You are the Network Administrator and your company has recently implemented encryption for all emails. You want to check to make sure that the email packages are being encrypted. What tool would you use to accomplish this?
#31
Answer: B✅ Correct❌ Incorrect
Which of the following file systems contains hardware settings of a Linux computer?
#32
Answer: C✅ Correct❌ Incorrect
Which of the following is a set of exclusive rights granted by a state to an inventor or his assignee for a fixed period of time in exchange for the disclosure of an invention?
#33
Answer: D✅ Correct❌ Incorrect
Adam works as a professional Computer Hacking Forensic Investigator. A project has been assigned to him to investigate the main server of SecureEnet Inc. The server runs on Debian Linux operating system. Adam wants to investigate and review the GRUB configuration file of the server system.Which of the following files will Adam investigate to accomplish the task?
#34
Answer: A✅ Correct❌ Incorrect
Which utility enables you to access files from a Windows .CAB file?
#35
Answer: D✅ Correct❌ Incorrect
Which of the following anti-child pornography organizations helps local communities to create programs and develop strategies to investigate child exploitation?
#36
Answer: B✅ Correct❌ Incorrect
Your network has a Windows 2000 Server computer with FAT file system, shared by several users.This system stores sensitive data. You decide to encrypt this data to protect it from unauthorized access. You want to accomplish the following goals:✑ Data should be secure and encrypted.✑ Administrative efforts should be minimum.✑ You should have the ability to recover encrypted files in case the file owner leaves the company.✑ Other permissions on encrypted files should be unaffected.✑ File-level security is required on the disk where data is stored.✑ Encrypting or decrypting of files should not be the responsibility of the file owner.You take the following steps to accomplish these goals :✑ Convert the FAT file system to Windows 2000 NTFS file system.✑ Use Encrypting File System (EFS) to encrypt data.Which of the following goals will you be able to accomplish?Each correct answer represents a complete solution. Choose all that apply. E. Administrative efforts are minimum. F. Other permissions on encrypted files are unaffected.
#37
Answer: A✅ Correct❌ Incorrect
Which of the following statements are true about Compact Disc (CD) and Digital Versatile Disk (DVD)?Each correct answer represents a complete solution. Choose all that apply.
#38
Answer: B✅ Correct❌ Incorrect
Sandra wants to create a full system state backup of her computer, which is running on Microsoft Windows XP operating system. Which of the following is saved in full state system backup?Each correct answer represents a complete solution. Choose all that apply.
#39
Answer: B✅ Correct❌ Incorrect
John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He traceroutes the We-are- secure server and gets the following result:Considering the above traceroute result, which of the following statements can be true?Each correct answer represents a complete solution. Choose all that apply.
#40
Answer: A✅ Correct❌ Incorrect
Which of the following command line tools are available in Helix Live acquisition tool on Windows?Each correct answer represents a complete solution. Choose all that apply.
#41
Answer: A✅ Correct❌ Incorrect
Which of the following tools is used to extract human understandable interpretation from the computer binary files?
#42
Answer: B✅ Correct❌ Incorrect
Which of the following statements are true about routers?Each correct answer represents a complete solution. Choose all that apply.
#43
Answer: A✅ Correct❌ Incorrect
Which of the following type of files is NOT deleted by Disk Cleanup program of Windows XP?
#44
Answer: A✅ Correct❌ Incorrect
Which of the following tools is used to restore deleted files from Linux and Mac OS X file system?
#45
Answer: A✅ Correct❌ Incorrect
Which of the following Windows XP system files handles memory management, I/O operations, and interrupts?
#46
Answer: D✅ Correct❌ Incorrect
Which of the following representatives of incident response team takes forensic backups of the systems that are the focus of the incident?
#47
Answer: A✅ Correct❌ Incorrect
Which of the following statements is true for a file in the UNIX operating system?
#48
Answer: A✅ Correct❌ Incorrect
You work as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. You are creating a user account by using the USERADD command. Which of the following entries cannot be used for specifying a user ID?Each correct answer represents a complete solution. Choose all that apply.