A rogue/unauthorized access point is one that Is not authorized for operation by a particular firm or network

A rogue/unauthorized access point is one that Is not authorized for operation by a particular firm or networkA . TrueB . FalseView AnswerAnswer: A

September 14, 2018 No Comments READ MORE +

WPA2 provides enterprise and Wi-Fi users with stronger data protection and network access control which of the following encryption algorithm is used DVWPA2?

WPA2 provides enterprise and Wi-Fi users with stronger data protection and network access control which of the following encryption algorithm is used DVWPA2?A . RC4-CCMPB . RC4-TKIPC . AES-CCMPD . AES-TKIPView AnswerAnswer: C

September 13, 2018 No Comments READ MORE +

Volatile information can be easily modified or lost when the system is shut down or rebooted. It helps to determine a logical timeline of the security incident and the users who would be responsible.

Volatile information can be easily modified or lost when the system is shut down or rebooted. It helps to determine a logical timeline of the security incident and the users who would be responsible.A . TrueB . FalseView AnswerAnswer: A

September 7, 2018 No Comments READ MORE +

Which of the following commands shows you the username and IP address used to access the system via a remote login session and the Type of client from which they are accessing the system?

Which of the following commands shows you the username and IP address used to access the system via a remote login session and the Type of client from which they are accessing the system?A . Net sessionsB . Net fileC . Net configD . Net shareView AnswerAnswer: A

September 5, 2018 No Comments READ MORE +

File signature analysis involves collecting information from the __________ of a file to determine the type and function of the file

File signature analysis involves collecting information from the __________ of a file to determine the type and function of the fileA . First 10 bytesB . First 20 bytesC . First 30 bytesD . First 40 bytesView AnswerAnswer: B

September 3, 2018 No Comments READ MORE +

What happens when a file is deleted in windows7?

File deletion is a way of removing a file from a computer's file system. What happens when a file is deleted in windows7?A . The last letter of a file name is replaced by a hex byte code E5hB . The operating system marks the file's name in the MFT...

September 1, 2018 No Comments READ MORE +

Which of the following steganography types hides the secret message in a specifically designed pattern on the document that is unclear to the average reader?

Which of the following steganography types hides the secret message in a specifically designed pattern on the document that is unclear to the average reader?A . Open code steganographyB . Visual semagrams steganographyC . Text semagrams steganographyD . Technical steganographyView AnswerAnswer: A

August 29, 2018 No Comments READ MORE +

What is a bit-stream copy?

What is a bit-stream copy?A . Bit-Stream Copy is a bit-by-bit copy of the original storage medium and exact copy of the original diskB . A bit-stream image is the file that contains the NTFS files and folders of all the data on a disk or partitionC . A bit-stream...

August 27, 2018 No Comments READ MORE +

MAC filtering is a security access control methodology, where a ___________ is assigned to each network card to determine access to the network

MAC filtering is a security access control methodology, where a ___________ is assigned to each network card to determine access to the networkA . 16-bit addressB . 24-bit addressC . 32-bit addressD . 48-bit addressView AnswerAnswer: D

August 21, 2018 No Comments READ MORE +

Which of the following statements does not support the case assessment?

Which of the following statements does not support the case assessment?A . Review the case investigator's request for serviceB . Identify the legal authority for the forensic examination requestC . Do not document the chain of custodyD . Discuss whether other forensic processes need to be performed on the evidenceView...

August 18, 2018 No Comments READ MORE +