CHFI new part 2

CHFI new part 2

Professional Development

120 Qs

quiz-placeholder

Similar activities

Scrum

Scrum

Professional Development

115 Qs

MOC20345

MOC20345

Professional Development

119 Qs

mca introduction

mca introduction

Professional Development

120 Qs

Generative AI Quiz

Generative AI Quiz

Professional Development

125 Qs

Gestión Tecnologica 2

Gestión Tecnologica 2

Professional Development

125 Qs

CHFI new part 2

CHFI new part 2

Assessment

Quiz

Computers

Professional Development

Medium

Created by

Hoàng Trần

Used 1+ times

FREE Resource

120 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What technique is used by JPEGs for compression?
ZIP
TCD
DCT
TIFF-8

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When using an iPod and the host computer is running Windows, what file system will be used?
iPod+
HFS
FAT16
FAT32

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Smith is an IT technician that has been appointed to his company's network vulnerability assessment team. He is the only IT employee on the team. The other team members include employees from Accounting, Management, Shipping, and Marketing. Smith and the team members are having their first meeting to discuss how they will proceed. What is the first step they should do to create the network vulnerability assessment plan?
Their first step is to make a hypothesis of what their final findings will be.
Their first step is to create an initial Executive report to show the management team.
Their first step is to analyze the data they have currently gathered from the company or interviews.
Their first step is the acquisition of required documents, reviewing of security policies and compliance.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You have used a newly released forensic investigation tool, which doesn't meet the Daubert Test, during a case. The case has ended-up in court. What argument could the defense make to weaken your case?
The tool hasn't been tested by the International Standards Organization (ISO)
Only the local law enforcement should use the tool
The total has not been reviewed and accepted by your peers
You are not certified for using the tool

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You are assisting a Department of Defense contract company to become compliant with the stringent security policies set by the DoD. One such strict rule is that firewalls must only allow incoming connections that were first initiated by internal computers. What type of firewall must you implement to abide by this policy?
Packet filtering firewall
Circuit-level proxy firewall
Application-level proxy firewall
Stateful firewall

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You work as an IT security auditor hired by a law firm in Boston to test whether you can gain access to sensitive information about the company clients. You have rummaged through their trash and found very little information. You do not want to set off any alarms on their network, so you plan on performing passive foot printing against their Web servers. What tool should you use?
Ping sweep
Nmap
Netcraft
Dig

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

While looking through the IIS log file of a web server, you find the following entries: What is evident from this log file?
Web bugs
Cross site scripting
Hidden fields
SQL injection is possible

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?