لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
What is the smallest physical storage unit on a hard drive?
A. Track
B. Cluster
C. Sector
D. Platter
عرض الإجابة
اجابة صحيحة: C
السؤال #2
What must be obtained before an investigation is carried out at a location?
A. Search warrant
B. Subpoena
C. Habeas corpus
D. Modus operandi
عرض الإجابة
اجابة صحيحة: A
السؤال #3
What happens when a file is deleted by a Microsoft operating system using the FAT file system?
A. The file is erased and cannot be recovered
B. The file is erased but can be recovered partially
C. A copy of the file is stored and the original file is erased
D. Only the reference to the file is removed from the FAT and can be recovered
عرض الإجابة
اجابة صحيحة: D
السؤال #4
P0P3 (Post Office Protocol 3) is a standard protocol for receiving email that deletes mail on the server as soon as the user downloads it. When a message arrives, the POP3 server appends it to the bottom of the recipient's account file, which can be retrieved by the email client at any preferred time. Email client connects to the POP3 server at _______________by default to fetch emails.
A. Port 123
B. Port 109
C. Port 115
D. Port 110
عرض الإجابة
اجابة صحيحة: D
السؤال #5
Which of the following is not a part of the technical specification of the laboratory-based imaging system?
A. High performance workstation PC
B. very low image capture rate
C. Remote preview and imaging pod
D. Anti-repudiation techniques
عرض الإجابة
اجابة صحيحة: B
السؤال #6
Under confession, an accused criminal admitted to encrypting child pornography pictures and then hiding them within other pictures. What technique did the accused criminal employ?
A. Typography
B. Steganalysis
C. Picture encoding
D. Steganography
عرض الإجابة
اجابة صحيحة: D
السؤال #7
Which of the following password cracking techniques works like a dictionary attack, but adds some numbers and symbols to the words from the dictionary and tries to crack the password?
A. Syllable attack
B. Rule-based attack
C. Hybrid attack
D. Brute forcing attack
عرض الإجابة
اجابة صحيحة: C
السؤال #8
What term is used to describe a cryptographic technique for embedding information into something else for the sole purpose of hiding that information from the casual observer?
A. Key escrow
B. Steganography
C. Rootkit
D. Offset
عرض الإجابة
اجابة صحيحة: B
السؤال #9
What technique used by Encase makes it virtually impossible to tamper with evidence once it has been acquired?
A. Every byte of the file(s) is given an MD5 hash to match against a master file
B. Every byte of the file(s) is verified using 32-bit CRC
C. Every byte of the file(s) is copied to three different hard drives
D. Every byte of the file(s) is encrypted using three different methods
عرض الإجابة
اجابة صحيحة: B
السؤال #10
The efforts to obtain information before a trial by demanding documents, depositions, questions and answers written under oath, written requests for admissions of fact, and examination of the scene is a description of what legal term?
A. Detection
B. Hearsay
C. Spoliation
D. Discovery
عرض الإجابة
اجابة صحيحة: D
السؤال #11
Heather, a computer forensics investigator, is assisting a group of investigators working on a large computer fraud case involving over 20 people. These 20 people, working in different offices, allegedly siphoned off money from many different client accounts. Heather responsibility is to findThese 20 people, working in different offices, allegedly siphoned off money from many different client accounts. Heather? responsibility is to find out how the accused people communicated between each other. She has sea
A. Grill cipher
B. Null cipher
C. Text semagram
D. Visual semagram
عرض الإجابة
اجابة صحيحة: A
السؤال #12
Email archiving is a systematic approach to save and protect the data contained in emails so that it can be accessed fast at a later date. There are two main archive types, namely Local Archive and Server Storage Archive. Which of the following statements is correct while dealing with local archives?
A. Server storage archives are the server information and settings stored on a local system whereas the local archives are the local email client information stored on the mail server
B. Local archives do not have evidentiary value as the email client may alter the message data
C. Local archives should be stored together with the server storage archives in order to be admissible in a court of law
D. It is difficult to deal with the webmail as there is no offline archive in most cases
عرض الإجابة
اجابة صحيحة: D
السؤال #13
What hashing method is used to password protect Blackberry devices?
A. AES
B. RC5
C. MD5
D. SHA-1
عرض الإجابة
اجابة صحيحة: D
السؤال #14
What is a first sector ("sector zero") of a hard disk?
A. Master boot record
B. System boot record
C. Secondary boot record
D. Hard disk boot record
عرض الإجابة
اجابة صحيحة: A
السؤال #15
Travis, a computer forensics investigator, is finishing up a case he has been working on for over a month involving copyright infringement and embezzlement. His last task is to prepare an investigative report for the president of the company he has been working for. Travis must submit a hard copy and an electronic copy to this president. In what electronic format should Travis send this report?
A. TIFF-8
B. DOC
C. WPD
D. PDF
عرض الإجابة
اجابة صحيحة: D

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: