Join the discussion
Question 1/139
Which of the following is a nonvolatile form of memory that can be reprogrammed by using a special programming device, and need not to be removed from the PC to be reprogrammed?
Correct Answer: E
Add Comments
- Other Question (139q)
- Q1. Which of the following is a nonvolatile form of memory that can be reprogrammed by using a...
- Q2. Which of the following tools works by using standard set of MS-DOS commands and can create...
- Q3. Which of the following is a documentation of guidelines that computer forensics experts us...
- Q4. Which of the following two cryptography methods are used by NTFS Encrypting File System (E...
- Q5. Sandra, a novice computer user, works on Windows environment. She experiences some problem...
- Q6. Which of the following methods can be used to start the Disk Defragmenter utility in Windo...
- Q7. John, a novice web user, makes a new E-mail account and keeps his password as "apple", his...
- Q8. Which of the following types of virus makes changes to a file system of a disk?...
- Q9. Which of the following types of attack can guess a hashed password?...
- Q10. In the United States, Title VII of the 1964 Civil Rights Act was formulated to protect an ...
- Q11. By gaining full control of router, hackers often acquire full control of the network. Whic...
- Q12. SIMULATION Fill in the blank with the appropriate file system. Alternate Data Streams (ADS...
- Q13. Which of the following Windows XP system files handles memory management, I/O operations, ...
- Q14. Which of the following U.S. Federal laws addresses computer crime activities in communicat...
- Q15. Your Windows XP hard drive has 2 partitions. The system partition is NTFS and the other is...
- Q16. Mark works as a Network Administrator for Net Perfect Inc. The company has a Linux-based n...
- Q17. Victor is a novice Ethical Hacker. He is learning the hacking process, i.e., the steps tak...
- Q18. On which of the following locations does the Windows NT/2000 operating system contain the ...
- Q19. Which of the following representatives of incident response team takes forensic backups of...
- Q20. You are the Security Consultant and have been hired to check security for a client's netwo...
- Q21. Mark is the Administrator of a Linux computer. He wants to check the status of failed Teln...
- Q22. Which of the following is the process of comparing cryptographic hash functions of system ...
- Q23. Which of the following tools can be used to perform tasks such as Windows password crackin...
- Q24. Which of the following firewalls depends on the three-way handshake of the TCP protocol?...
- Q25. On which of the following locations does the Windows NT/2000 operating system contain the ...
- Q26. Based on the case study, to implement more security, which of the following additional tec...
- Q27. Which of the following is used to store configuration settings and options on Microsoft Wi...
- Q28. Victor is a novice Ethical Hacker. He is learning the hacking process, i.e., the steps tak...
- Q29. Which of the following standard technologies is not used to interface hard disk with the c...
- Q30. Nathan works as a Computer Hacking Forensic Investigator for SecureEnet Inc. He uses Visua...
- Q31. Which of the following switches of the XCOPY command copies attributes while copying files...
- Q32. Which of the following directories cannot be placed out of the root filesystem? Each corre...
- Q33. Which of the following graphical tools is used to navigate through directory structures?...
- Q34. Which of the following tools is used to block email, Instant Message, Web site, or other m...
- Q35. You work as a Network Administrator for NetTech Inc. The company's network is connected to...
- Q36. Which of the following types of attacks cannot be prevented by technical measures only?...
- Q37. John works as a professional Ethical Hacker. He has been assigned a project to test the se...
- Q38. Which of the following are known as the three laws of OPSEC? Each correct answer represent...
- Q39. Which of the following prevents malicious programs from attacking a system?...
- Q40. John works as a professional Ethical Hacker. He has been assigned the project of testing t...
- Q41. You work as a Network Administrator for Net Perfect Inc. The company has a Windows Server ...
- Q42. An attacker attempts to gain information about a network by specifically targeting the net...
- Q43. Adam works as a Security Administrator for Umbrella Inc. He is responsible for securing al...
- Q44. Victor works as a professional Ethical Hacker for SecureEnet Inc. He has been assigned a j...
- Q45. Which of the following directories in Linux operating system contains device files, which ...
- Q46. Which of the following precautionary steps are taken by the supervisors or employers to av...
- Q47. Which of the following firewalls depends on the three-way handshake of the TCP protocol?...
- Q48. You are the Network Administrator and your company has recently implemented encryption for...
- Q49. Which of the following types of evidence is considered as the best evidence?...
- Q50. What is the name of the Secondary IDE slave, fourth partition in Linux operating system ac...
- Q51. Adam works as a Computer Hacking Forensic Investigator in a law firm. He has been assigned...
- Q52. Which of the following file systems is designed by Sun Microsystems?...
- Q53. You work as a Network Administrator for NetTech Inc. To ensure the security of files, you ...
- Q54. Which of the following precautionary steps are taken by the supervisors or employers to av...
- Q55. Adam works as a professional Computer Hacking Forensic Investigator. A project has been as...
- Q56. Which of the following is a correct sequence of different layers of Open System Interconne...
- Q57. Which of the following statements about the compression feature of the NTFS file system ar...
- Q58. Which of the following file systems provides integrated security?...
- Q59. You work as a Network Administrator for Peach Tree Inc. The company currently has a FAT-ba...
- Q60. Which of the following directories contains administrative commands and daemon processes i...
- Q61. Mark works as a security manager for SofTech Inc. He is using a technique for monitoring w...
- Q62. Mark is the Administrator of a Linux computer. He wants to check the status of failed Teln...
- Q63. In which of the following security tests does the security testing team simulate as an emp...
- Q64. Adam works as a Security Administrator for Umbrella Technology Inc. He reported a breach i...
- Q65. Adam works as a professional Computer Hacking Forensic Investigator. A project has been as...
- Q66. Adam works as a professional Computer Hacking Forensic Investigator, a project has been as...
- Q67. Which of the following statements is true for a file in the UNIX operating system?...
- Q68. You work as a Network Administrator for Perfect Solutions Inc. You have to install Windows...
- Q69. Which of the following Acts enacted in United States allows the FBI to issue National Secu...
- Q70. John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-b...
- Q71. On your dual booting computer, you want to set Windows 98 as the default operating system ...
- Q72. John is a black hat hacker. FBI arrested him while performing some email scams. Under whic...
- Q73. An organization wants to mitigate the risks associated with the lost or stolen laptops and...
- Q74. Which of the following log files are used to collect evidences before taking the bit-strea...
- Q75. Adam works as a professional Computer Hacking Forensic Investigator. He works with the loc...
- Q76. Which of the following tools is a wireless sniffer and analyzer that works on the Windows ...
- Q77. You work as a Network Administrator for NetTech Inc. To ensure the security of files, you ...
- Q78. Which of the following file systems contains hardware settings of a Linux computer?...
- Q79. Which of the following needs to be documented to preserve evidences for presentation in co...
- Q80. Which of the following terms refers to a mechanism which proves that the sender really sen...
- Q81. Which of the following is a set of exclusive rights granted by a state to an inventor or h...
- Q82. Sandra wants to create a full system state backup of her computer, which is running on Mic...
- Q83. John works as a professional Ethical Hacker. He has been assigned the task of testing the ...
- Q84. Which of the following standard technologies is not used to interface hard disk with the c...
- Q85. John works as a professional Ethical Hacker. He is assigned a project to test the security...
- Q86. Which of the following tools can be used to perform a whois query? Each correct answer rep...
- Q87. John works as a Technical Support Executive in ABC Inc. The company's network consists of ...
- Q88. Which of the following is a correct sequence of different layers of Open System Interconne...
- Q89. You work as a Network Administrator for a bank. For securing the bank's network, you confi...
- Q90. Which of the following file systems are supported by Windows 2000 operating systems? Each ...
- Q91. Peter, an expert computer user, attached a new sound card to his computer. He then restart...
- Q92. Which of the following are the benefits of information classification for an organization?...
- Q93. In which of the following access control models can a user not grant permissions to other ...
- Q94. Which of the following are advantages of NTFS file system over FAT32 and FAT? Each correct...
- Q95. Which of the following involves changing data prior to or during input to a computer in an...
- Q96. You are the Security Consultant and have been hired to check security for a client's netwo...
- Q97. Which of the following directories contains administrative commands on a UNIX computer?...
- Q98. Which of the following tools is used to extract human understandable interpretation from t...
- Q99. In which of the following security tests does the security testing team simulate as an emp...
- Q100. Adam, a malicious hacker has successfully gained unauthorized access to the Linux system o...
- Q101. You want to retrieve information whether your system is in promiscuous mode or not. Which ...
- Q102. Which of the following Windows XP system files handles memory management, I/O operations, ...
- Q103. Which of the following tools works by using standard set of MS-DOS commands and can create...
- Q104. Sandra, an expert computer user, hears five beeps while booting her computer that has AMI ...
- Q105. Which of the following types of evidence is considered as the best evidence?...
- Q106. Which of the following is the Windows feature on which the file management can be performe...
- Q107. You work as a Network Administrator for Tech Perfect Inc. The company has a Linux-based ne...
- Q108. You work as a Network Administrator for Blue Well Inc. Your company's network has a Window...
- Q109. What is the name of the group of blocks which contains information used by the operating s...
- Q110. Which of the following is the first computer virus that was used to infect the boot sector...
- Q111. John works as a Network Administrator for DigiNet Inc. He wants to investigate failed logo...
- Q112. Your network has a Windows 2000 Server computer with FAT file system, shared by several us...
- Q113. Which of the following tools are used to determine the hop counts of an IP packet? Each co...
- Q114. Which of the following provides high availability of data?...
- Q115. Which of the following is the correct order of digital investigations Standard Operating P...
- Q116. You work as a Network Administrator for uCertify Inc. You want to edit the MSDOS.SYS file,...
- Q117. Which of the following laws enacted in United States makes it illegal for an Internet Serv...
- Q118. Adam works as a Computer Hacking Forensic Investigator. He has been assigned a project to ...
- Q119. Which of the following tools can be used to perform tasks such as Windows password crackin...
- Q120. Which of the following Linux file systems is a journaled file system?...
- Q121. John works as a contract Ethical Hacker. He has recently got a project to do security chec...
- Q122. Which of the following NIST RA process steps has the goal to identify the potential threat...
- Q123. This type of virus infects programs that can execute and load into memory to perform prede...
- Q124. Adam works as a professional Computer Hacking Forensic Investigator. He works with the loc...
- Q125. Which of the following describes software technologies that improve portability, manageabi...
- Q126. Which of the following laws or acts, formed in Australia, enforces prohibition against cyb...
- Q127. Which of the following files starts the initialization process in booting sequence of the ...
- Q128. You are handling technical support calls for an insurance company. A user calls you compla...
- Q129. You are reviewing a Service Level Agreement between your company and a Web development ven...
- Q130. Which of the following encryption methods uses AES technology?...
- Q131. Which of the following statements about registry is true? Each correct answer represents a...
- Q132. Which of the following tools is used to locate lost files and partitions to restore data f...
- Q133. Which of the following tools is a wireless sniffer and analyzer that works on the Windows ...
- Q134. Adam works as a professional Penetration tester. A project has been assigned to him to emp...
- Q135. Which of the following is the process of overwriting all addressable locations on a disk?...
- Q136. Convention on Cybercrime, created by the Council of Europe, is the treaty seeking to addre...
- Q137. In 2001, the Council of Europe passed a convention on cybercrime. It was the first interna...
- Q138. Which of the following is used to authenticate asymmetric keys?...
- Q139. Which of the following types of firewall functions at the Session layer of OSI model?...
