Topic 2, Exam Pool B
What layer of the OSI model do TCP and UDP utilize?
A.
Data Link
B.
Network
C.
Transport
D.
Session
Transport
When is it appropriate to use computer forensics?
A.
If copyright and intellectual property theft/misuse has occurred
B.
If employees do not care for their boss management techniques
C.
If sales drop off for no apparent reason for an extended period of time
D.
If a financial institution is burglarized by robbers
If copyright and intellectual property theft/misuse has occurred
Which file is a sequence of bytes organized into blocks understandable by the system’s linker?
A.
executable file
B.
source file
C.
Object file
D.
None of these
Object file
What does 254 represent in ICCID 89254021520014515744?
A.
Industry Identifier Prefix
B.
Country Code
C.
Individual Account Identification Number
D.
Issuer Identifier Number
Country Code
What feature of Decryption Collection allows an investigator to crack a password as quickly as possible?
A.
Cracks every password in 10 minutes
B.
Distribute processing over 16 or fewer computers
C.
Support for Encrypted File System
D.
Support for MD5 hash verification
Distribute processing over 16 or fewer computers
Julie is a college student majoring in Information Systems and Computer Science. She is
currently writing an essay for her computer crimes class. Julie paper focuses on whitecollar
crimes in America and how forensics investigators investigate the cases. Julie would
like to focus the subject. Julie would like to focus the subject of the essay on the most
common type of crime found in corporate America. What crime should Julie focus on?
A.
Physical theft
B.
Copyright infringement
C.
Industrial espionage
D.
Denial of Service attacks
Industrial espionage
Stephen is checking an image using Compare Files by The Wizard, and he sees the file signature is shown as FF D8 FF E1. What is the file type of the image?
A.
gif
B.
bmp
C.
jpeg
D.
png
jpeg
Company ABC has employed a firewall, IDS, Antivirus, Domain Controller, and SIEM. The
company’s domain controller goes down. From which system would you begin your
investigation?
A.
Domain Controller
B.
Firewall
C.
SIEM
D.
IDS
SIEM
What is the default IIS log location?
A.
SystemDrive\inetpub\LogFiles
B.
%SystemDrive%\inetpub\logs\LogFiles
C.
%SystemDrive\logs\LogFiles
D.
SystemDrive\logs\LogFiles
%SystemDrive%\inetpub\logs\LogFiles
Where are files temporarily written in Unix when printing?
A.
/usr/spool
B.
/var/print
C.
/spool
D.
/var/spool
/var/spool
Which of the following files stores information about a local Google Drive installation such as User email ID, Local Sync Root Path, and Client version installed?
A.
filecache.db
B.
config.db
C.
sigstore.db
D.
Sync_config.db
Sync_config.db
Travis, a computer forensics investigator, is finishing up a case he has been working on for over a month involving copyright infringement and embezzlement. His last task is to prepare an investigative report for the president of the company he has been working for. Travis must submit a hard copy and an electronic copy to this president. In what electronic
format should Travis send this report?
A.
TIFF-8
B.
DOC
C.
WPD
D.
Page 18 out of 50 Pages |
Previous |