IISFA Certified Information Forensics Investigator II0-001 CIFI Exam Questions

Page: 1 / 14
Total 229 questions
Question 1

When investigating a malicious attack sourced from the Internet, the investigator would look for forensic evidence in:



Answer : D


Question 2

What should be in an electronic forensic tool kit?



Answer : D


Question 3

In order to access a desktop computer for a forensics investigation that has a BIOS boot password enabled, which of the following is not a technique to over-ride the password:



Answer : D


Question 4

When auditing log files for system discrepancies, why is NTP important?



Answer : B


Question 5

The USA Patriot Act of 2001 has a significant impact to the investigation of computer related crime with stiffer penalties and greater latitude in investigation by law enforcement. This act was signed into law on:



Answer : A


Question 6

What method can be used to detect the use of rogue servers providing services such as illegal software distribution, music files, pornography in an environment?



Answer : A


Question 7

Compression of collected evidence can't be utilized because:



Answer : D


Page:    1 / 14   
Total 229 questions