CHFI Prep

CHFI Prep

University

75 Qs

quiz-placeholder

Similar activities

TIN HỌC

TIN HỌC

University

75 Qs

РК1 с 1 ответом

РК1 с 1 ответом

University

75 Qs

ISPFL 2  - FINAL EXAM

ISPFL 2 - FINAL EXAM

University

80 Qs

NAGARA SCHOLARSHIP TEST

NAGARA SCHOLARSHIP TEST

University

70 Qs

English

English

University

75 Qs

Midterm Exam - ITEDEV - BSIS3A

Midterm Exam - ITEDEV - BSIS3A

University

70 Qs

Ағылшын 2 сим 1 модуль

Ағылшын 2 сим 1 модуль

University

75 Qs

CHFI Prep

CHFI Prep

Assessment

Quiz

Special Education, Professional Development, English

University

Hard

Created by

John Derulo

Used 18+ times

FREE Resource

75 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Sniffers that place NICs in prpmiscuous mode work at what layer of the OSI model?
Session
Network
Transport
Physical

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which list contains the most recent actions performed by a Windows User?
Windows Error Log
Activity
MRU
Recents

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Billy, a computer forensics expert, has recovered a large number of DBX files during the forensic investigation of a laptop. Which of the following email clients can he use to analyze the DBX files?
Eudora
Microsoft Outlook Express
Microsoft Outlook
Mozilla Thunderbird

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A small law firm located in the Midwest has possibly been breached by a computer hacker who was looking to obtain information on their clientele. The law firm does not have any on-site IT employees but wants to search for evidence of the breach themselves to prevent any possible media attention. Why would this not be recommended?
Searching for evidence themselves would not have any ill effects
Searching create cache files that would hinder the investigation
Searching could possibly crash the machine or device
Searching can change date/time stamps

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

The Recycle Bin exists as a metaphor for throwing files away, but it also allows a user to retrieve and restore files. Once the file is moved to the recycle bin, a record is added to the log file that exists in the Recycle Bin. Which of the following files contains records that correspond to each deleted file in the Recycle Bin?
INFO1
INFO2
LOGINFO2
LOGINFO1

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Stephen is checking an image using Compare Files by The Wizard, and he sees the file signature is shown as FF D8 FF El. What is the file type of the image?
Gif
Bmp
Png
Jpeg

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which rule requires an original to be provided to prove the content of a recording?
1003
1004
1005
1002

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?