1.
While investigating a claim of a user downloading illegal material, the investigator goes through the files on the suspect's workstation. He comes across a file that is just called file.txt but when he opens it, he finds the following: What can he infer from this file?
2.
Harold is the senior security analyst for a small state agency in New York. He has no other security professionals that work under him, so he has to do all the security-related tasks for the agency. Coming from a computer hardware background, Harold does not have a lot of experience with security methodologies and technologies, but he was the only one who applied for the position. Harold is currently trying to run a Sniffer on the agencys network to get an idea of what kind of traffic is being passed around, but the program he is using does not seem to be capturing anything. He pours through the Sniffers manual, but cannot find anything that directly relates to his problem. Harold decides to ask the network administrator if he has any thoughts on the problem. Harold is told that the Sniffer was not working because the agencys network is a switched network, which cannot be sniffed by some programs without some tweaking. What technique could Harold use to sniff his agencys switched network?
3.
Which Windows system tool checks integrity of critical files that has been digitally signed by Microsoft?
4.
Botnets are networks of compromised computers that are controlled remotely and surreptitiously by one or more cyber criminals. How do cyber criminals infect a victim's computer with bots? (Select 4 answers)
5.
User which Federal Statutes does FBI investigate for computer crimes involving e-mail scams and mail fraud?
6.
Which of the following activities will NOT be considered as passive footprinting?
7.
Which one of the following is defined as the process of distributing incorrect Internet Protocol (IP) addresses/names with the intent of diverting traffic?
8.
A XYZ security System Administrator is reviewing the network system log files. He notes the following: What should he assume has happened and what should he do about the situation?
9.
To what does message repudiation refer to what concept in the realm of email security?
10.
Snort has been used to capture packets on the network. On studying the packets, the penetration tester finds it to be abnormal. If you were the penetration tester, why would you find this abnormal?
05/20-17:0645.061034 192.160.13.4:31337 --> 172.16.1.101:1 TCP TTL:44 TOS:0x10 ID:242
***FRP** Seq:0xA1D95 Ack:0x53 Win: 0x400
What is odd about this attack? (Choose the most appropriate statement)