312-49v10 Practice Test Questions

596 Questions


Topic 2, Exam Pool B

What layer of the OSI model do TCP and UDP utilize?


A.

Data Link


B.

Network


C.

Transport


D.

Session





C.
  

Transport



When is it appropriate to use computer forensics?


A.

If copyright and intellectual property theft/misuse has occurred


B.

If employees do not care for their boss management techniques


C.

If sales drop off for no apparent reason for an extended period of time


D.

If a financial institution is burglarized by robbers





A.
  

If copyright and intellectual property theft/misuse has occurred



Which file is a sequence of bytes organized into blocks understandable by the system’s linker?


A.

executable file


B.

source file


C.

Object file


D.

None of these





C.
  

Object file



What does 254 represent in ICCID 89254021520014515744? 


A.

Industry Identifier Prefix


B.

Country Code


C.

Individual Account Identification Number


D.

Issuer Identifier Number





B.
  

Country Code



What feature of Decryption Collection allows an investigator to crack a password as quickly as possible?


A.

Cracks every password in 10 minutes


B.

Distribute processing over 16 or fewer computers


C.

Support for Encrypted File System


D.

Support for MD5 hash verification





B.
  

Distribute processing over 16 or fewer computers



Julie is a college student majoring in Information Systems and Computer Science. She is
currently writing an essay for her computer crimes class. Julie paper focuses on whitecollar
crimes in America and how forensics investigators investigate the cases. Julie would
like to focus the subject. Julie would like to focus the subject of the essay on the most
common type of crime found in corporate America. What crime should Julie focus on?


A.

Physical theft


B.

Copyright infringement


C.

Industrial espionage


D.

Denial of Service attacks





C.
  

Industrial espionage



Stephen is checking an image using Compare Files by The Wizard, and he sees the file signature is shown as FF D8 FF E1. What is the file type of the image?


A.

gif


B.

bmp


C.

jpeg


D.

png





C.
  

jpeg



Company ABC has employed a firewall, IDS, Antivirus, Domain Controller, and SIEM. The
company’s domain controller goes down. From which system would you begin your
investigation?


A.

Domain Controller


B.

Firewall


C.

SIEM


D.

IDS





C.
  

SIEM



What is the default IIS log location?


A.

SystemDrive\inetpub\LogFiles


B.

%SystemDrive%\inetpub\logs\LogFiles


C.

%SystemDrive\logs\LogFiles


D.

SystemDrive\logs\LogFiles





B.
  

%SystemDrive%\inetpub\logs\LogFiles



Where are files temporarily written in Unix when printing?


A.

/usr/spool


B.

/var/print


C.

/spool


D.

/var/spool





D.
  

/var/spool



Which of the following files stores information about a local Google Drive installation such as User email ID, Local Sync Root Path, and Client version installed?


A.

filecache.db


B.

config.db


C.

sigstore.db


D.

Sync_config.db





D.
  

Sync_config.db



Travis, a computer forensics investigator, is finishing up a case he has been working on for over a month involving copyright infringement and embezzlement. His last task is to prepare an investigative report for the president of the company he has been working for. Travis must submit a hard copy and an electronic copy to this president. In what electronic
format should Travis send this report?


A.

TIFF-8


B.

DOC


C.

WPD


D.

PDF





D.
  

PDF




Page 18 out of 50 Pages
Previous