- (Topic 3)
Under which Federal Statutes does FBI investigate for computer crimes involving e-mail scams and mail fraud?
Correct Answer:
B
- (Topic 3)
Diskcopy is:
Correct Answer:
B
diskcopy is a STANDARD DOS utility. C:\WINDOWS>diskcopy /? Copies the contents of one floppy disk to another.
- (Topic 1)
Which of the following passwords are sent over the wire (and wireless) network, or stored on some media as it is typed without any alteration?
Correct Answer:
A
- (Topic 1)
Router log files provide detailed Information about the network traffic on the Internet. It gives information about the attacks to and from the networks. The router stores log files in the ____ .
Correct Answer:
A
- (Topic 3)
John and Hillary works at the same department in the company. John wants to find out Hillary's network password so he can take a look at her documents on the file server. He enables Lophtcrack program to sniffing mode. John sends Hillary an email with a link to Error! Reference source not found. What information will he be able to gather from this?
Correct Answer:
D
Note: From the question, we would have to assume that John is not the Administrator, since he needs to run L0phtcrack in sniffing mode. But what if the company is using switches instead of Hubs? John would either try to degarde the switch or perform a man in the middle attack.