100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
Computer forensics CHFI with 100% Verified Solutions | Already Passed $13.24   Add to cart

Exam (elaborations)

Computer forensics CHFI with 100% Verified Solutions | Already Passed

 2 views  0 purchase
  • Course
  • CLASSROOM
  • Institution
  • CLASSROOM

Computer forensics CHFI with 100% Verified Solutions | Already Passed

Preview 4 out of 36  pages

  • October 23, 2024
  • 36
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • CLASSROOM
  • CLASSROOM
avatar-seller
Examsplug
Computer forensics CHFI with 100%
Verified Solutions | Already Passed



The iPhone OS ____ layer provides the fundamental services for applications such as Address
Book, Core Location, CFNetwork, Security, and SQLite. - ✔Core Services



The Linux ____ consists of modular components and subsystems that include device drivers,
protocols, scheduler, memory manager, virtual file system, and resource allocator. - ✔Kernal



____ is a wireless tool for Mac OS X that provides plug-ins for finding and discovering
information about AirPort networks, Bluetooth devices, and Bonjour services. - ✔iStumbler



____ is the process of synchronizing elements between a Palm handheld device and a desktop
PC. - ✔HotSync



The ____ state is the sleep mode of the PDA device, which conserves battery power to maintain
the user's data and perform other background activities. - ✔quiescent




Memory in Palm OS is arranged in chunks known as ____. - ✔records



In Windows CE, the ____ layer contains the OEM adaptation layer (OAL), drivers, and
configuration files. - ✔OEM

,In Palm OS, ____ RAM is analogous to the RAM installed on desktop computers, and it is used
as space for temporary allocation. - ✔Dynamic



The ____ tool attempts to confuse the connected wireless devices by sending deauthentication
packets. - ✔Aireplay



The first state of the PDA device when it is received from the manufacturer is the ____ state. -
✔Nascent




___ is data hiding and is meant to conceal the true meaning of a message - ✔Steganography



The ___ Attempts to eliminate driscrimination involving sexual harassment in the workplace,
educational itstitutions and other public places - ✔Australian Sex Discrimination Act of 1984




____ is the technique to garble a message in such a way that the meaning of the message is
changed - ✔Cyrptography



____ occurs when the intruder sends SYN packets (requests) to the host system faster than the
system can handle them. - ✔SYN Flooding



____ is a Linksys router log analyzer. It processes router log files, analyzes them, and then
generates a report based on the analysis. - ✔Sawmill

,A ____ is defined as the average packet rate of data packets with similar packet header
information - ✔Activity Profile



___ is a powerful tools that extracts network packets and performs statistical analsis on
those dumps. - ✔Tcpdump




A(n) ____ is an identifier string that indicates where a resource is located and the mechanism
needed to retrieve it. - ✔URL




The fraggle attack is a UDP variant of the ____ attack. - ✔Smurf




___ is a network-enabled espionage, in which an attacker uses the internet to perform
corporate espionage. - ✔netspionage




According to the USPTO, a ____ mark is any word, name, symbol, device, or any combination,
used, or intended to be used, in commerce, to identify and distinguish the services of one provider
from services provided by others, and to indicate the source of the services. - ✔Service




A ____ is a system that is put on a network that has no legitimate function. - ✔Honeypot



Espionage is the use of spies to gather information about the activities of an organization. -
✔True

, ____ is the method of wrapping data from one layer of the OSI model in a new data structure so
that each layer of the OSI model will only see and deal with the information it needs in order
to properly handle and deliver the data from one host to another on a computer network -
✔Encapsulation




A ____ is an abusive environment where an employee is subjected to unwelcomed sexual
advances from coworkers. - ✔Sexual Harrasment



____ is the process of gathering information about a network that may help an intruder attack the
network. - ✔Enumeration



____ is the U.K. hotline for reporting illegal content, specifically acting upon child sexual abuse
hosted worldwide, and content, hosted in the U.K., that is criminally obscene or incites racial
hatred. - ✔IWF Internet watch foundation




According to the USPTO, a ____ mark is a trademark or service mark used or intended to be
used, in commerce, by the members of a cooperative, an association, or other collective group
or organization, including a mark, which indicates membership in a union, an association, or
other organization. - ✔Collective




A(n) ____ is a suitor who desires a physical or intimate relationship with the victim. -
✔.Incompetent suitor



____ Centre is a U.K.-based anti-child-pornography organization. It focuses on protecting
children from sexual abuse. - ✔CEOP Child exploitation and online protection

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Examsplug. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $13.24. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

72042 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$13.24
  • (0)
  Add to cart