1.
WPA2 provides enterprise and Wi-Fi users with stronger data protection and network access control which of the following encryption algorithm is used DVWPA2?
2.
The disk in the disk drive rotates at high speed, and heads in the disk drive are used only to read data.
3.
What is a bit-stream copy?
4.
Which of the following Steganography techniques allows you to encode information that ensures creation of cover for secret communication?
5.
Ron. a computer forensics expert, Is Investigating a case involving corporate espionage. He has recovered several mobile computing devices from the crime scene. One of the evidence that Ron possesses is a mobile phone from Nokia that was left in on condition. Ron needs to recover the IMEI number of the device to establish the identity of the device owner. Which of the following key combinations he can use to recover the IMEI number?
6.
Who is responsible for the following tasks?
- Secure the scene and ensure that it is maintained In a secure state until the Forensic Team advises
- Make notes about the scene that will eventually be handed over to the Forensic Team
7.
During the seizure of digital evidence, the suspect can be allowed touch the computer system.
8.
Consistency in the investigative report is more important than the exact format in the report to eliminate uncertainty and confusion.
9.
When dealing with the powered-off computers at the crime scene, if the computer is switched off, turn it on
10.
MAC filtering is a security access control methodology, where a ___________ is assigned to each network card to determine access to the network