Black Friday Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which of the following is NOT an example of passive footprinting?

A.

Querying the search engine.

B.

Analyzing job requirements.

C.

Scanning ports.

D.

Performing the whois query.

A customer comes to you stating that his hard drive has crashed. He had backed up the hard drive, but some files on it were encrypted with Windows Encrypted File System (EFS). What do you need to do to be able to give him access to those restored encrypted files?

A.

Nothing, they are unrecoverable.

B.

You need the encryption key. If that was not saved/backed up, then there is no chance of recovery.

C.

Nothing, when you restore, he will have access.

D.

You need to make sure that when you restore, you give the new machine the same user account so that he can open the encrypted files.

Which of the following Acts enacted in United States amends Civil Rights Act of 1964, providing technical changes affecting the length of time allowed to challenge unlawful seniority provisions, to sue the federal government for discrimination and to bring age discrimination claims?

A.

Sexual Predators Act

B.

Civil Rights Act of 1991

C.

PROTECT Act

D.

The USA Patriot Act of 2001

You work as a Network Administrator for NetTech Inc. The company's network is connected to the Internet. For security, you want to restrict unauthorized access to the network with minimum administrative effort. You want to implement a hardware-based solution. What will you do to accomplish this?

A.

Connect a brouter to the network.

B.

Implement firewall on the network.

C.

Connect a router to the network.

D.

Implement a proxy server on the network.

You work as a Network Administrator for Tech Perfect Inc. The company has a Linux-based network. Users complain that they are unable to access resources on the network. However, there was no such problem the previous day. They are receiving the following error messages regularly:

Unable to resolve host name

As your primary step for resolving the issue, which of the following services will you verify whether it is running or not?

A.

APACHE

B.

BIND

C.

SAMBA

D.

SQUID

Which of the following types of evidence is considered as the best evidence?

A.

The original document

B.

A copy of the original document

C.

A computer-generated record

D.

Information gathered through the witness's senses

Which of the following needs to be documented to preserve evidences for presentation in court?

A.

Separation of duties

B.

Incident response policy

C.

Chain of custody

D.

Account lockout policy

Which of the following functionality within the Autopsy browser is specifically designed to aid in case management?

A.

Hash database

B.

File listing

C.

Image integrity

D.

Keyword searches

Which of the following is a formula, practice, process, design, instrument, pattern, or compilation of information which is not generally known, but by which a business can obtain an economic advantage over its competitors?

A.

Copyright

B.

Utility model

C.

Cookie

D.

Trade secret

Which of the following tables is formed by NTFS file system to keep the track of files, to store metadata, and their location?

A.

The Master File Table

B.

The System File Table

C.

The Master Allocation Table

D.

The File Allocation Table