Q: 1
What is the first step that needs to be carried out to crack the password?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 2
Operating System logs are most beneficial for Identifying or Investigating suspicious activities
involving a particular host. Which of the following Operating System logs contains information about
operational actions performed by OS components?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 3
Deposition enables opposing counsel to preview an expert witness's testimony at trial. Which of the
following deposition is not a standard practice?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 4
Email archiving is a systematic approach to save and protect the data contained in emails so that it
can tie easily accessed at a later date.
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 5
You have been given the task to investigate web attacks on a Windows-based server.
Which of the following commands will you use to look at which sessions the machine has opened
with other systems?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 6
Wireless access control attacks aim to penetrate a network by evading WLAN access control
measures, such as AP MAC filters and Wi-Fi port access controls.
Which of the following wireless access control attacks allows the attacker to set up a rogue access
point outside the corporate perimeter, and then lure the employees of the organization to connect to
it?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 7
TCP/IP (Transmission Control Protocol/Internet Protocol) is a communication protocol used to
connect different hosts in the Internet. It contains four layers, namely the network interface layer.
Internet layer, transport layer, and application layer.
Which of the following protocols works under the transport layer of TCP/IP?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 8
FAT32 is a 32-bit version of FAT file system using smaller clusters and results in efficient storage
capacity. What is the maximum drive size supported?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 9
Data acquisition system is a combination of tools or processes used to gather, analyze and record
Information about some phenomenon. Different data acquisition system are used depends on the
location, speed, cost. etc. Serial communication data acquisition system is used when the actual
location of the data is at some distance from the computer. Which of the following communication
standard is used in serial communication data acquisition system?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 10
Which of the following network attacks refers to sending huge volumes of email to an address in an
attempt to overflow the mailbox, or overwhelm the server where the email address is hosted, to
cause a denial-of-service attack?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Question 1 of 20 · Page 1 / 2