Topic 1: Exam Set A
You have been given the task to investigate web attacks on a Windows-based server.
Which of the following commands will you use to look at which sessions the machine has
opened with other systems?
A.
Net sessions
B.
Net use
C.
Net config
D.
Net share
Net use
A system with a simple logging mechanism has not been given much attention during development, this system is now being targeted by attackers, if the attacker wants to
perform a new line injection attack, what will he/she inject into the log file?
A.
Plaintext
B.
Single pipe character
C.
Multiple pipe characters
D.
HTML tags
Plaintext
A mobile operating system is the operating system that operates a mobile device like a
mobile phone, smartphone, PDA, etc. It determines the functions and features available on
mobile devices such as keyboards, applications, email, text messaging, etc. Which of the
following mobile operating systems is free and open source?
A.
Web OS
B.
Android
C.
Apple IOS
D.
Symbian OS
Android
First responder is a person who arrives first at the crime scene and accesses the victim's
computer system after the incident. He or She is responsible for protecting, integrating, and
preserving the evidence obtained from the crime scene.
Which of the following is not a role of first responder?
A.
Identify and analyze the crime scene
B.
Protect and secure the crime scene
C.
Package and transport the electronic evidence to forensics lab
D.
Prosecute the suspect in court of law
Prosecute the suspect in court of law
Computer forensics report provides detailed information on complete computer forensics
investigation process. It should explain how the incident occurred, provide technical details
of the incident and should be clear to understand. Which of the following attributes of a
forensics report can render it inadmissible in a court of law?
A.
It includes metadata about the incident
B.
It includes relevant extracts referred to In the report that support analysis or conclusions
C.
It is based on logical assumptions about the incident timeline
D.
It maintains a single document style throughout the text
It is based on logical assumptions about the incident timeline
Page 17 out of 98 Pages |
Previous |