IISFA II0-001 Certified Information Forensics Investigator CIFI Exam Practice Test

Page: 1 / 14
Total 229 questions
Question 1

Steganography is:



Answer : C


Question 2

A rule that allows any traffic from the trusted network through to untrusted networks is a security risk because:



Answer : A


Question 3

Challenges to the authenticity of computer records often take on one of three forms. Please select the statement that best describes one of the three challenges.



Answer : C


Question 4

A well documented chain of custody must include:



Answer : D


Question 5

Embedding a serial number or watermark into a data file is known as:



Answer : B


Question 6

Compression of collected evidence can't be utilized because:



Answer : D


Question 7

The following graphic is an example of what tool?



Answer : A


Page:    1 / 14   
Total 229 questions