Join the discussion
Question 1/170
Which of the following statements about an extended partition are true?
Each correct answer represents a complete solution. Choose two.
Each correct answer represents a complete solution. Choose two.
Correct Answer: C,D
Add Comments
- Other Question (170q)
- Q1. Which of the following statements about an extended partition are true? Each correct answe...
- Q2. Peter works as a Computer Hacking Forensic Investigator for SecureEnet Inc. He has been as...
- Q3. A customer comes to you stating that his hard drive has crashed. He had backed up the hard...
- Q4. On which of the following locations does the Windows NT/2000 operating system contain the ...
- Q5. Which of the following firewalls depends on the three-way handshake of the TCP protocol?...
- Q6. Which of the following tools works by using standard set of MS-DOS commands and can create...
- Q7. John works as a Network Administrator for DigiNet Inc. He wants to investigate failed logo...
- Q8. Which of the following file systems provides integrated security?...
- Q9. Which of the following registry hives stores information about the file extensions that ar...
- Q10. John works as a professional Ethical Hacker. He is assigned a project to test the security...
- Q11. You work as a Network Administrator for Perfect Solutions Inc. The company has a Linux-bas...
- Q12. Which of the following enables an inventor to legally enforce his right to exclude others ...
- Q13. Joseph works as a Software Developer for WebTech Inc. He wants to protect the algorithms a...
- Q14. You are working with a team that will be bringing in new computers to a sales department a...
- Q15. Which of the following are the primary goals of the incident handling team? Each correct a...
- Q16. Which of the following layers protocols handles file transfer and network management?...
- Q17. Which of the following statements is true for a file in the UNIX operating system?...
- Q18. Which of the following layers protocols handles file transfer and network management?...
- Q19. Which of the following files starts the initialization process in booting sequence of the ...
- Q20. Which of the following two cryptography methods are used by NTFS Encrypting File System (E...
- Q21. Adam works as a Security Administrator for Umbrella Technology Inc. He reported a breach i...
- Q22. You work as the Network Administrator for McNeil Inc. The company has a Unix-based network...
- Q23. The incident response team has turned the evidence over to the forensic team. Now, it is t...
- Q24. Which of the following is a documentation of guidelines that computer forensics experts us...
- Q25. Which of the following switches is used with Pslist command on the command line to show th...
- Q26. Which of the following is the correct order of digital investigations Standard Operating P...
- Q27. Which of the following file systems supports disk quotas?...
- Q28. An attacker attempts to gain information about a network by specifically targeting the net...
- Q29. Which of the following file systems is designed by Sun Microsystems?...
- Q30. Adam works as a professional Computer Hacking Forensic Investigator. A project has been as...
- Q31. Which of the following is used to back up forensic evidences or data folders from the netw...
- Q32. Which of the following articles defines illegal access to the computer or network in Chapt...
- Q33. Which of the following files contains the salted passwords in the Linux operating system?...
- Q34. The incident response team has turned the evidence over to the forensic team. Now, it is t...
- Q35. Which of the following are the benefits of information classification for an organization?...
- Q36. Which of the following is the Windows feature on which the file management can be performe...
- Q37. Which of the following types of virus makes changes to a file system of a disk?...
- Q38. You work as a Network Administrator for Net World International. You have configured the h...
- Q39. The promiscuous mode is a configuration of a network card that makes the card pass all tra...
- Q40. Which of the following commands is used to create or delete partitions on Windows XP?...
- Q41. You work as a Computer Hacking Forensic Investigator for SecureNet Inc. You want to invest...
- Q42. Which of the following protocols allows computers on different operating systems to share ...
- Q43. You work as a Network Administrator for Tech Perfect Inc. The company has a Linux-based ne...
- Q44. You work as a Forensic Investigator. Which of the following rules will you follow while wo...
- Q45. Adam works as a professional Computer Hacking Forensic Investigator. A project has been as...
- Q46. Which of the following statements about SD cards are true? Each correct answer represents ...
- Q47. Which of the following file systems is designed by Sun Microsystems?...
- Q48. Which of the following is used to store configuration settings and options on Microsoft Wi...
- Q49. In 2001, the Council of Europe passed a convention on cybercrime. It was the first interna...
- Q50. Which of the following tools can be used to perform a whois query? Each correct answer rep...
- Q51. Adam works as a professional Computer Hacking Forensic Investigator. A project has been as...
- Q52. Adam works as a professional Computer Hacking Forensic Investigator. A project has been as...
- Q53. Adam, a malicious hacker, hides a hacking tool from a system administrator of his company ...
- Q54. You work as a Network Administrator for a bank. For securing the bank's network, you confi...
- Q55. Which of the following tools is an asterisk password revealer tool?...
- Q56. Which of the following tools is a wireless sniffer and analyzer that works on the Windows ...
- Q57. Which of the following switches of the XCOPY command copies file ownerships and NTFS permi...
- Q58. Fill in the blank with the appropriate file system. Alternate Data Streams (ADS) is a feat...
- Q59. Which of the following log files are used to collect evidences before taking the bit-strea...
- Q60. Which of the following commands is used to enforce checking of a file system even if the f...
- Q61. On which of the following locations does the Windows NT/2000 operating system contain the ...
- Q62. In which of the following security tests does the security testing team simulate as an emp...
- Q63. John works as a Technical Support Executive in ABC Inc. The company's network consists of ...
- Q64. John works as a professional Ethical Hacker. He has been assigned the project of testing t...
- Q65. Adam works as a professional Computer Hacking Forensic Investigator with the local police ...
- Q66. Which of the following are the benefits of information classification for an organization?...
- Q67. Which of the following statements are true about Compact Disc (CD) and Digital Versatile D...
- Q68. Which two technologies should research groups use for secure VPN access while traveling? (...
- Q69. Sandra, a novice computer user, works on Windows environment. She experiences some problem...
- Q70. Which of the following is a correct sequence of different layers of Open System Interconne...
- Q71. Mark is the Administrator of a Linux computer. He wants to check the status of failed Teln...
- Q72. Mark works as a Network administrator for SecureEnet Inc. His system runs on Mac OS X. He ...
- Q73. Adam works as a Computer Hacking Forensic Investigator in a law firm. He has been assigned...
- Q74. Which of the following directories in Linux operating system contains device files, which ...
- Q75. Which of the following types of computers is used for attracting potential intruders?...
- Q76. Sandra wants to create a full system state backup of her computer, which is running on Mic...
- Q77. John works as a Network Security Professional. He is assigned a project to test the securi...
- Q78. Which of the following modules of OS X kernel (XNU) provides the primary system program in...
- Q79. Which of the following is the initiative of United States Department of Justice, which pro...
- Q80. Which of the following statements best describes the consequences of the disaster recovery...
- Q81. Which of the following is the correct order of digital investigations Standard Operating P...
- Q82. Which of the following evidences are the collection of facts that, when considered togethe...
- Q83. John works as a Technical Support Executive in ABC Inc. The company's network consists of ...
- Q84. Adam, a malicious hacker, hides a hacking tool from a system administrator of his company ...
- Q85. Which of the following statements is true for a file in the UNIX operating system?...
- Q86. Which of the following is the first computer virus that was used to infect the boot sector...
- Q87. Which of the following types of evidence proves or disproves a specific act through oral t...
- Q88. You work as the Network Administrator for McNeil Inc. The company has a Unix-based network...
- Q89. In which of the following files does the Linux operating system store passwords?...
- Q90. Which of the following is the process of overwriting all addressable locations on a disk?...
- Q91. Adam works as a professional Computer Hacking Forensic Investigator, a project has been as...
- Q92. You work as a Web developer for ABC Inc. You want to investigate the Cross-Site Scripting ...
- Q93. In which of the following files does the Linux operating system store passwords?...
- Q94. Which of the following tools is used to locate lost files and partitions to restore data f...
- Q95. You work as a Network Administrator for Peach Tree Inc. The company currently has a FAT-ba...
- Q96. You work as a Network Administrator for Perfect Solutions Inc. You have to install Windows...
- Q97. You are the Security Consultant working with a client who uses a lot of outdated systems. ...
- Q98. Which of the following needs to be documented to preserve evidences for presentation in co...
- Q99. Which of the following prevents malicious programs from attacking a system?...
- Q100. You work as a Network Administrator for McNeel Inc. You want to encrypt each user's MY DOC...
- Q101. Which of the following graphical tools is used to navigate through directory structures?...
- Q102. A Web-based credit card company had collected financial and personal details of Mark befor...
- Q103. Adam works as a professional Computer Hacking Forensic Investigator. He has been assigned ...
- Q104. The promiscuous mode is a configuration of a network card that makes the card pass all tra...
- Q105. By gaining full control of router, hackers often acquire full control of the network. Whic...
- Q106. Which of the following two cryptography methods are used by NTFS Encrypting File System (E...
- Q107. Which of the following cryptographic methods are used in EnCase to ensure the integrity of...
- Q108. A customer comes to you stating that his hard drive has crashed. He had backed up the hard...
- Q109. Maria works as a professional Ethical Hacker. She recently got a project to test the secur...
- Q110. John works as a professional Ethical Hacker. He has been assigned a project to test the se...
- Q111. Which of the following uses hard disk drive space to provide extra memory for a computer?...
- Q112. Adam works as an Incident Handler for Umbrella Inc. He is informed by the senior authoriti...
- Q113. Adam works as an Incident Handler for Umbrella Inc. He is informed by the senior authoriti...
- Q114. Which of the following file systems supports the hot fixing feature?...
- Q115. Brutus is a password cracking tool that can be used to crack the following authentications...
- Q116. Which of the following types of evidence proves or disproves a specific act through oral t...
- Q117. Which of the following is a name, symbol, or slogan with which a product is identified?...
- Q118. Which of the following IP addresses are private addresses? Each correct answer represents ...
- Q119. Which of the following statements are true about Compact Disc (CD) and Digital Versatile D...
- Q120. John works as a contract Ethical Hacker. He has recently got a project to do security chec...
- Q121. Joseph works as a Software Developer for WebTech Inc. He wants to protect the algorithms a...
- Q122. Adam works as a professional Computer Hacking Forensic Investigator with the local police ...
- Q123. You work as a Network Administrator for uCertify Inc. You want to edit the MSDOS.SYS file,...
- Q124. Which of the following is used for remote file access by UNIX/Linux systems?...
- Q125. You want to change the attribute of a file named ACE.TXT to Hidden. Which command line wil...
- Q126. Which of the following tools are used for footprinting? Each correct answer represents a c...
- Q127. Which of the following diagnostic codes sent by POST to the internal port h80 refers to th...
- Q128. Which of the following password cracking attacks is based on a pre-calculated hash table t...
- Q129. Which of the following directories contains administrative commands on a UNIX computer?...
- Q130. Which of the following is a nonvolatile form of memory that can be reprogrammed by using a...
- Q131. Adam works as a professional Computer Hacking Forensic Investigator. A project has been as...
- Q132. Which of the following describes software technologies that improve portability, manageabi...
- Q133. You work as the Network Administrator for McNeil Inc. The company has a Unix-based network...
- Q134. You want to upgrade a partition in your computer's hard disk drive from FAT to NTFS. Which...
- Q135. Which of the following is described in the following statement? "It is a 512 bytes long bo...
- Q136. Which of the following is used to detect the bad sectors in a hard disk under Linux enviro...
- Q137. Which of the following statements are true about routers? Each correct answer represents a...
- Q138. HOTSPOT Identify the port in the image given below, which can be connected to the hub to e...
- Q139. Which of the following are advantages of NTFS file system over FAT32 and FAT? Each correct...
- Q140. Adam works as a professional Computer Hacking Forensic Investigator. He has been called by...
- Q141. An organization monitors the hard disks of its employees' computers from time to time. Whi...
- Q142. Which of the following directories cannot be placed out of the root filesystem? Each corre...
- Q143. Joseph works as a Web Designer for WebTech Inc. He creates a Web site and wants to protect...
- Q144. Which of the following Incident handling process phases is responsible for defining rules,...
- Q145. Joseph works as a Web Designer for WebTech Inc. He creates a Web site and wants to protect...
- Q146. Which of the following file systems cannot be used to install an operating system on the h...
- Q147. Your network has a Windows 2000 Server computer with FAT file system, shared by several us...
- Q148. You are a professional Computer Hacking forensic investigator. You have been called to col...
- Q149. You work as a Network Administrator for Perfect Solutions Inc. The company has a Linux-bas...
- Q150. John works as a professional Ethical Hacker. He has been assigned a project for testing th...
- Q151. Which of the following types of evidence is considered as the best evidence?...
- Q152. Adam works as a Security Administrator for Umbrella Technology Inc. He reported a breach i...
- Q153. You work as a professional Computer Hacking Forensic Investigator for DataEnet Inc. You wa...
- Q154. Peter works as a Technical Representative in a CSIRT for SecureEnet Inc. His team is calle...
- Q155. Mark works as a Network Administrator for Net Perfect Inc. The company has a Linux-based n...
- Q156. Which of the following tools can be used to perform tasks such as Windows password crackin...
- Q157. In the United States, Title VII of the 1964 Civil Rights Act was formulated to protect an ...
- Q158. Which of the following directories in Linux operating system contains device files, which ...
- Q159. Adam works as a professional Computer Hacking Forensic Investigator. He works with the loc...
- Q160. Peter works as a Technical Representative in a CSIRT for SecureEnet Inc. His team is calle...
- Q161. Which of the following parameters is NOT used for calculating the capacity of the hard dis...
- Q162. Adam works as a professional Computer Hacking Forensic Investigator. A project has been as...
- Q163. Which of the following command line tools are available in Helix Live acquisition tool on ...
- Q164. Adam works as a professional Computer Hacking Forensic Investigator. A project has been as...
- Q165. The Klez worm is a mass-mailing worm that exploits a vulnerability to open an executable a...
- Q166. You work as a Network Administrator for Blue Well Inc. Your company's network has a Window...
- Q167. Which of the following tools can be used to perform a whois query? Each correct answer rep...
- Q168. You work as a Network Administrator for Tech Perfect Inc. The company has a TCP/IP-based n...
- Q169. Which of the following directories cannot be placed out of the root filesystem? Each corre...
- Q170. You are a professional Computer Hacking forensic investigator. You have been called to col...
