Question 13

- (Topic 3)
Office documents (Word, Excel, PowerPoint) contain a code that allows tracking the MAC, or unique identifier, of the machine that created the document.
What is that code called?

Correct Answer:C

Question 14

- (Topic 3)
All Blackberry email is eventually sent and received through what proprietary RIM-operated mechanism?

Correct Answer:A

Question 15

- (Topic 3)
What header field in the TCP/IP protocol stack involves the hacker exploit known as the Ping of Death?

Correct Answer:A
The Ping of Death occurs when the ICMP Header field contains a packet size lager than 65507 bytes.

Question 16

- (Topic 1)
Which Is a Linux journaling file system?

Correct Answer:A

Question 17

- (Topic 3)
Which forensic investigating concept trails the whole incident from how the attack began to how the victim was affected?

Correct Answer:B

Question 18

- (Topic 3)
Chris has been called upon to investigate a hacking incident reported by one of his clients. The company suspects the involvement of an insider accomplice in the attack. Upon reaching the incident scene, Chris secures the physical area, records the scene using visual media. He shuts the system down by pulling the power plug so that he does not disturb the system in any way. He labels all cables and connectors prior to disconnecting any. What do you think would be the next sequence of events?

Correct Answer:B

START 312-49v9 EXAM