Csf
Csf
Csf
5) When was the first FBI Regional Computer Forensic laboratory was
Recognize?.
A) 1992 B) 1980 C) 1949 D) 2000 Ans [d]
18) What is the best statement for taking advantage of a weakness in the
security of anIT system? What is the best statement for taking advantage
of a weakness in the security of anIT system? What is the best statement
for taking advantage of a weakness in the security of anIT system? What
is the best statement for taking advantage of a weakness in the security
of an IT system?
A) Threat B) Attack C) Exploit D) Vulnerability Ans [c]
25) What are the three general categories of computer systems that can
contain digital evidence?
A) Desktop, laptop, server B) Personal computer, Internet, mobile
telephone C) Hardware, software, networks D) Open computer systems,
communication systems, embedded systems Ans [d]
34) In the past, the method for expressing an opinion has been to frame
a ____ question based on available factual evidence.
A) Hypothetical B) Nested C) Challenging D) Contradictory Ans [a]
35) More subtle because you are not aware that you are running these
macros (the document opens and the application automatically runs);
spread via email
A) The purpose of copyright B) Danger of macro viruses C) Derivative
works D) computer-specific crime Ans [b]
42) Which of the statements are true? 1. Linux is an open source code
and considered to have greater security than the commercial Windows
environment. 2. Manufacturer settings, or default settings, may provide
basic protection against hacking threats, but need to change to provide
advance support.
A) Only statement 1 is true B) Only statement 2 is true C) Both
statements 1 and 2 are true D) Both statements 1 and 2 are false Ans [c]
43) These types of hackers are the most skilled hackers in the hackers
community. Who are they referred to?
A) White hat Hackers B) Elite Hackers C) Licensed Penetration Testers D)
Red Hat Hackers Ans [b]
44) What are some of the most common vulnerabilities that exist in a
network or system?
A) Changing manufacturer, or recommended, settings of a newly installed
application. B) Additional unused features on commercial software
packages. C) Utilizing open source application code D) Balancing security
concerns with functionality and ease of use of a system. Ans [b]
46) What type of rootkit will patch, hook, or replace the version of
system call in order to hide information?
A) Library level rootkits B) Kernel level rootkits C) System level
rootkits D) Application level rootkits Ans [a]
47) _________ are those individuals who maintain and handles IT security
in any firm or organization.
A) IT Security Engineer B) Cyber Security Interns C) Software Security
Specialist D) Security Auditor Ans [a]
58) You begin any computer forensics case by creating a(n) ____.
A) Investigation plan B) Evidence custody form C) Risk assessment report
D) Investigation report Ans [a]
59) In civil and criminal cases, the scope is often defined by search
warrants or ____, which specify what data you can recover.
A) Risk assessment reports B) Scope creeps C) Investigation plans D)
Subpoena Ans [d]
60) ____ Search can locate items such as text hidden in unallocated
space that might not turn up in an indexed search.
A) Online B) Active C) Inline D) Live Ans [d]
63) ____ are handy when you need to image the drive of a computer far
away from your location or when you dont want a suspect to be aware of an
ongoing investigation.
A) Scope creeps B) Password recovery tools C) Remote acquisitions D) Key
escrow utilities Ans [d]
65) The term ____ comes from the Greek word for hidden writing.
A) Creep B) Escrow C) Steganography D) Hashing Ans [c]
66) ____ is defined as the art and science of hiding messages in such a
way that only the intended recipient knows the message is there.
A) Bit shifting B) Marking bad clusters C) Encryption D) Steganography
Ans [d]
68) There are three c 's in computer forensics. Which is one of the
three?
A) Control B) Chance C) Chairs D) 1,2 and 3 Ans [a]
69) You are supposed to maintain three types of records. Which answer is
not a record?
A) Chain of custody B) Documentation of the crime scene C) Searching the
crime scene D) Document your actions Ans [a]
84) E-mail messages are distributed from one central server to many
connected client computers, a configuration called ____.
A) client/server architecture B) client architecture C) central
distribution architecture D) peer-to-peer architecture Ans [a]
94) Which of the following statements are true? 1. The forensic auditor
needs to be present during court proceedings to explain the evidence
collected and how the suspect was identified.2. The report should include
the findings of the investigation, a summary of the evidence, an
explanation of how the fraud was perpetrated, and suggestions on how
internal controls can be improved to prevent such frauds in the future.
A) 1- True and 2-True B) 1- False and 2-True C) 1- True and 2-False D)
1- False and 2-False Ans [a]
103) What is the file extension used by outlook express to store e-mails
locally
A) Pst B) doc C) nsf D) Rst Ans [a]
107) You begin any computer forensics case by creating a(n) ____.
A) Investigation plan B) Evidence custody form C) Risk assessment report
D) Investigation report Ans [a]
108) In civil and criminal cases, the scope is often defined by search
warrants or ____, which specify what data you can recover.
A) Risk assessment reports B) Scope creeps C) Investigation plans D)
Subpoena Ans [d]
109) ____ Search can locate items such as text hidden in unallocated
space that might not turn up in an indexed search.
A) Online B) Active C) Inline D) Live Ans [d]
110) ____ attacks use every possible letter, number, and character found
on a keyboard when cracking a password.
A) Brute-force B) Profile C) Dictionary D) Statistics Ans [a]
112) ____ are handy when you need to image the drive of a computer far
away from your location or when you dont want a suspect to be aware of an
ongoing investigation.
A) Scope creeps B) Password recovery tools C) Remote acquisitions D) Key
escrow utilities Ans [d]
114) The term ____ comes from the Greek word for hidden writing.
A) Creep B) Escrow C) Steganography D) Hashing Ans [c]
115) ____ is defined as the art and science of hiding messages in such a
way that only the intended recipient knows the message is there.
A) Bit shifting B) Marking bad clusters C) Encryption D) Steganography
Ans [d]
116) People who want to hide data can also use advanced encryption
programs, such as PGP or ____.
A) NTI B) FTK C) BestCrypt D) PRTK Ans [d]
117) There are three c 's in computer forensics. Which is one of the
three?
A) Control B) Chance C) Chairs D) 1,2 and 3 Ans [a]
118) You are suppose to maintain three types of records. Which answer is
not a record?
A) Chain of custody B) Documentation of the crime scene C) Searching the
crime scene D) Document your actions Ans [a]
-123) E-mail messages are distributed from one central server to many
connected client computers, a configuration called ____.
A) client/server architecture B) client architecture C) central
distribution architecture D) peer-to-peer architecture Ans [a]