00:00

QUESTION 26

- (Exam Topic 3)
What malware analysis operation can the investigator perform using the jv16 tool?

Correct Answer: D

QUESTION 27

- (Exam Topic 1)
You are a computer forensics investigator working with local police department and you are called to assist in an investigation of threatening emails. The complainant has printer out 27 email messages from the suspect and gives the printouts to you. You inform her that you will need to examine her computer because you need access to the in order to track the emails back to the suspect.

Correct Answer: D

QUESTION 28

- (Exam Topic 4)
The information security manager at a national legal firm has received several alerts from the intrusion detection system that a known attack signature was detected against the organization's file server. What should the information security manager do first?

Correct Answer: C

QUESTION 29

- (Exam Topic 1)
If you see the files Zer0.tar.gz and copy.tar.gz on a Linux system while doing an investigation, what can you conclude?

Correct Answer: D

QUESTION 30

- (Exam Topic 2)
What must an investigator do before disconnecting an iPod from any type of computer?

Correct Answer: A