The MD5 hashing algorithm produces a number (message digest) of what size regardless of how large the submitted source data.
A. Its a function of the size of the input field
B. 512 bit
C. 32 bit
D. 128 bit
正解:D
質問 2:
All of the following are methods of auditing except:
A. Thorough audit
B. 3rd party audit
C. External audit
D. Internal audit
正解:A
質問 3:
During a message processing, headers will be added to the message at all times except?
A. At time message is opened by recipient
B. at the time of transfer from sending to receiving server
C. when an email client hands control to outgoing server
D. composition time
正解:A
質問 4:
The following methods are used to ensure an employer is not violating Title III provisions for employee privacy except:
A. Expressed Consent
B. Special Waiver
C. Implied Consent
D. E-Mail Signatures
正解:B
質問 5:
At the current time, tools commonly used by law enforcement investigators fall into one of three categories:
A. Methods to detect encrypted information, legal right to keystroke monitoring and circumventing encryption with known keys.
B. Attack tool signature database, physical collections, and network sniffers.
C. Disk-imaging products, write blockers, and selected suites.
D. Network sniffers, finger print pack, and iodine.
正解:C
質問 6:
Copies of original evidence, such as disks and other media, are considered what in court unless they are collected during the normal course of business operations?
A. Hearsay evidence
B. Circumstantial evidence
C. Real evidence
D. None of the above
正解:A
質問 7:
The following are all keyloggers except:
A. Device Driver Keylogger
B. Keymapping Keylogger
C. API Keyloggers
D. Low Level Keyloggers
正解:B
質問 8:
It has been determined that a system on your network has been compromised. What should you do on your IDS and firewalls as soon as possible?
A. Verify all systems are using the same NTP server - document any issues
B. Reboot the IDS', firewalls and compromised systems for a clean startup
C. Verify a sniffer hasn't been installed on the compromised system
D. Verify the IDS' & Firewalls haven't been compromised, as well
正解:D
質問 9:
During a brute force attack, an active trace may be initiated using what tool?
A. Firewall log
B. ARP
C. ARP/Traceroute
D. Traceroute
正解:A
Momokawa -
重要用語集やよくでる重要公式集も付き、II0-001試験対策に必携の1冊ですね