TEST 2026 QUESTIONS WITH CORRECT
ANSWERS GRADED A+
◍ Which of the following is NOT a consideration during a cybercrime
investigation?.
Answer: Value or cost to the victim.
◍ What is the purpose of a MAC address?*To uniquely identify an internet
URL*To uniquely identify a computer motherboard*To uniquely identify an
email client*To uniquely identify a computer on a network.
Answer: To uniquely identify a computer on a network
◍ A homeowner arrives at home in the evening. A timer has turned on an
exterior light before her arrival, and the surveillance camera records her
walking to the door. She unlocks the door using a mobile app, and a motion
sensor turns on an interior light when she enters the house.What is an
example of Internet of Things (IoT) technology in this scenario?*The door
lock*The camera*The exterior light*The interior light.
Answer: The door lock
◍ A company produces a mobile app that provides recipes and cooking
tutorials.Which category of app is this?*Utility*Lifestyle*Social
networking*Entertainment.
Answer: Lifestyle
◍ What file format is used by Windows Vista and later versions to store event
logs as simple text files in XML format?.
Answer: EVTX
◍ The IT department of a company has been asked to provide systems for
financial and investment management.Which business department has the
, greatest need for this type of
system?*Sales*Accounting*Operations*Marketing.
Answer: Accounting
◍ Which of the following is true of cybercrimes?.
Answer: Investigators, with a warrant, have the authority to forcibly seize
the computing devices.
◍ A large online retailer uses a decision support system (DSS) to develop
scenarios for the executive team to evaluate.What is the primary source of
the data used by this DSS?*The human resource (HR) management
system*The business intelligence (BI) system*The cloud web hosting
(CWH) system*The transaction processing system (TPS).
Answer: The transaction processing system (TPS)
◍ Identify which code can be used to obtain the International Mobile
Equipment Identifier (IMEI) number on a mobile phone..
Answer: *#06#
◍ Which of the following consists of volatile storage?.
Answer: RAM
◍ What is a proprietary information security standard for organizations that
handle cardholder information for major debit, credit, prepaid, e-purse,
ATM, and POS cards?.
Answer: PCI DSS
◍ What are scrubbed data?*Data that are organized into database tables*Data
that have been validated for accuracy*Data that have been eliminated
because they are inconsistent*Data that have been deleted for privacy
reasons.
Answer: Data that have been validated for accuracy
◍ Which type of technology can be used to monitor every product in a
warehouse to enable real-time inventory tracking and updates?*Wide area
network (WAN)*Mobile utility application*Operations management
system*Radio-frequency identification (RFID).
, Answer: Radio-frequency identification (RFID)
◍ What is the defining characteristic of a part of a system that is considered a
point of failure?*It is a part of the system that has failed.*It causes
everything to stop if it fails.*It causes a security risk if it fails.*It is prone to
frequent failure..
Answer: It causes everything to stop if it fails.
◍ What is an example of an Internet of Things (IoT) device?*A tire-pressure
indicator displayed on a car dashboard*A light bulb that can be turned on or
off with a smartphone*A motion sensor that turns a light on when
movement is detected*A wireless computer keyboard connected to a laptop.
Answer: A light bulb that can be turned on or off with a smartphone
◍ What is the major function of a computer operating system?*Data
management*Application program management*Network
management*Computer resource management.
Answer: Computer resource management
◍ What is the primary information required for starting an email
investigation?.
Answer: The unique IP address.
◍ An analyst publishes a paper on cybersecurity. In that paper, he includes
several pages of a report written by another author, but he does not attribute
those pages to the other author.Which type of law prohibits this kind of
unethical behavior?*Patent*Copyright*Trade secret*Trademark.
Answer: Copyright
◍ Cybercrimes can be classified into the following two types of attacks, based
on the line of attack..
Answer: Internal and External.
◍ Which of the following is NOT a legitimate authorizer of a search warrant?.
Answer: First Responder.
◍ Espionage, theft of intellectual property, manipulation of records, and trojan
, horse attacks are examples of what?.
Answer: Insider attack or primary attacks.
◍ Which topology implements a network where if the central hub fails, all
nodes attached to the hub will also fail?*A mesh topology*A linear bus
topology*A star topology*A ring topology.
Answer: A star topology
◍ Which of the following is NOT a objective of computer forensics?.
Answer: Document vulnerabilities allowing further loss of intellectual
property, finances, and reputation during an attack.
◍ Every device on the internet has a unique numerical label that identifies it.
With so many devices requiring an internet address, a new protocol has been
developed that can provide unique identifiers to over 280 trillion
devices.What is the designation of this new protocol?*User Datagram
Protocol (UDP)*Transmission Control Protocol (TCP)*Internet Protocol
version 6 (IPv6)*Hypertext transfer protocol (HTTP).
Answer: Internet Protocol version 6 (IPv6)
◍ Which web application threat occurs when attackers bypass the client's ID
security mechanisms, gain access privileges, and inject malicious scripts
into specific fields in web pages?.
Answer: Cross site scripting
◍ Where can congressional security standards and guidelines be found, along
with an emphasis for federal agencies to develop, document, and implement
organization-wide programs for information security?.
Answer: FISMA
◍ The main objective of a cybercrime investigation is to identify which of the
following?.
Answer: Evidence and facts.
◍ What is a key way that social media marketing has simplified the calculation
of return on investment (ROI) in marketing?*By providing companies with
transparent pricing on all advertising offerings*By providing companies