00:00

QUESTION 56

- (Exam Topic 2)
While searching through a computer under investigation, you discover numerous files that appear to have had the first letter of the file name replaced by the hex code byte 5h. What does this indicate on the computer?

Correct Answer: B

QUESTION 57

- (Exam Topic 2)
When a router receives an update for its routing table, what is the metric value change to that path?

Correct Answer: C

QUESTION 58

- (Exam Topic 2)
A small law firm located in the Midwest has possibly been breached by a computer hacker looking to obtain information on their clientele. The law firm does not have any on-site IT employees, but wants to search for evidence of the breach themselves to prevent any possible media attention. Why would this not be recommended?

Correct Answer: D

QUESTION 59

- (Exam Topic 2)
Before performing a logical or physical search of a drive in Encase, what must be added to the program?

Correct Answer: B

QUESTION 60

- (Exam Topic 4)
In which loT attack does the attacker use multiple forged identities to create a strong illusion of traffic congestion, affecting communication between neighboring nodes and networks?

Correct Answer: D