Question 13

- (Exam Topic 1)
A state department site was recently attacked and all the servers had their disks erased. The incident response team sealed the area and commenced investigation. During evidence collection they came across a zip disks that did not have the standard labeling on it. The incident team ran the disk on an isolated system and found that the system disk was accidentally erased. They decided to call in the FBI for further investigation. Meanwhile, they short listed possible suspects including three summer interns. Where did the incident team go wrong?

Correct Answer:C

Question 14

- (Exam Topic 2)
How often must a company keep log files for them to be admissible in a court of law?

Correct Answer:D

Question 15

- (Exam Topic 3)
What is the capacity of Recycle bin in a system running on Windows Vista?

Correct Answer:C

Question 16

- (Exam Topic 1)
With Regard to using an Antivirus scanner during a computer forensics investigation, You should:

Correct Answer:D

Question 17

- (Exam Topic 1)
What is kept in the following directory? HKLMSECURITYPolicySecrets

Correct Answer:B

Question 18

- (Exam Topic 3)
Smith is an IT technician that has been appointed to his company's network vulnerability assessment team. He is the only IT employee on the team. The other team members include employees from
Accounting, Management, Shipping, and Marketing. Smith and the team members are having their first meeting to discuss how they will proceed. What is the first step they should do to create the network
vulnerability assessment plan?

Correct Answer:D

START 312-49v10 EXAM