PrepAway - Latest Free Exam Questions & Answers

Author: admin

which of the following laws can the employee be prosecuted?

Adam works as a Computer Hacking Forensic Investigator for a garment company in the United
States. A project has been assigned to him to investigate a case of a disloyal employee who is
suspected of stealing design of the garments, which belongs to the company and selling those

garments of the same design under different brand name. Adam investigated that the company
does not have any policy related to the copy of design of the garments. He also investigated that
the trademark under which the employee is selling the garments is almost identical to the original
trademark of the company. On the grounds of which of the following laws can the employee be
prosecuted?

Which of the following techniques is Sam using?

Rick works as a Computer Forensic Investigator for BlueWells Inc. He has been informed that

some confidential information is being leaked out by an employee of the company. Rick suspects
that someone is sending the information through email. He checks the emails sent by some
employees to other networks. Rick finds out that Sam, an employee of the Sales department, is
continuously sending text files that contain special symbols, graphics, and signs. Rick suspects
that Sam is using the Steganography technique to send data in a disguised form. Which of the
following techniques is Sam using?
Each correct answer represents a part of the solution. Choose all that apply.

What is the IP address of the sender of this email?

You work as a Network Security Analyzer. You got a suspicious email while working on a forensic
project. Now, you want to know the IP address of the sender so that you can analyze various
information such as the actual location, domain information, operating system being used, contact
information, etc. of the email sender with the help of various tools and resources. You also want to
check whether this email is fake or real. You know that analysis of email headers is a good starting
point in such cases. The email header of the suspicious email is given below:

What is the IP address of the sender of this email?

which of the following attacks may she become vulnerable to?

Maria works as a Desktop Technician for PassGuide Inc. She has received an e-mail from the MN
Compensation Office with the following message:
If Maria replies to this mail, which of the following attacks may she become vulnerable to?
Dear Sir/Madam,
My name is Edgar Rena, the director of compensation here at the MN Compensation Office in
Chicago. We receive so many complaints about fraudulent activities that have been taking place in
your region for the past few years. Due to the high volume loss of money, the MN compensation
department has had an agreement with the appropriate authority to compensate each victim with a
sum of USD$500,000.00.
You were selected among the list of people to be paid this sum. To avoid any imperative mood by
intending scammers, your payment has been transmuted into an International bank draft which
can be cashed at any local bank in your country.
Please fill the below details and send it to our secretary for your compensation bank draft.
Full name: ______
Address: ________
Tel: ____________
Fill & Send to:
Dr. Michael Brown
MN Compensation Office, IL
Tel: +1-866-233-8434
Email: micbrown@live.com
Further instructions shall be given to you by our secretary as soon as you contact him. To avoid
losing your compensation, you are requested to pay the sum of $350 for Insurance Premium to
our secretary.
Thanks and God bless.
Rate now:

Which of the following violations has been committed by Mola Co.?

Cola Co. manufactures, markets, sells, and distributes non-alcoholic potables such as Lemcaa
and Thunder Up under its brand name Cola and uses green and red logo. Mola Co., a new
company, starts manufacturing, marketing, selling, and distributing non-alcoholic potables like
Lumca and Cloud Up under its brand name Mola and uses green and red logo. Which of the
following violations has been committed by Mola Co.?

Which of the following mistakes made by Jason helped the Forensic Investigators catch him?

Jason, a Malicious Hacker, is a student of Baker university. He wants to perform remote hacking
on the server of DataSoft Inc. to hone his hacking skills. The company has a Windows-based
network. Jason successfully enters the target system remotely by using the advantage of
vulnerability. He places a Trojan to maintain future access and then disconnects the remote session.
The employees of the company complain to Mark, who works as a Professional Ethical Hacker for
DataSoft Inc., that some computers are very slow. Mark diagnoses the network and finds that
some irrelevant log files and signs of Trojans are present on the computers. He suspects that a
malicious hacker has accessed the network. Mark takes the help from Forensic Investigators and
catches Jason.
Which of the following mistakes made by Jason helped the Forensic Investigators catch him?

Which of the following are pre-requisites for an attacker to conduct firewalking?

Firewalking is a technique that can be used to gather information about a remote network
protected by a firewall. This technique can be used effectively to perform information gathering
attacks. In this technique, an attacker sends a crafted packet with a TTL value that is set to expire
one hop past the firewall. Which of the following are pre-requisites for an attacker to conduct firewalking?
Each correct answer represents a complete solution. Choose all that apply.


Page 181 of 231« First...102030...179180181182183...190200210...Last »