Exam 24: Forensic Techniques
Exam 1: What Is a Computer Network30 Questions
Exam 2: Network Topology30 Questions
Exam 3: Networking Hardware30 Questions
Exam 4: Ethernet Technology30 Questions
Exam 5: Token-Ring, fddi, and Other LAN Technologies30 Questions
Exam 6: Network Design and Troubleshooting Scenarios30 Questions
Exam 7: Low-Level Protocols30 Questions
Exam 8: The Tcpip Protocols30 Questions
Exam 9: Ipxspx, Appletalk, and Other Network Protocols30 Questions
Exam 10: Switching and Routing30 Questions
Exam 11: Network Management and Security30 Questions
Exam 12: Electronic Mail30 Questions
Exam 13: FTP and Telnet30 Questions
Exam 14: Multimedia Networking30 Questions
Exam 15: The Internet30 Questions
Exam 16: Writing a Network Application30 Questions
Exam 17: An Introduction to Networking With Windows30 Questions
Exam 18: Windows Domains30 Questions
Exam 19: Unix and Linux30 Questions
Exam 20: Other Network Operating Systems30 Questions
Exam 21: Cryptography and Security30 Questions
Exam 22: Security Hardware30 Questions
Exam 23: Security Software30 Questions
Exam 24: Forensic Techniques30 Questions
Select questions type
Match each item with a statement below.
-A group of individuals at an organization responsible for detecting,investigating,solving,and documenting computer security incidents
Free
(Multiple Choice)
4.9/5
(33)
Correct Answer:
B
Using the System Reset tool a Restore Point may be chosen and the system returned back to that point in time.
Free
(True/False)
4.8/5
(25)
Correct Answer:
False
List five laws that have been put into effect to help monitor and control the use of electronic communication systems and computers as well as provide guidelines for prosecution of computer and information-related crimes.
Free
(Essay)
4.8/5
(36)
Correct Answer:
Computer Fraud and Abuse Act of 1986
Electronic Communications Privacy Act of 1986
National Information Infrastructure Protection Act of 1996
No Electronic Theft (NET)Act of 1997
Digital Millennium Copyright Act of 1998
Gramm-Leach-Bliley Act of 1999
Sarbanes-Oxley Act of 2002
Cyber Security Enhancement Act of 2002
Controlling the Assault of Non-Solicited Pornography and Marketing Act of 2003
Information that is transferred to an external device should also have a(n)____ calculated to verify integrity during collection and at a later date.
(Multiple Choice)
4.9/5
(33)
The FAT stores files in dynamic chains of ____________________.
(Short Answer)
4.9/5
(33)
Match each item with a statement below.
-The part of a cluster that is not used when a file is written to it
(Multiple Choice)
4.9/5
(31)
The ____ provides the platform on which computer hardware is managed and made available to the computer software applications.
(Multiple Choice)
4.9/5
(34)
____ is a very common file system used by computers and is supported by many different operating systems.
(Multiple Choice)
4.9/5
(31)
Match each item with a statement below.
-A snapshot of the state of the system at a point in time
(Multiple Choice)
4.8/5
(36)
____ will search through a file or folder and report on all the ASCII strings it finds.
(Multiple Choice)
4.8/5
(38)
The ____________________ contains items that were recently deleted from a Windows computer system.
(Short Answer)
4.9/5
(29)
____________________ tools are programs designed to look at specific data structures within the operating system.
(Short Answer)
4.8/5
(33)
A ____ contains a copy of the Registry that existed at the time the Restore Point was created.
(Multiple Choice)
4.9/5
(36)
Match each item with a statement below.
-A computer that is made deliberately vulnerable in order to make it attractive to hackers
(Multiple Choice)
4.7/5
(38)
The ____ file is used by the system to assist with virtual memory paging and is quite large.
(Multiple Choice)
4.7/5
(41)
The ____________________ is a written record of all interaction with the evidence from the moment it is acquired to the moment it is released.
(Short Answer)
4.9/5
(34)
A ____ is a hardware device or software program designed to prevent any write operations from taking place on the original media.
(Multiple Choice)
4.8/5
(24)
Showing 1 - 20 of 30
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)