IISFA II0-001 Certified Information Forensics Investigator CIFI Exam Practice Test

Page: 1 / 14
Total 229 questions
Question 1

A SYN attack exploits what aspect of TCP communications?



Answer : A


Question 2

An advanced application of making use of proxies to hide an IP that makes tracing virtually impossible is called:



Answer : B


Question 3

The 1st sector of a hard disk is sometimes called:



Answer : A


Question 4

LBA is:



Answer : B


Question 5

The investigator must be ethical



Answer : A


Question 6

When handling evidence, which of the following is not a common guideline?



Answer : B


Question 7

There are several types of evidence that can be used in a trial. Which type of evidence listed below provides the most reliability?



Answer : C


Page:    1 / 14   
Total 229 questions