IISFA Certified Information Forensics Investigator II0-001 CIFI Exam Practice Test

Page: 1 / 14
Total 229 questions
Question 1

Challenges to the authenticity of computer records often take on one of three forms. Please select the statement that best describes one of the three challenges.



Answer : C


Question 2

When auditing log files for system discrepancies, why is NTP important?



Answer : B


Question 3

The MBR typically starts at sector:



Answer : C


Question 4

What method can be used to detect the use of rogue servers providing services such as illegal software distribution, music files, pornography in an environment?



Answer : A


Question 5

An external audit of your systems provides:



Answer : D


Question 6

Which is true regarding tracing Secure Socket Layer (SSL) and Transport Layer Security (TLS) connections?



Answer : B


Question 7

Which of the following is a challenge for performing a Trace back?



Answer : D


Page:    1 / 14   
Total 229 questions