IISFA Certified Information Forensics Investigator II0-001 CIFI Exam Questions

Page: 1 / 14
Total 229 questions
Question 1

In certain cases, a system may have CMOS or Boot passwords that prevent an investigator from accessing the hard drive. What technique would be most effective in circumventing the password protection?



Answer : B


Question 2

When handling evidence, which of the following is not a common guideline?



Answer : B


Question 3

Which of the following represents the data found at a NTFS hard drive, and lasts for 3 bytes?



Answer : B


Question 4

Step 1 in analyzing data during an investigation is:



Answer : A


Question 5

A new protocol that is designed to aid in intrusion protection and IP tracebacks is known as:



Answer : A


Question 6

Keyloggers are impossible to detect.



Answer : B


Question 7

An active traceback detects active network connections to a host.



Answer : A


Page:    1 / 14   
Total 229 questions