Sample Questions
Q) When the investigator contacts the administrator or a domain controller contains the phone who's a search to retrieve all e-mails sent and received for the user account is stored, what U.S.C. The Constitution allows the phone call and oblige the provider to store e-mail account?
a) Name 18, Section 1030
b) Title 18, section 2703 (g)
c) Name 18, Chapter 90
d) Title 18, Section 2703 (b)
e) None
Q) Point 2If you are faced with a car on the spot for bathing sheep client site, what would you conclude?
a) Coordinates several places for swimming lures sheep
b) Computer room for bathing sheep other names for the bait
c) Computer bathing areas sheep are used only to fight off viruses.
d) Computer shoots bathing areas refusal sheep
e) None
Q) In a study of forensic computer examination, that it describes the way in which evidence takes from when you find it, until the case is closed or goes to court?
a) rules of evidence
b) law of probability
c) traceability
d) policy to separate
e) None
Q) Honey pot is deployed with IP 172.16.1.108 has been compromised by hackers. The following excerpt is from Snort binary capture attacks. Deciphering the activities carried out by an attacker by examining the log. Please note that you need to stop only that which is apparent in the statement.
a) The attacker carried out a network scan on port 111
b) The attacker scanned and used to buffer overflow
c) The attacker used a backdoor on port 32773
d) The attacker installed a backdoor
e) None