Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

GFACT Certification Exam 2025- COMPLETE EXAM QUESTIONS & VERIFIED ANSWERS -100- SOLVED -

Beoordeling
-
Verkocht
-
Pagina's
36
Cijfer
A+
Geüpload op
04-06-2025
Geschreven in
2024/2025

GFACT Certification Exam 2025- COMPLETE EXAM QUESTIONS & VERIFIED ANSWERS -100- SOLVED -

Instelling
Gfact
Vak
Gfact

Voorbeeld van de inhoud

Oxford Cambridge and RSA

End Term Exam

GFACT Certification Exam 2025 | COMPLETE EXAM
QUESTIONS & VERIFIED ANSWERS | 100% SOLVED |
REAL TESTED QUESTIONS
Time allowed:




A+
* J 2 5 7 0 1 *




INSTRUCTIONS
• Write your answer to each question in the space provided. If you need extra space
use the lined pages at the end of this booklet. The question numbers must be clearly
shown.
• Answer all the questions.
• Where appropriate, your answer should be supported with working. Marks might
be given for using a correct method, even if your answer is wrong.


ADVICE
• Read each question carefully before you start your answer.
© OCR 2025 [UTYYTEXAM] DC NSIGHTPAPERS)

Turn over

,Which of the following services would be a target for privilege escalation?



1: Microsoft Office Click-to-Run Service

"C:\Program Files\Common Files\ Microsoft Shared\ClickToRun\OfficeClickToRun.exe"

2: CodeMeter Runtime Server

C:\Program Files (x86)\CodeMeter\Runtime\bin\CodeMeter.exe

3: TP AutoConnect Service

"C:\Program Files\VMWare\VMware Tools\TPAutoConnsvc.exe" Manual




A) Microsoft Office Click To Run Service

B) CodeMeter Runtime Server

C) TP AutoConnect Service

D) Yo Mama - ✔✔CodeMeter Runtime Server



In both the TCP handshake and teardown, the ACK number increases by one. How much data is being sent?



A) Zero bytes

B) Two bytes

C) One byte

D) Three bytes - ✔✔Zero bytes



(B1, Pg340-341) What can an Apache server administrator do to prevent version information from leaking?



A) Run Apache as a non-root user

B) Enable HTTPS

C) Set permission on /var/www/html to 700

D) Disable the banner - ✔✔Disable the banner



(B2, Pg351) When debugging a program with pwngdb what is the significance of the s in x/s 0x80484ef command shown
in the command below:

,pwndbg> x/s 0x80484ef

0x80484ef <main+4>:



A) Tells the command to step into the address 0x80484ef

B) Identifies the output format for data at address 0x80484ef

C) Tells the command to stop after the address 0x80484ef

D) Identifies the next breakpoint is address 0x80484ef



*HINT* For debugging with pwngdb, x = hexadecimal, s = string - ✔✔Identifies the output format for data at address
ox80484ef



(B2, Pg11) What is it called when a user makes a change to the master code in a Git repository?



A) Pull

B) Clone

C) Branch

D) Commit - ✔✔Commit



(B3, Pg168) A GIAC administrator has configured their company's web server to send an X -Frame-Options header in
every request to an HTTP page. The admin has configured the option to use the values DENY,SAMEORGIN, or ALLOW-
FROM.

What attack is the administrator addressing with the techniques described above?



A) SQL injection

B) Cross-Site request forgery

C) Cross-Site scripting

D) Directory traversal

E) Clickjacking - ✔✔Clickjacking



(B3, Pg158) How do prepared statements help prevent SQL injection attacks?



A) Query parameters are sent in the body of a POST request

B) Queries are appended with an authorization token

, C) Query language is kept separate from user supplied data

D) Queries submitted by users are HTML entity encoded - ✔✔Query language is kept separate from user supplied data



(B1, Pg 236) If the user agent is used, where would it be found in the HTTP protocol?



A) In the response body

B)In the response header

C) Delimited by an h1 tag

D) In a GET Request - ✔✔In a GET Request



(B3, Pg170) A web application is configured to validate a unique token value for each submitted user request. What
threat is being mitigated?



A)Local file inclusion

B) Cross Site request forgery

C)Drive-By downloads

D) Command injection - ✔✔Cross Site request forgery



(B3, Pg142) Which exploit takes advantage of a web-page field that does not validate input?



A) Session hijacking

B) Command injection

C)Password cracking

D) Steganography - ✔✔Command injection



Which computer component manages ongoing access to a computer's shared RAM and drive storage resources?



A)Memory Registers

B)BIOS

C)Kernel

D)Bootloader - ✔✔Kernel

Geschreven voor

Instelling
Gfact
Vak
Gfact

Documentinformatie

Geüpload op
4 juni 2025
Aantal pagina's
36
Geschreven in
2024/2025
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$8.49
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper
Seller avatar
InsightPapers

Maak kennis met de verkoper

Seller avatar
InsightPapers Havard School
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
4
Lid sinds
1 jaar
Aantal volgers
0
Documenten
489
Laatst verkocht
5 maanden geleden
edutech papers shop selling study exams elaborations :

High-quality exams and answers, summaries, exam guides, and practice questions created for top-performing students. Perfect for boosting your grades and preparing efficiently—organized by course and institution.

0.0

0 beoordelingen

5
0
4
0
3
0
2
0
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen