CF Quiz 4

CF Quiz 4

Assessment

Quiz

Computers

Professional Development

Hard

Created by

Om Das

Used 1+ times

FREE Resource

Student preview

quiz-placeholder

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Data is striped at a byte level across multiple drives, and parity information is distributed among all member drives. What RAID level is represented here?

RAID Level 0

RAID Level 1

RAID Level 5

RAID Level 3

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An investigator is checking a Cisco firewall log that reads as follows: Aug 21 2019 09:16:44: %ASA-1-106021: Deny ICMP reverse path check from 10.0.0.44 to 10.0.0.33 on interface outside. What does %ASA-1-106021 denote?

Type of request

Mnemonic message

Firewall action

Type of traffic

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A forensic examiner encounters a computer with a failed OS installation and the master boot record (MBR) or partition sector damaged. Which of the following tools can find and restore files and information in the disk?

Wireshark

Helix

R-Studio

NetCat

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

"To ensure that the digital evidence is collected, preserved, examined, or transferred in a manner safeguarding the accuracy and reliability of the evidence, law enforcement, and forensics organizations must establish and maintain an effective quality system" is a principle established by:

NCIS

EC-Council

NIST

SWGDE

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Jacob, a cybercrime investigator, joined a forensics team to participate in a criminal case involving digital evidence. After the investigator collected all the evidence and presents it to the court, the judge dropped the case and the defense attorney pressed charges against Jacob and the rest of the forensics team for unlawful search and seizure. What forensics privacy issue was not addressed prior to collecting the evidence?

None of these

Compliance with the Third Amendment of the U.S. Constitution

Compliance with the Fourth Amendment of the U.S. Constitution

Compliance with the Second Amendment of the U.S. Constitution

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

While collecting active transaction logs using SQL Server Management Studio, the query Select * from ::fn_dblog(NULL, NULL) displays the active portion of the transaction log file. Here, what does assigning NULL values imply?

Start and end points for log sequence numbers are zero

Start and end points for log files are zero

Start and end points for log sequence numbers are not specified

Start and end points for log files are not specified

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

For the purpose of preserving the evidentiary chain of custody, which of the following labels is not appropriate?

General description of the evidence

SSN of the person collecting the evidence

Exact location the evidence was collected from

Relevant circumstances surrounding the collection

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?