Topic 1: Exam Set A
Shortcuts are the files with the extension .Ink that are created and are accessed by the
users. These files provide you with information about:
A.
Files or network shares
B.
Running application
C.
Application logs
D.
System logs
Files or network shares
Ron. a computer forensics expert, Is Investigating a case involving corporate espionage.
He has recovered several mobile computing devices from the crime scene. One of the
evidence that Ron possesses is a mobile phone from Nokia that was left in on condition.
Ron needs to recover the IMEI number of the device to establish the identity of the device
owner. Which of the following key combinations he can use to recover the IMEI number?
A.
#*06*#
B.
*#06#
C.
#06r
D.
*1MEI#
*#06#
An intrusion detection system (IDS) gathers and analyzes information from within a
computer or a network to identify any possible violations of security policy, including
unauthorized access, as well as misuse.
Which of the following intrusion detection systems audit events that occur on a specific
host?
A.
Network-based intrusion detection
B.
Host-based intrusion detection
C.
Log file monitoring
D.
File integrity checking
Host-based intrusion detection
The need for computer forensics is highlighted by an exponential increase in the number of
cybercrimes and litigations where large organizations were involved. Computer forensics
plays an important role in tracking the cyber criminals. The main role of computer forensics
is to:
A.
Maximize the investigative potential by maximizing the costs
B.
Harden organization perimeter security
C.
Document monitoring processes of employees of the organization
D.
Extract, process, and interpret the factual evidence so that it proves the attacker's
actions in the court
Extract, process, and interpret the factual evidence so that it proves the attacker's
actions in the court
Which one of the following statements is not correct while preparing for testimony?
A.
Go through the documentation thoroughly
B.
Do not determine the basic facts of the case before beginning and examining the
evidence
C.
Establish early communication with the attorney
D.
Slack space
Go through the documentation thoroughly
Page 3 out of 98 Pages |
Previous |