00:00

QUESTION 61

- (Exam Topic 4)
On NTFS file system, which of the following tools can a forensic Investigator use In order to identify timestomping of evidence files?

Correct Answer: D

QUESTION 62

- (Exam Topic 1)
George is the network administrator of a large Internet company on the west coast. Per corporate policy, none of the employees in the company are allowed to use FTP or SFTP programs without obtaining approval from the IT department. Few managers are using SFTP program on their computers. Before talking to his boss, George wants to have some proof of their activity. George wants to use Ethereal to monitor network traffic, but only SFTP traffic to and from his network.
What filter should George use in Ethereal?

Correct Answer: D

QUESTION 63

- (Exam Topic 1)
If a suspect computer is located in an area that may have toxic chemicals, you must:

Correct Answer: A

QUESTION 64

- (Exam Topic 4)
SO/IEC 17025 is an accreditation for which of the following:

Correct Answer: C

QUESTION 65

- (Exam Topic 1)
Frank is working on a vulnerability assessment for a company on the West coast. The company hired Frank to assess its network security through scanning, pen tests, and vulnerability assessments. After discovering numerous known vulnerabilities detected by a temporary IDS he set up, he notices a number of items that show up as unknown but Questionable in the logs. He looks up the behavior on the Internet, but cannot find anything related. What organization should Frank submit the log to find out if it is a new vulnerability or not?

Correct Answer: C