최신 CHFI EC1-349 무료샘플문제:
1. The need for computer forensics is highlighted by an exponential increase in the number of cybercrimes and litigations where large organizations were involved. Computer forensics plays an important role in tracking the cyber criminals. The main role of computer forensics is to:
A) Extract, process, and interpret the factual evidence so that it proves the attacker's actions in the court
B) Document monitoring processes of employees of the organization
C) Harden organization perimeter security
D) Maximize the investigative potential by maximizing the costs
2. Digital evidence validation involves using a hashing algorithm utility to create a binary or hexadecimal number that represents the uniqueness of a data set, such as a disk drive or file.
Which of the following hash algorithms produces a message digest that is 128 bits long?
A) MD5
B) CRC-32
C) SHA-1
D) SHA-512
3. Which Is a Linux journaling file system?
A) BFS
B) Ext3
C) HFS
D) FAT
4. The Electronic Serial Number (ESN) is a unique __________ recorded on a secure chip in a mobile phone by the manufacturer.
A) 16-bit identifier
B) 32-bit identifier
C) 64-bit identifier
D) 24-bit identifier
5. Digital photography helps in correcting the perspective of the Image which Is used In taking the measurements of the evidence. Snapshots of the evidence and incident-prone areas need to be taken to help in the forensic process. Is digital photography accepted as evidence in the court of law?
A) Yes
B) No
질문과 대답:
질문 # 1 정답: A | 질문 # 2 정답: A | 질문 # 3 정답: B | 질문 # 4 정답: B | 질문 # 5 정답: A |