View Mode
Q: 11
The Counterfeit Access Device and Computer Fraud and Abuse Act of 1986 was designed to do the following except:
Options
Q: 12
Identify the statement below that best supports the term 'Rootkit':
Options
Q: 13
The following log is an example of :
Options
Q: 14
It is critical during court testimony to have:
Options
Q: 15
During an incident, an incident response team springs into action. What is one of the first steps the team will take?
Options
Q: 16
Stone stepping or server hopping is the technique of hackers to mask their source identity.
Options
Q: 17
Once a file has been removed from a Microsoft XP trashcan, the file is not recoverable
Options
Q: 18
As a private CIFI investigator, you are not required to conduct your investigations according to the law as you are not an agent of the state.
Options
Q: 19
The IISFA will revoke the certification of a CIFI if an ethic violation of a CIFI is reported and confirmed.
Options
Q: 20
Slack space is space not used within a partition of a hard drive.
Options
Question 11 of 20 · Page 2 / 2

Premium Access Includes

  • Quiz Simulator
  • Exam Mode
  • Progress Tracking
  • Question Saving
  • Flash Cards
  • Drag & Drops
  • 3 Months Access
  • PDF Downloads
Get Premium Access
Scroll to Top

FLASH OFFER

Days
Hours
Minutes
Seconds

avail 10% DISCOUNT on YOUR PURCHASE