- (Exam Topic 1)
Harold is a security analyst who has just run the rdisk /s command to grab the backup SAM files on a computer. Where should Harold navigate on the computer to find the file?
Correct Answer:C
- (Exam Topic 2)
What hashing method is used to password protect Blackberry devices?
Correct Answer:D
- (Exam Topic 1)
How many characters long is the fixed-length MD5 algorithm checksum of a critical system file?
Correct Answer:C
- (Exam Topic 2)
Casey has acquired data from a hard disk in an open source acquisition format that allows her to generate compressed or uncompressed image files. What format did she use?
Correct Answer:B
- (Exam Topic 2)
Julie is a college student majoring in Information Systems and Computer Science. She is currently writing an essay for her computer crimes class. Julie paper focuses on white-collar crimes in America and how forensics investigators investigate the cases. Julie would like to focus the subject. Julie would like to focus the subject of the essay on the most common type of crime found in corporate America. What crime should Julie focus on?
Correct Answer:C