A rogue/unauthorized access point is one that Is not authorized for operation by a particular firm or network
A rogue/unauthorized access point is one that Is not authorized for operation by a particular firm or networkA . TrueB . FalseView AnswerAnswer: A
WPA2 provides enterprise and Wi-Fi users with stronger data protection and network access control which of the following encryption algorithm is used DVWPA2?
WPA2 provides enterprise and Wi-Fi users with stronger data protection and network access control which of the following encryption algorithm is used DVWPA2?A . RC4-CCMPB . RC4-TKIPC . AES-CCMPD . AES-TKIPView AnswerAnswer: C
Volatile information can be easily modified or lost when the system is shut down or rebooted. It helps to determine a logical timeline of the security incident and the users who would be responsible.
Volatile information can be easily modified or lost when the system is shut down or rebooted. It helps to determine a logical timeline of the security incident and the users who would be responsible.A . TrueB . FalseView AnswerAnswer: A
Which of the following commands shows you the username and IP address used to access the system via a remote login session and the Type of client from which they are accessing the system?
Which of the following commands shows you the username and IP address used to access the system via a remote login session and the Type of client from which they are accessing the system?A . Net sessionsB . Net fileC . Net configD . Net shareView AnswerAnswer: A
File signature analysis involves collecting information from the __________ of a file to determine the type and function of the file
File signature analysis involves collecting information from the __________ of a file to determine the type and function of the fileA . First 10 bytesB . First 20 bytesC . First 30 bytesD . First 40 bytesView AnswerAnswer: B
What happens when a file is deleted in windows7?
File deletion is a way of removing a file from a computer's file system. What happens when a file is deleted in windows7?A . The last letter of a file name is replaced by a hex byte code E5hB . The operating system marks the file's name in the MFT...
Which of the following steganography types hides the secret message in a specifically designed pattern on the document that is unclear to the average reader?
Which of the following steganography types hides the secret message in a specifically designed pattern on the document that is unclear to the average reader?A . Open code steganographyB . Visual semagrams steganographyC . Text semagrams steganographyD . Technical steganographyView AnswerAnswer: A
What is a bit-stream copy?
What is a bit-stream copy?A . Bit-Stream Copy is a bit-by-bit copy of the original storage medium and exact copy of the original diskB . A bit-stream image is the file that contains the NTFS files and folders of all the data on a disk or partitionC . A bit-stream...
MAC filtering is a security access control methodology, where a ___________ is assigned to each network card to determine access to the network
MAC filtering is a security access control methodology, where a ___________ is assigned to each network card to determine access to the networkA . 16-bit addressB . 24-bit addressC . 32-bit addressD . 48-bit addressView AnswerAnswer: D
Which of the following statements does not support the case assessment?
Which of the following statements does not support the case assessment?A . Review the case investigator's request for serviceB . Identify the legal authority for the forensic examination requestC . Do not document the chain of custodyD . Discuss whether other forensic processes need to be performed on the evidenceView...