Topic 1: Exam Pool A
What will the following command produce on a website login page? SELECT email,
passwd, login_id, full_name FROM members WHERE email =
'someone@somehwere.com'; DROP TABLE members; -'
A.
Deletes the entire members table
B.
Inserts the Error! Reference source not found.email address into the members table
C.
Retrieves the password for the first user in the members table
D.
This command will not produce anything since the syntax is incorrect
Deletes the entire members table
Lance wants to place a honeypot on his network. Which of the following would be your recommendations?
A.
Use a system that has a dynamic addressing on the network
B.
Use a system that is not directly interacting with the router
C.
Use it on a system in an external DMZ in front of the firewall
D.
It doesn't matter as all replies are faked
It doesn't matter as all replies are faked
In what way do the procedures for dealing with evidence in a criminal case differ from the
procedures for dealing with evidence in a civil case?
A.
evidence must be handled in the same way regardless of the type of case
B.
evidence procedures are not important unless you work for a law enforcement agency
C.
evidence in a criminal case must be secured more tightly than in a civil case
D.
evidence in a civil case must be secured more tightly than in a criminal case
evidence in a criminal case must be secured more tightly than in a civil case
When conducting computer forensic analysis, you must guard against ______________ So
that you remain focused on the primary job and insure that the level of work does not increase beyond what was originally expected.
A.
Hard Drive Failure
B.
Scope Creep
C.
Unauthorized expenses
D.
Overzealous marke
Scope Creep
____________________ is simply the application of Computer Investigation and analysis techniques in the interests of determining potential legal evidence.
A.
Network Forensics
B.
Computer Forensics
C.
Incident Response
D.
Event Reaction
Computer Forensics
Page 4 out of 120 Pages |
Previous |