
CHFI new part 2
Authored by Hoàng Trần
Computers
Professional Development
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
120 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What technique is used by JPEGs for compression?
ZIP
TCD
DCT
TIFF-8
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
When using an iPod and the host computer is running Windows, what file system will be used?
iPod+
HFS
FAT16
FAT32
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Smith is an IT technician that has been appointed to his company's network vulnerability assessment team. He is the only IT employee on the team. The other team members include employees from Accounting, Management, Shipping, and Marketing. Smith and the team members are having their first meeting to discuss how they will proceed. What is the first step they should do to create the network vulnerability assessment plan?
Their first step is to make a hypothesis of what their final findings will be.
Their first step is to create an initial Executive report to show the management team.
Their first step is to analyze the data they have currently gathered from the company or interviews.
Their first step is the acquisition of required documents, reviewing of security policies and compliance.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You have used a newly released forensic investigation tool, which doesn't meet the Daubert Test, during a case. The case has ended-up in court. What argument could the defense make to weaken your case?
The tool hasn't been tested by the International Standards Organization (ISO)
Only the local law enforcement should use the tool
The total has not been reviewed and accepted by your peers
You are not certified for using the tool
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You are assisting a Department of Defense contract company to become compliant with the stringent security policies set by the DoD. One such strict rule is that firewalls must only allow incoming connections that were first initiated by internal computers. What type of firewall must you implement to abide by this policy?
Packet filtering firewall
Circuit-level proxy firewall
Application-level proxy firewall
Stateful firewall
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You work as an IT security auditor hired by a law firm in Boston to test whether you can gain access to sensitive information about the company clients. You have rummaged through their trash and found very little information. You do not want to set off any alarms on their network, so you plan on performing passive foot printing against their Web servers. What tool should you use?
Ping sweep
Nmap
Netcraft
Dig
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
While looking through the IIS log file of a web server, you find the following entries: What is evident from this log file?
Web bugs
Cross site scripting
Hidden fields
SQL injection is possible
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?