- (Exam Topic 3)
Checkpoint Firewall logs can be viewed through a Check Point Log viewer that uses icons and colors in the log table to represent different security events and their severity. What does the icon in the checkpoint logs represent?
Correct Answer:
C
- (Exam Topic 2)
Smith, a forensic examiner, was analyzing a hard disk image to find and acquire deleted sensitive files. He stumbled upon a $Recycle.Bin folder in the root directory of the disk. Identify the operating system in use.
Correct Answer:
D
- (Exam Topic 1)
Item 2If you come across a sheepdip machine at your client site, what would you infer?
Correct Answer:
C
- (Exam Topic 2)
What type of flash memory card comes in either Type I or Type II and consumes only five percent of the power required by small hard drives?
Correct Answer:
B
- (Exam Topic 2)
A master boot record (MBR) is the first sector (“sector zero”) of a data storage device. What is the size of MBR?
Correct Answer:
D