash value or hash
code.
This representation is designed to ensure data integrity by allowing
users to verify that a specific piece of data has not been altered.
Each unique input generates a specific hash output, making it
efficient for checking the integrity of files or messages.
◉ Data Exfiltration. Answer: The unauthorized transfer of data from
a computer or network.
◉ Encryption. Answer: The process of converting information into a
code to prevent unauthorized access.
, ◉ Data Breach. Answer: An incident where unauthorized access to
confidential data occurs.
◉ Network Security. Answer: Measures taken to protect a computer
network from intruders.
◉ Firewall. Answer: A network security device that monitors and
controls incoming and outgoing network traffic.
◉ DLP (Data Loss Prevention). Answer: Strategies and tools used to
prevent data breaches and ensure sensitive data is not lost or
misused.
◉ Social Engineering. Answer: Manipulating individuals into
divulging confidential information for fraudulent purposes.
◉ VPN (Virtual Private Network). Answer: A service that creates a
secure connection over the internet, often used to protect data.
◉ Data Masking. Answer: The process of obscuring specific data
within a database to protect it.
◉ What packet header field is a strong indicator of data exfiltration?.
Answer: ICMP echo requests with varying data field sizes.