- (Exam Topic 2)
Which of the following technique creates a replica of an evidence media?
Correct Answer:C
- (Exam Topic 3)
Which among the following U.S. laws requires financial institutions—companies that offer consumers financial products or services such as loans, financial or investment advice, or insurance—to protect their customers’ information against security threats?
Correct Answer:C
- (Exam Topic 1)
When performing a forensics analysis, what device is used to prevent the system from recording data on an evidence disk?
Correct Answer:A
- (Exam Topic 1)
Jessica works as systems administrator for a large electronics firm. She wants to scan her network quickly to detect live hosts by using ICMP ECHO Requests. What type of scan is Jessica going to perform?
Correct Answer:D
- (Exam Topic 1)
Office Documents (Word, Excel and PowerPoint) contain a code that allows tracking the MAC or unique identifier of the machine that created the document. What is that code called?
Correct Answer:A