Black Friday Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Peter works as a Computer Hacking Forensic Investigator. He has been called by an organization to conduct a seminar to give necessary information related to sexual harassment within the work place. Peter started with the definition and types of sexual harassment. He then wants to convey that it is important that records of the sexual harassment incidents should be maintained, which helps in further legal prosecution. Which of the following data should be recorded in this documentation?

Each correct answer represents a complete solution. Choose all that apply.

A.

Names of the victims

B.

Date and time of incident

C.

Nature of harassment

D.

Location of each incident

Which of the following tools can be used to perform a whois query?

Each correct answer represents a complete solution. Choose all that apply.

A.

Sam Spade

B.

SuperScan

C.

Traceroute

D.

WsPingPro

Which of the following parameters is NOT used for calculating the capacity of the hard disk?

A.

Bytes per sector

B.

Number of heads

C.

Total number of sectors

D.

Number of platters

John works for an Internet Service Provider (ISP) in the United States. He discovered child

pornography material on a Web site hosted by the ISP. John immediately informed law enforcement authorities about this issue. Under which of the following Acts is John bound to take such an action?

A.

Civil Rights Act of 1991

B.

PROTECT Act

C.

Civil Rights Act of 1964

D.

Sexual Predators Act

Which of the following is the process of comparing cryptographic hash functions of system executables and configuration files?

A.

Spoofing

B.

File integrity auditing

C.

Reconnaissance

D.

Shoulder surfing

An executive in your company reports odd behavior on her PDA. After investigation you discover that a trusted device is actually copying data off the PDA. The executive tells you that the behavior started shortly after accepting an e-business card from an unknown person. What type of attack is this?

A.

Session Hijacking

B.

Bluesnarfing

C.

PDA Hijacking

D.

Privilege Escalation

Which of the following directories in Linux operating system contains device files, which refers to physical devices?

A.

/boot

B.

/etc

C.

/dev

D.

/bin

Which of the following statements about an extended partition are true?

Each correct answer represents a complete solution. Choose two.

A.

It can be sub-divided into logical drives.

B.

It cannot be formatted or assigned a drive letter.

C.

A maximum of four extended partitions can exist on a single basic disk.

D.

It cannot contain more than one logical drive.

Adam works as a professional Computer Hacking Forensic Investigator. He has been assigned with the project of investigating an iPod, which is suspected to contain some explicit material. Adam wants to connect the compromised iPod to his system, which is running on Windows XP (SP2) operating system. He doubts that connecting the iPod with his computer may change some evidences and settings in the iPod. He wants to set the iPod to read-only mode. This can be done by changing the registry key within the Windows XP (SP2) operating system. Which of the following registry keys will Adam change to accomplish the task?

A.

HKEY_LOCAL_MACHINE\System\CurrentControlset\Control\StorageDevicePolicies

B.

HKEY_LOCAL_MACHINE\CurrentControlset\Control\StorageDevicePolicies

C.

HKEY_LOCAL_MACHINE\System\CurrentControlset\StorageDevicePolicies

D.

HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion

Which of the following types of evidence proves or disproves a specific act through oral testimony based on information gathered through the witness's five senses?

A.

Conclusive evidence

B.

Best evidence

C.

Hearsay evidence

D.

Direct evidence