Filters
Question type

Study Flashcards

What hashing method is used to password protect Blackberry devices?


A) AES
B) RC5
C) MD5
D) SHA-1

Correct Answer

verifed

verified

A forensics investigator is searching the hard drive of a computer for files that were recently moved to the Recycle Bin. He searches for files in C:\RECYCLED using a command line tool but does not find anything. What is the reason for this?


A) He should search in C:\Windows\System32\RECYCLED folder
B) The Recycle Bin does not exist on the hard drive
C) The files are hidden and he must use switch to view them
D) Only FAT system contains RECYCLED folder and not NTFS

Correct Answer

verifed

verified

Paul is a computer forensics investigator working for Tyler & Company Consultants. Paul has been called upon to help investigate a computer hacking ring broken up by the local police. Paul begins to inventory the PCs found in the hackers hideout. Paul then comes across a PDA left by them that is attached to a number of different peripheral devices. What is the first step that Paul must take with the PDA to ensure the integrity of the investigation?


A) Place PDA, including all devices, in an antistatic bag
B) Unplug all connected devices
C) Power off all devices if currently on
D) Photograph and document the peripheral devices

Correct Answer

verifed

verified

Julie is a college student majoring in Information Systems and Computer Science. She is currently writing an essay for her computer crimes class. Julie paper focuses on white-collar crimes in America and how forensics investigators investigate the cases. Julie would like to focus the subject. Julie would like to focus the subject of the essay on the most common type of crime found in corporate America. What crime should Julie focus on?


A) Physical theft
B) Copyright infringement
C) Industrial espionage
D) Denial of Service attacks

Correct Answer

verifed

verified

The objective of this act was to protect consumers' personal financial information held by financial institutions and their service providers.


A) Gramm-Leach-Bliley Act
B) Sarbanes-Oxley 2002
C) California SB 1386
D) HIPAA

Correct Answer

verifed

verified

Heather, a computer forensics investigator, is assisting a group of investigators working on a large computer fraud case involving over 20 people. These 20 people, working in different offices, allegedly siphoned off money from many different client accounts. Heather responsibility is to find out how the accused people communicated between each other. She has searched their email and their computers and has not found any useful evidence. Heather then finds some possibly useful evidence under the desk of one of the accused. In an envelope she finds a piece of plastic with numerous holes cut out of it. Heather then finds the same exact piece of plastic with holes at many of the other accused peoples desks. Heather believes that the 20 people involved in the case were using a cipher to send secret messages in between each other. What type of cipher was used by the accused in this case?


A) Grill cipher
B) Null cipher
C) Text semagram
D) Visual semagram

Correct Answer

verifed

verified

What is the slave device connected to the secondary IDE controller on a Linux OS referred to?


A) hda
B) hdd
C) hdb
D) hdc

Correct Answer

verifed

verified

Showing 21 - 27 of 27

Related Exams

Show Answer