CCT240 EXAM PREP (CYBER SECURITY DATA
RECOVERY TECHNIQUES) QUESTIONS WITH
100% CORRECT ANSWERS!!
Flora recently received a mail from a bank that contained a malicious link along
with some instructions. The malicious link redirected her to a form requesting
details such as her name, phone number, date of birth, credit card number,
CVV code, SNNs, and email address. Identify the type of cybercrime being
performed on Flora in the above scenario. Answer - Phishing
Kane, a disgruntled employee of an organization, was waiting for an
opportunity to target the organization. One day, he gained access to the project
manager's system and copied all the secret codes to his portable device. After
copying, Kane handed over the code to a rival company, which released the
software to the public with their proprietary patents. Identify the type of attack
Kane has launched in the above scenario. Answer - Intellectual Property Theft
Which of the following acts contains Article 32, which deals with technical and
organizational measures to encrypt personal data and ensure the ongoing
confidentiality, integrity, availability, and resilience of processing systems and
services? Answer - GDPR
Which of the following phases of a forensic investigation involves acquiring,
preserving, and analyzing evidence found in the crime scene to identify the
culprit? Answer - Investigation Phase
Identify the member of an investigation team who provides legal advice on
conducting the investigation and addresses the legal issues involved in the
forensic investigation process. Answer - Attorney
,Which of the following components in the internal structure of a solid-state
drive (SSD) acts as a bridge between the flash memory components and the
system by executing firmware-level software? Answer - Controller
Which of the following phases of the UEFI boot process initializes the CPU,
permanent memory, and boot firmware volume (BFV) as well as locates and
initializes the hardware found in the system? Answer - Pre-EFI initialization
phase
Which of the following data acquisition formats consists of generic objects such
as volumes, streams, and graphs with externally accessible behavior? Answer -
AFF4
Which of the following techniques in digital forensics investigation involves a
backup program that an investigator should have in case certain hardware or
software does not work or a failure occurs during an acquisition? Answer -
Plan for contingency
Which of the following processes is defined as a set of techniques that
attackers or perpetrators use to avert or sidetrack a forensic investigation
process or substantially increase its difficulty? Answer - Anti-forensics
Which of the following countermeasures helps forensic experts overcome anti-
forensics attempts? Answer - Impose strict laws against the illegal use of anti-
forensics tools
Which of the following tools can be used by an investigator to view, retrieve,
and in some cases modify the metadata embedded in JPEG image files?
Answer - IrfanView
, Which of the following commands helps investigators retrieve information on
all active processes and open files? Answer - lsof
Identify the Volatility Framework plugin that provides information on all TCP
and UDP port connections, which can help in detecting any malicious network
communications running on a system? Answer - linux_netstat
Robert, a computer user, unintentionally installed software by clicking on a
malicious link of an insecure website. Upon installing the software, his system
degraded in performance and started showing signs of suspicious activities.
Which of the following types of attack is Robert a victim of? Answer - Malware
attack
Which of the following Apache web-server architecture elements handles
server startups/timeouts and contains the main server loop that waits for
connections? Answer - http_main
Which of the following parameters in the common log format of Apache
represents the client's IP address? Answer - %h
Which of the following commands is used by security specialists to check
whether sessions have been opened with other systems? Answer - C:> netstat
-na
While investigating a web attack on a Windows-based server, Jessy executed
the following command on her system: C:> net view <10.10.10.11> What was
Jessy's objective in running the above command? Answer - Verify the users
using open sessions
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller EvaTee. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $15.99. You're not tied to anything after your purchase.