Ini versi 2012 nya, versi terbaru kumpulan soal-soal exam computer forensic.
"312-49 (v.1) Computer Hacking Forensic Investigator. Computer hacking forensic investigation is the process of detecting hacking attacks and properly extracting evidence to report the crime and conduct audits to prevent future attacks."
Selamat berjuang gan:
Langsung aja di download disini gan:
entu ane host di google drive.
Berikut sekilas bocoran soalnya :
1. If a PDA is seized in an investigation while the device is turned on, what would be the proper procedure?
A. Keep the device powered on
B. Turn off the device
immediately
C. Remove the battery
immediately
D. Remove any memory
cards immediately
2. What hashing method is used to password
protect Blackberry devices?
A. AES
B. RC5
C. MD5
D. SHA-1
3. You have been asked to investigate the
possibility of computer fraud in the finance department of a company. It is
suspected that a staff member has been committing finance fraud by printing
cheques that have not been authorized. You have exhaustively searched all data
files on a bitmap image of the target computer, but have found no evidence. You
suspect the files may not have been saved.
What should you examine next in this case?
A. The registry
B. The swapfile
C. The recycle bin
D. The metadata
0 comments:
Post a Comment