New Year Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmasmnth

Adam, a malicious hacker has successfully gained unauthorized access to the Linux system ofUmbrella Inc.

Adam, a malicious hacker has successfully gained unauthorized access to the Linux system of

Umbrella Inc. Web server of the company runs on Apache. He has downloaded sensitive documents and database files from the computer. After performing these malicious tasks, Adam finally runs the following command on the Linux command box before disconnecting. for (( i = 0;i<11;i++ )); do

dd if=/dev/random of=/dev/hda && dd if=/dev/zero of=/dev/hda done

Which of the following actions does Adam want to perform by the above command?

A.

Making a bit stream copy of the entire hard disk for later download.

B.

Deleting all log files present on the system.

C.

Wiping the contents of the hard disk with zeros.

D.

Infecting the hard disk with polymorphic virus strings.

GIAC GCFA Summary

  • Vendor: GIAC
  • Product: GCFA
  • Update on: Jan 5, 2026
  • Questions: 318
Price: $52.5  $149.99
Buy Now GCFA PDF + Testing Engine Pack

Payments We Accept

Your purchase with ExamsVCE is safe and fast. Your products will be available for immediate download after your payment has been received.
The ExamsVCE website is protected by 256-bit SSL from McAfee, the leader in online security.

examsvce payment method