- (Exam Topic 1)
The efforts to obtain information before a trail by demanding documents, depositions, questioned and answers written under oath, written requests for admissions of fact and examination of the scene is a description of what legal term?
Correct Answer:
D
- (Exam Topic 2)
What is the slave device connected to the secondary IDE controller on a Linux OS referred to?
Correct Answer:
B
- (Exam Topic 4)
In a Fllesystem Hierarchy Standard (FHS), which of the following directories contains the binary files required for working?
Correct Answer:
A
- (Exam Topic 1)
You are called in to assist the police in an investigation involving a suspected drug dealer. The suspects house was searched by the police after a warrant was obtained and they located a floppy disk in the suspects bedroom. The disk contains several files, but they appear to be password protected. What are two common methods used by password cracking software that you can use to obtain the password?
Correct Answer:
B
- (Exam Topic 4)
Which of the following malware targets Android mobile devices and installs a backdoor that remotely installs applications from an attacker-controlled server?
Correct Answer:
C