Topic 1: Exam Set A
Which of the following network attacks refers to sending huge volumes of email to an address in an attempt to overflow the mailbox, or overwhelm the server where the email
address is hosted, to cause a denial-of-service attack?
A.
Email spamming
B.
Mail bombing
C.
Phishing
D.
Email spoofing
Mail bombing
FAT32 is a 32-bit version of FAT file system using smaller clusters and results in efficient
storage capacity. What is the maximum drive size supported?
A.
1 terabytes
B.
2 terabytes
C.
3 terabytes
D.
4 terabytes
2 terabytes
Which root folder (hive) of registry editor contains a vast array of configuration information
for the system, including hardware settings and software settings?
A.
HKEY_USERS
B.
HKEY_CURRENT_USER
C.
HKEY_LOCAL_MACHINE
D.
HKEY-CURRENT_CONFIG
HKEY_LOCAL_MACHINE
If a file (readme.txt) on a hard disk has a size of 2600 bytes, how many sectors are normally allocated to this file?
A.
4 Sectors
B.
5 Sectors
C.
6 Sectors
D.
7 Sectors
6 Sectors
How do you define forensic computing?
A.
It is the science of capturing, processing, and investigating data security incidents and
making it acceptable to a court of law.
B.
It is a methodology of guidelines that deals with the process of cyber investigation
C.
It Is a preliminary and mandatory course necessary to pursue and understand
fundamental principles of ethical hacking
D.
It is the administrative and legal proceeding in the process of forensic investigation
It is the science of capturing, processing, and investigating data security incidents and
making it acceptable to a court of law.
Page 20 out of 98 Pages |
Previous |