00:00

QUESTION 36

- (Topic 3)
What is kept in the following directory? HKLMSECURITYPolicySecrets

Correct Answer: B

QUESTION 37

- (Topic 3)
Jim performed a vulnerability analysis on his network and found no potential problems. He runs another utility that executes exploits against his system to verify the results of the vulnerability test. The second utility executes five known exploits against his network in which the vulnerability analysis said were not exploitable. What kind of results did Jim receive from his vulnerability analysis?

Correct Answer: A

QUESTION 38

- (Topic 3)
Windows identifies which application to open a file with by examining which of the following?

Correct Answer: A

QUESTION 39

- (Topic 1)
Ron. a computer forensics expert, Is Investigating a case involving corporate espionage. He has recovered several mobile computing devices from the crime scene. One of the evidence that Ron possesses is a mobile phone from Nokia that was left in on condition. Ron needs to recover the IMEI number of the device to establish the identity of the device owner. Which of the following key combinations he can use to recover the IMEI number?

Correct Answer: B

QUESTION 40

- (Topic 1)
Netstat is a tool for collecting Information regarding network connections. It provides a simple view of TCP and UDP connections, and their state and network traffic statistics.
Which of the following commands shows you the TCP and UDP network connections, listening ports, and the identifiers?

Correct Answer: A