Which of the following is a standard Unix command that would most likely be used to copy raw file
system data for later forensic analysis?
A
Which of the following is NOT a recommended best practice for securing Terminal Services and
Remote Desktop?
B
When an IIS filename extension is mapped, what does this mean?
B
Which Linux file lists every process that starts at boot time?
D
When trace route fails to get a timely response for a packet after three tries, which action will it take?
D
You are examining an IP packet with a header of 40 bytes in length and the value at byte 0 of the
packet header is 6. Which of the following describes this packet?
C
Which of the following is a valid password for a system with the default "Password must meet
complexity requirements" setting enabled as part of the GPO Password policy requirements?
D
At what point in the Incident Handling process should an organization determine its approach to
notifying law enforcement?
D
Which of the following is TRUE regarding the ability of attackers to eavesdrop on wireless
communications?
B
An employee is currently logged into the corporate web server, without permission. You log into the
web server as 'admin" and look for the employee's username: "dmaul" using the "who" command.
This is what you get back:
B