Black Friday Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which of the following graphical tools is used to navigate through directory structures?

A.

Disk Cleanup

B.

System Information

C.

Disk Management

D.

Windows Explorer

Which of the following statements is true for a file in the UNIX operating system?

A.

It is a collection of information, which cannot be data or documents.

B.

It is a directory entry that points to an original file somewhere else.

C.

It is a collection of information, which can be data, an application, or documents.

D.

It is a collection of information, which can be only documents.

Which of the following wireless network standards operates on the 5 GHz band and transfers data at a rate of 54 Mbps?

A.

802.11a

B.

802.11u

C.

802.11g

D.

802.11b

You want to retrieve information whether your system is in promiscuous mode or not. Which of the following commands will you use?

Each correct answer represents a complete solution. Choose all that apply.

A.

grep Promisc /var/log/messages

B.

ip link

C.

ifconfig | grep PROMISC

D.

show promisc

Which of the following tools is a wireless sniffer and analyzer that works on the Windows operating system?

A.

Kismet

B.

Airsnort

C.

Void11

D.

Aeropeek

Which of the following statements best describes the consequences of the disaster recovery plan test?

A.

If no deficiencies were found during the test, then the plan is probably perfect.

B.

The results of the test should be kept secret.

C.

The plan should not be changed no matter what the results of the test would be.

D.

If no deficiencies were found during the test, then the test was probably flawed.

Which of the following tools is used to locate lost files and partitions to restore data from a formatted, damaged, or lost partition in Windows and Apple Macintosh computers?

A.

Easy-Undelete

B.

File Scavenger

C.

Recover4all Professional

D.

VirtualLab

Which of the following statements about the compression feature of the NTFS file system are true?

Each correct answer represents a complete solution. Choose two.

A.

Users can work with NTFS-compressed files without decompressing them.

B.

It supports compression only on volumes.

C.

Compressed files on an NTFS volume can be read and written by any Windows-based application after they are decompressed.

D.

It supports compression on volumes, folders, and files.

You work as a Network Administrator for Net World International. You want to configure a Windows 2000 computer to dual boot with Windows 98. The hard disk drive of the computer will be configured as a single partition drive. Which of the following file systems will you use to accomplish this?

A.

NTFS

B.

HPFS

C.

FAT16

D.

FAT32

Adam works as a professional Computer Hacking Forensic Investigator. A project has been assigned to him to investigate and examine drive image of a compromised system, which is suspected to be used in cyber crime. Adam uses Forensic Sorter to sort the contents of hard drive in different categories. Which of the following type of image formats is NOT supported by Forensic Sorter?

A.

PFR image file

B.

iso image file

C.

RAW image file

D.

EnCase image file