1.
Forensic ToolKit (FTK) is a ?
Correct Answer
A. Software
Explanation
FTK (Forensic ToolKit) is a software used in digital forensics. It is designed to assist investigators in analyzing and recovering data from electronic devices. FTK provides various tools and features to facilitate the examination of digital evidence, such as keyword searches, data carving, and email analysis. It allows investigators to extract and analyze information from computers, smartphones, and other digital devices. Therefore, FTK is a software tool used in the field of forensic investigations.
2.
An access token dose not contain?
Correct Answer
B. Group identifier
Explanation
An access token is a form of authentication that is used to verify the identity and permissions of a user in a computer system. It contains information such as the security identifier (SID) which uniquely identifies the user, the date and time when the token was issued, and the user's rights and permissions. However, it does not contain a group identifier, which is used to identify the user's group memberships within the system.
3.
FAT stands for
Correct Answer
A. File allocation tables
Explanation
FAT stands for file allocation tables. This is a data structure used by computer operating systems to organize and manage files on a storage device, such as a hard drive or a flash drive. The file allocation tables keep track of which clusters on the storage device are allocated to each file, allowing the operating system to locate and access the files efficiently.
4.
CDMA stand for
Correct Answer
B. Code division multiple access
Explanation
CDMA stands for Code Division Multiple Access. This technology is used in telecommunications to allow multiple users to share the same frequency band simultaneously. It works by assigning a unique code to each user, which allows their signals to be separated and distinguished from each other. This enables more efficient use of the available bandwidth and increases the capacity of the network. Code Division Multiple Access is a widely used technology in mobile communication systems, including 3G and 4G networks.
5.
International roaming is not a problem for
Correct Answer
B. GSM
Explanation
GSM (Global System for Mobile Communications) is a standard for mobile communication that is widely used around the world. Unlike CDMA (Code Division Multiple Access), which is primarily used in North America and a few other countries, GSM is used by the majority of countries globally. As a result, GSM networks have extensive international roaming agreements in place, making it easier for GSM users to travel and use their mobile devices in different countries without any major issues. Therefore, international roaming is not a problem for GSM users.
6.
EXPLOITS DEPEND ON
Correct Answer
C. ALL OF THE ABOVE
Explanation
The correct answer is ALL OF THE ABOVE. Exploits can depend on various factors such as the operating system and its configuration, the local area network (LAN) setup, and the software configuration. These factors can create vulnerabilities that attackers can exploit to gain unauthorized access or cause harm to a system. Therefore, it is important to consider all of these aspects when assessing and securing a system against potential exploits.
7.
At which layer of the OSI communication model dose bridge operate?
Correct Answer
B. Datalink
Explanation
Bridges operate at the data link layer of the OSI communication model. The data link layer is responsible for the reliable transfer of data between two directly connected nodes on a network. Bridges are devices that connect multiple local area networks (LANs) together and forward data packets between them based on their MAC addresses. They use the data link layer protocols, such as Ethernet, to accomplish this task. Therefore, the correct answer is datalink.
8.
Power-On Passwords are function of
Correct Answer
A. Computer Hardware
Explanation
Power-On Passwords are a function of computer hardware because they are implemented at the hardware level. These passwords are typically stored in the computer's BIOS (Basic Input/Output System) or UEFI (Unified Extensible Firmware Interface), which are firmware interfaces that control the hardware components of the computer. When the computer is powered on, the BIOS or UEFI prompts the user to enter the power-on password before allowing access to the operating system and other software. Therefore, the power-on password feature is directly tied to the computer's hardware and is independent of the operating system, application software, or peripherals.
9.
Which element of the Intellectual property law provides the creator of a work exclusive right for 17 Years?
Correct Answer
A. Patent
Explanation
Patent law provides the creator of a work exclusive rights for 17 years. A patent is a form of intellectual property protection that grants the inventor or creator exclusive rights to their invention or creation. This means that during the 17-year period, the creator has the sole authority to make, use, or sell their invention, preventing others from doing so without their permission. Patents are typically granted for inventions that are new, useful, and non-obvious, and they provide a legal framework to encourage innovation and protect the rights of inventors.
10.
TDMA Stands for
Correct Answer
A. Time Division Multiple Access
Explanation
TDMA stands for Time Division Multiple Access. This is a technique used in telecommunications to allow multiple users to share the same frequency channel by dividing the signal into different time slots. Each user is assigned a specific time slot during which they can transmit their data. This allows for efficient use of the available bandwidth and enables multiple users to access the network simultaneously without interference.
11.
CDMA 2000-1x is network, which achieve data rates up to ...
Correct Answer
C. 2.4mbit/s
Explanation
CDMA 2000-1x is a network that achieves data rates up to 2.4mbit/s.
12.
Which of the following is evidence that is not based on personal knowledge but that was told to the witness?
Correct Answer
D. Hearsay evidence
Explanation
Hearsay evidence refers to information that is not based on the personal knowledge of the witness but rather on what someone else has told them. It is considered unreliable because it is second-hand information and can be easily distorted or manipulated. Therefore, hearsay evidence is not considered strong or credible evidence in legal proceedings.
13.
Fill in the Blanks: Enhanced GPRS can provide a maximum data rate of _______ by using eight time slots.
Correct Answer
D. 384 kbps
Explanation
Enhanced GPRS can provide a maximum data rate of 384 kbps by using eight time slots. This means that with the use of eight time slots, the Enhanced GPRS technology is capable of transmitting data at a speed of 384 kilobits per second.
14.
Registry key can be altered directly with ?
Correct Answer
B. Registry Editor
Explanation
The correct answer is "Registry Editor". The Registry Editor is a tool in Windows operating systems that allows users to view, edit, and manipulate the system registry. The registry is a hierarchical database that stores configuration settings and options for the operating system, hardware, and installed software. By using the Registry Editor, users can directly alter registry keys, which can have a significant impact on the functioning of the system and installed software.
15.
TACS Stands for ?
Correct Answer
A. Total Access Communication System
Explanation
TACS stands for Total Access Communication System. This system refers to a first-generation analog cellular phone system that was introduced in the 1980s. It was primarily used in Europe and other parts of the world. TACS allowed for improved communication by providing total access to the cellular network.
16.
Forensic Examiners are interested in following file because these contain portions of all documents and other materials a user produce while using the computer ?
Correct Answer
B. Swap
Explanation
Forensic examiners are interested in following the swap file because it contains portions of all documents and other materials a user produces while using the computer. The swap file is a type of temporary file that the computer uses to store data that cannot fit into its physical memory. It acts as a virtual memory extension and allows the computer to efficiently manage its resources. Therefore, the swap file can provide valuable evidence and information about the user's activities and files accessed on the computer.
17.
Digital certificates are used in the IPSec connection, What type of network infrastructure device issue digital certificate?
Correct Answer
D. CA
Explanation
CA stands for Certificate Authority. A Certificate Authority is a trusted third-party entity that issues digital certificates. These certificates are used in IPSec connections to authenticate the identity of the communicating parties and ensure the confidentiality and integrity of the data being transmitted. The CA verifies the identity of the entities requesting the certificate and signs the certificate, thereby attesting to its authenticity. The CA plays a crucial role in establishing a secure and trusted connection between network devices in an IPSec infrastructure.
18.
ACL in the NT Security environment stands for
Correct Answer
D. None of these
19.
Which of the following federal Law makes it a crime to knowingly and intentionally use cellular telephones that are altered or have been cloned?
Correct Answer
D. 18 USC 1029
Explanation
18 USC 1029 is the correct answer because it is the federal law that specifically addresses the crime of knowingly and intentionally using altered or cloned cellular telephones. This law prohibits the fraudulent use of access devices, including altered or cloned cell phones, and imposes criminal penalties for such actions. The other options, 18 USC 2701, 18 USC 2511, and 18 USC 2319, do not specifically pertain to the crime described in the question.
20.
Which of the following are the tow primary U.S.Laws that address Cybercrime?
Correct Answer
C. 2510 and 2701
Explanation
The correct answer is 2510 and 2701. These are the two primary U.S. laws that address cybercrime.