IISFA Certified Information Forensics Investigator II0-001 CIFI Exam Practice Test

Page: 1 / 14
Total 229 questions
Question 1

As a private investigator, you are not required by law to report crimes discovered during an investigation (with a few exceptions), but the IISFA Code of Ethics does require you to report such crimes.



Answer : B


Question 2

In certain circumstances, it is necessary to penetrate remote systems (un-owned) in order to retrieve logs for evidence. If properly hashed at the remote site and once retrieved, will this evidence be valid for litigation?



Answer : B


Question 3

A forensically safe file viewer can cross not only application but OS boundaries, and they offer the added benefit that:



Answer : A


Question 4

What technique of layered security design will allow for both investigation and recovery after an incident?



Answer : B


Question 5

In Microsoft's security architecture, the "SID" refers to:



Answer : C


Question 6

Web anonymizers:



Answer : D


Question 7

What is the difference between a zombie host and a reflector host?



Answer : C


Page:    1 / 14   
Total 229 questions