00:00

QUESTION 61

- (Topic 3)
When investigating a potential e-mail crime, what is your first step in the investigation?

Correct Answer: A

QUESTION 62

- (Topic 2)
What happens when a file is deleted by a Microsoft operating system using the FAT file system?

Correct Answer: D

QUESTION 63

- (Topic 1)
Hash injection attack allows attackers to inject a compromised hash into a local session and use the hash to validate network resources.

Correct Answer: A

QUESTION 64

- (Topic 2)
What is the smallest physical storage unit on a hard drive?

Correct Answer: C

QUESTION 65

- (Topic 3)
Julia is a senior security analyst for Berber Consulting group. She is currently working on a contract for a small accounting firm in Florida. They have given her permission to perform social engineering attacks on the company to see if their in-house training did any good. Julia calls the main number for the accounting firm and talks to the receptionist. Julia says that she is an IT technician from the company's main office in Iowa. She states that she needs the receptionist's network username and password to troubleshoot a problem they are having. Julia says that Bill Hammond, the CEO of the company, reQuested this information. After hearing the name of the CEO, the receptionist gave Julia all the information she asked for. What principal of social engineering did Julia use?

Correct Answer: C