- (Topic 3)
What is a good security method to prevent unauthorized users from "tailgating"?
Correct Answer:
C
- (Topic 3)
You are trying to locate Microsoft Outlook Web Access Default Portal using Google search on the Internet. What search string will you use to locate them?
Correct Answer:
A
- (Topic 3)
When investigating a Windows System, it is important to view the contents of the page or swap file because:
Correct Answer:
C
- (Topic 3)
Profiling is a forensics technique for analyzing evidence with the goal of identifying the perpetrator from their various activity. After a computer has been compromised by a hacker, which of the following would be most important in forming a profile of the incident?
Correct Answer:
B
- (Topic 1)
A mobile operating system is the operating system that operates a mobile device like a mobile phone, smartphone, PDA, etc. It determines the functions and features available on mobile devices such as keyboards, applications, email, text messaging, etc. Which of the following mobile operating systems is free and open source?
Correct Answer:
B