Topic 1: Exam Set A
When dealing with the powered-off computers at the crime scene, if the computer is
switched off, turn it on
A.
True
B.
False
False
The Electronic Serial Number (ESN) is a unique __________ recorded on a secure chip in
a mobile phone by the manufacturer.
A.
16-bit identifier
B.
24-bit identifier
C.
32-bit identifier
D.
64-bit identifier
32-bit identifier
A swap file is a space on a hard disk used as the virtual memory extension of a computer's
RAM. Where is the hidden swap file in Windows located?
A.
C:\pagefile.sys
B.
C:\hiberfil.sys
C.
C:\config.sys
D.
C:\ALCSetup.log
C:\pagefile.sys
Identify the attack from following sequence of actions?
Step 1: A user logs in to a trusted site and creates a new session
Step 2: The trusted site stores a session identifier for the session in a cookie in the web
browser
Step 3: The user is tricked to visit a malicious site
Step 4: the malicious site sends a request from the user's browser using his session cookie
A.
A. Web Application Denial-of-Service (DoS) Attack
B.
Cross-Site Scripting (XSS) Attacks
C.
Cross-Site Request Forgery (CSRF) Attack
D.
Hidden Field Manipulation Attack
Cross-Site Request Forgery (CSRF) Attack
Consistency in the investigative report is more important than the exact format in the report
to eliminate uncertainty and confusion.
A.
True
B.
False
True
Page 4 out of 98 Pages |
Previous |