Question 43

- (Topic 3)
A suspect is accused of violating the acceptable use of computing resources, as he has visited adult websites and downloaded images. The investigator wants to demonstrate that the suspect did indeed visit these sites. However, the suspect has cleared the search history and emptied the cookie cache. Moreover, he has removed any images he might have downloaded. What can the investigator do to prove the violation? Choose the most feasible option.

Correct Answer:A

Question 44

- (Topic 3)
What will the following command produce on a website login page? SELECT email, passwd, login_id, full_name FROM members WHERE email = 'someone@somehwere.com';
DROP TABLE members; --'

Correct Answer:C
The third line deletes the table named members.

Question 45

- (Topic 1)
Centralized logging is defined as gathering the computer system logs for a group of systems in a centralized location. It is used to efficiently monitor computer system logs with the frequency required to detect security violations and unusual activity.

Correct Answer:A

Question 46

- (Topic 3)
In General, ____ Involves the investigation of data that can be retrieved from the hard disk or other disks of a computer by applying scientific methods to retrieve the data.

Correct Answer:D

Question 47

- (Topic 2)
What term is used to describe a cryptographic technique for embedding information into something else for the sole
purpose of hiding that information from the casual observer?

Correct Answer:B

Question 48

- (Topic 3)
Area density refers to:

Correct Answer:AC

START 312-49v9 EXAM