INTRUSION EXAM OBJECTIVE
ASSESSMENT AND PRE- ASSESSMENT
2024 EXAM LATEST UPDATE
Which type of attack is a denial-of-service technique that sends a large
amount of data tooverwhelm system resources?
Phishing
Spamming
bombing
Bluejacking
Mail bombing
Which computer crime forensics step requires an investigator to duplicate
and image thecollected digital information?
Securing
evidence
Acquiring data
Analyzing data
Assessing
evidence
Acquiring data
What is the last step of a criminal investigation that requires the involvement
of a computerforensic investigator?
Analyzing the data
collectedTestifying in
court Assessing the
evidence
Performing search and
seizureTestifying in court
How can a forensic investigator verify an Android mobile device is on,
without potentiallychanging the original evidence or interacting with the
,operating system?
Check to see if it is plugged into a
computerTap the screen multiple
times
Look for flashing lights
Hold down the power
button
,Look for flashing lights
What should a forensic investigator use to protect a mobile device if a
Faraday bag is notavailable?
Aluminum foil
Sturdy
container
Cardboard
box Bubble
wrap
Aluminum foil
Which criterion determines whether a technology used by government to obtain
information in acomputer search is considered innovative and requires a search
warrant?
Availability to the general public
Dependency on third-party software
Implementation based on open source
softwareUse of cloud-based machine
learning
Availability to the general public
Which situation allows a law enforcement officer to seize a hard drive from a
residence withoutobtaining a search warrant?
The computer is left
unattended.The front door
is wide open.
The occupant is acting
suspicious. The evidence is in
imminent danger.
The evidence is in imminent danger.
Which legal document contains a summary of findings and is used to prosecute?
Investigation
reportSearch
warrant Search
and seizure
, Chain of custody
Investigation report
What should an investigator use to prevent any signals from reaching a mobile phone?
Faraday
bagDry
bag
Anti-static
containerLock
box