Which of the following folders on the local computer will you review to accomplish the task?
You work as a professional Computer Hacking Forensic Investigator for DataEnet Inc. You want to
investigate e-mail information of an employee of the company. The suspected employee is using
an online e-mail system such as Hotmail or Yahoo. Which of the following folders on the local
computer will you review to accomplish the task?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following tools can John use to accomplish the task?
John works as a Network Security Professional. He is assigned a project to test the security of
www.we-are-secure.com. He is working on the Linux operating system and wants to install an
Intrusion Detection System on the We-are-secure server so that he can receive alerts about any
hacking attempts. Which of the following tools can John use to accomplish the task?
Each correct answer represents a complete solution. Choose all that apply.
What else should you do?
You manage a Windows Server 2008 server named uCert1 in a domain named PassGuide.com.
uCert1 has the Web Server (IIS) role installed and hosts an intranet Web site named
PassGuideInternal.
You want to ensure that all authentication traffic to the Web site is encrypted securely without the
use of SSL. You disable Anonymous Authentication. What else should you do?
Which of the following password cracking attacks does not use any software for cracking e-mail passwords?
Which of the following password cracking attacks does not use any software for cracking e-mail
passwords?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following programs or services will you use to accomplish the task?
You work as a Sales Manager for NetPerfect Inc. The company has a Windows-based network.
You have to often send confidential e-mails and make online payments and purchases. You want
to protect transmitted information and also to increase the security of e-mail communications.
Which of the following programs or services will you use to accomplish the task?
Each correct answer represents a complete solution. Choose all that apply.
What are the four most important security priorities for PassGuide Software Systems Pvt. Ltd.?
The IT administrator wants to implement a stronger security policy. What are the four most
important security priorities for PassGuide Software Systems Pvt. Ltd.? (Click the Exhibit button on
the toolbar to see the case study.)
which of the following complaint categories is on the top?
According to the Internet Crime Report 2009, which of the following complaint categories is on the
top?
What technique is Maria using?
Maria works as the Chief Security Officer for PassGuide Inc. She wants to send secret messages
to the CEO of the company. To secure these messages, she uses a technique of hiding a secret
message within an ordinary message. The technique provides ‘security through obscurity’. What
technique is Maria using?
Which of the following is a documentation of guidelines that computer forensics experts use to handle evidence
Which of the following is a documentation of guidelines that computer forensics experts use to
handle evidences?
Which of the following commands will Peter run to show the last unsuccessful login attempts, as well as the us
Peter works as a System Administrator for TechSoft Inc. The company uses Linux-based systems.
Peter’s manager suspects that someone is trying to log in to his computer in his absence. Which
of the following commands will Peter run to show the last unsuccessful login attempts, as well as
the users who have last logged in to the manager’s system?
Each correct answer represents a complete solution. Choose two.