Question 55

- (Exam Topic 1)
What term is used to describe a cryptographic technique for embedding information into something else for the sole purpose of hiding that information from the casual observer?

Correct Answer:C

Question 56

- (Exam Topic 3)
Which cloud model allows an investigator to acquire the instance of a virtual machine and initiate the forensics examination process?

Correct Answer:B

Question 57

- (Exam Topic 2)
Where are files temporarily written in Unix when printing?

Correct Answer:D

Question 58

- (Exam Topic 2)
Wireless access control attacks aim to penetrate a network by evading WLAN access control measures such as AP MAC filters and Wi-Fi port access controls. Which of the following wireless access control attacks allow the attacker to set up a rogue access point outside the corporate perimeter and then lure the employees of the organization to connect to it?

Correct Answer:B

Question 59

- (Exam Topic 2)
Casey has acquired data from a hard disk in an open source acquisition format that allows her to generate compressed or uncompressed image files. What format did she use?

Correct Answer:B

Question 60

- (Exam Topic 1)
Hackers can gain access to Windows Registry and manipulate user passwords, DNS settings, access rights or others features that they may need in order to accomplish their objectives. One simple method for loading an application at startup is to add an entry (Key) to the following Registry Hive:

Correct Answer:D

START 312-49v10 EXAM