Computer Lab for Rent
Meeting Room Rental
Training Facility Rental
Exam Testing Center
Purchase Exam Vouchers
Custom Course Development
Who We Are
Work With Us
Take this free CHFI quiz to get your Forensic career started! :
Step 1 of 11
In which step of the computer forensics investigation methodology would you run MD5 checksum on the evidence?
Collect the evidence
Obtain search warrant
Acquire the data
Evaluate and secure the scene
MAC filtering is a security access control methodology, where a ___________ is assigned to each network card to determine access to the network
The disk in the disk drive rotates at high speed, and heads in the disk drive are used only to read data.
A company contracts with a third party to develop a new web application to process credit cards. Which of the following assessments will give the company the GREATEST level of assurance for the web application?
Review the case investigator's request for service
Discuss whether other forensic processes need to be performed on the evidence
Do not document the chain of custody
Identify the legal authority for the forensic examination request
Which of the following password cracking techniques works like a dictionary attack, but adds some numbers and symbols to the words from the dictionary and tries to crack the password?
Brute forcing attack
As part of the testing phase in the SDLC, a software developer wants to verify that an application is properly handling user error exceptions. Which of the following is the BEST tool or process for the developer use?
It is the process of shutting down a computer from a powered-on or on state
It is the process of restarting a computer that is already turned on through the operating system
It is the process of starting a computer from a powered-down or off state
It is the process of restarting a computer that is already in sleep mode
WPA2 provides enterprise and Wi-Fi users with stronger data protection and network access control which of the following encryption algorithm is used DVWPA2?
Which of the following Steganography techniques allows you to encode information that ensures creation of cover for secret communication?
Cover generation techniques
Transform domain techniques
Spread spectrum techniques
FAT32 is a 32-bit version of FAT file system using smaller clusters and results in efficient storage capacity. What is the maximum drive size supported?