CHFI Module 6 Review

CHFI Module 6 Review

University

30 Qs

quiz-placeholder

Similar activities

DEO ASSESSMENT 4

DEO ASSESSMENT 4

University

25 Qs

CC102 - Seatwork 10

CC102 - Seatwork 10

University

25 Qs

Essentials of Information Technology(Public College Samana)

Essentials of Information Technology(Public College Samana)

University

25 Qs

Hardware Komputer

Hardware Komputer

10th Grade - University

26 Qs

CCC2 Chapter 1 - Introduction to Computers

CCC2 Chapter 1 - Introduction to Computers

University

25 Qs

ALGORITHMS AND FLOWCHARTS

ALGORITHMS AND FLOWCHARTS

9th Grade - University

25 Qs

IT ERA FINAL EXAM

IT ERA FINAL EXAM

University

25 Qs

Arsitektur von neumann, sistem operasi dan aplikasi

Arsitektur von neumann, sistem operasi dan aplikasi

10th Grade - University

25 Qs

CHFI Module 6 Review

CHFI Module 6 Review

Assessment

Quiz

Computers, Specialty

University

Medium

Created by

Karen Diggs

Used 48+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Windows Security Accounts Manager (SAM) is a registry file which stores passwords in a Hashed format. SAM file in Windows is located at:

C:\windows\system32\config\SAM

C:\windows\system32\Boot\SAM

C:\windows\system32\drivers\SAM

C:\windows\system32\con\SAM

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You can interact with the Registry through intermediate programs. Graphical user interface (GUI) Registry editors such as Regedit.exe or Regedt32.exe are commonly used as intermediate programs in Windows 7. Which of the following is a root folder of the registry editor?

HKEY-LOCAL_ADMIN

HKEY_CLASSES_ADMIN

HKEY_USERS

HKEY_CLASSES_SYSTEM

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When collecting evidence from RAM, where do you look for data?

SAM file

Data file

Swap file

Log file

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

n General, __________________ Involves the investigation of data that can be retrieved from the hard disk or other disks of a computer by applying scientific methods to retrieve the data.

Disaster Recovery

Data Recovery

Computer Forensics

Disaster Recovery

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Use the doskey/history command to see previously typed commands

True

False

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Non-volatile data changes when a system is shut down or unable to power up.

True

False

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Running the command dir /o:d enables an investigator to examine the time and date of an OS installation.

True

False

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?