Q1. Before accessing digital evidence from victims, witnesses, or suspects, on their electronic devices, what should the Investigator do first to respect legal privacy requirements?
A.Notify the fact to the local authority or employer
B. Remove the battery or turn-off the device
C. Protect the device against external communication
D. Obtain formal written consent to search
Correct Answer: A
Q2. In which loT attack does the attacker use multiple forged identities to create a strong illusion of traffic congestion, affecting communication between neighboring nodes and networks?
A.Replay attack
B. Jamming attack
C. Blueborne attack
D. Sybil attack
Correct Answer: D
Q3. Chloe is a forensic examiner who is currently cracking hashed passwords for a crucial mission and hopefully solve the case. She is using a lookup table used for recovering a plain text password from cipher text; it contains word list and brute-force list along with their computed hash values. Chloe Is also using a graphical generator that supports SHA1. a. What password technique is being used? b. What tool is Chloe using?
A.Dictionary attack b. Cisco PIX
B. Cain & Able b. Rten
C. Brute-force b. MScache
D. Rainbow Tables b. Winrtgen
Correct Answer: D
Q4. Which "Standards and Criteria" under SWDGE states that "the agency must use hardware and software that are appropriate and effective for the seizure or examination procedure"?
A.Standards and Criteria 1.7
B. Standards and Criteria 1.6
C. Standards and Criteria 1.4
D. Standards and Criteria 1.5
Correct Answer: D
$ 39
Reviews
There are no reviews yet.