- (Exam Topic 2)
What must be obtained before an investigation is carried out at a location?
Correct Answer:
A
- (Exam Topic 2)
To which phase of the Computer Forensics Investigation Process does the Planning and Budgeting of a Forensics Lab belong?
Correct Answer:
C
- (Exam Topic 2)
What feature of Decryption Collection allows an investigator to crack a password as quickly as possible?
Correct Answer:
B
- (Exam Topic 2)
What type of attack sends spoofed UDP packets (instead of ping packets) with a fake source address to the IP broadcast address of a large network?
Correct Answer:
A
- (Exam Topic 2)
Data is striped at a byte level across multiple drives, and parity information is distributed among all member drives.
What RAID level is represented here?
Correct Answer:
B