Which of the following tools can Andrew use to accomplish the task?
Andrew works as a Forensic Investigator for Passguide Inc. The company has a Windows-based
environment. The company’s employees use Microsoft Outlook Express as their e-mail client
program. E-mails of some employees have been deleted due to a virus attack on the network.
Andrew is therefore assigned the task to recover the deleted mails. Which of the following tools
can Andrew use to accomplish the task?
Each correct answer represents a complete solution. Choose two.
Which of the following Incident handling process phases is responsible for defining rules, collaborating human
Which of the following Incident handling process phases is responsible for defining rules,
collaborating human workforce, creating a back-up plan, and testing the plans for an enterprise?
Which of the following components are usually found in an Intrusion detection system (IDS)?
Which of the following components are usually found in an Intrusion detection system (IDS)?
Each correct answer represents a complete solution. Choose two.
Which of the following honeypots is a low-interaction honeypot and is used by companies or corporations for ca
Which of the following honeypots is a low-interaction honeypot and is used by companies or
corporations for capturing limited information about malicious hackers?
Which of the following actions will you take to accomplish the task?
You work as a Network Administrator for Tech Perfect Inc. The company has a Windows Active
Directory-based single domain single forest network. The functional level of the forest is Windows
Server 2003. The company has recently provided fifty laptops to its sales team members. You are
required to configure an 802.11 wireless network for the laptops. The sales team members must
be able to use their data placed at a server in a cabled network. The planned network should be
able to handle the threat of unauthorized access and data interception by an unauthorized user.
You are also required to prevent the sales team members from communicating directly to one
another. Which of the following actions will you take to accomplish the task?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following statements are TRUE about Demilitarized zone (DMZ)?
Which of the following statements are TRUE about Demilitarized zone (DMZ)?
Each correct answer represents a complete solution. Choose all that apply.
which of the following complaint types does a fraudulent transaction take place?
In which of the following complaint types does a fraudulent transaction take place?
Which of the following malicious software is used by several advertising websites for downloading and displayi
Which of the following malicious software is used by several advertising websites for downloading
and displaying advertisements in the Web browser without user permission?
Which of the following parameters are required to be followed on receiving a suspicious mail according to the
Which of the following parameters are required to be followed on receiving a suspicious mail
according to the Department of Justice?
Each correct answer represents a part of the solution. Choose all that apply.
Which of the following is the default bootloader on Mac OS X that he should use to resolve the issue?
Andrew works as a System Administrator for NetPerfect Inc. All client computers on the network
run on Mac OS X. The Sales Manager of the company complains that his MacBook is not able to
boot. Andrew wants to check the booting process. He suspects that an error persists in the
bootloader of Mac OS X. Which of the following is the default bootloader on Mac OS X that he
should use to resolve the issue?