Computer Lab for Rent
Meeting Room Rental
Training Facility Rental
Exam Testing Center
Purchase Exam Vouchers
Custom Course Development
Who We Are
Work With Us
Take this free CHFI quiz to get your Forensic career started! :
Step 1 of 11
Which of the following password cracking techniques works like a dictionary attack, but adds some numbers and symbols to the words from the dictionary and tries to crack the password?
Brute forcing attack
MAC filtering is a security access control methodology, where a ___________ is assigned to each network card to determine access to the network
Which of the following Steganography techniques allows you to encode information that ensures creation of cover for secret communication?
Transform domain techniques
Cover generation techniques
Spread spectrum techniques
The disk in the disk drive rotates at high speed, and heads in the disk drive are used only to read data.
In which step of the computer forensics investigation methodology would you run MD5 checksum on the evidence?
Evaluate and secure the scene
Acquire the data
Obtain search warrant
Collect the evidence
As part of the testing phase in the SDLC, a software developer wants to verify that an application is properly handling user error exceptions. Which of the following is the BEST tool or process for the developer use?
It is the process of shutting down a computer from a powered-on or on state
It is the process of restarting a computer that is already in sleep mode
It is the process of restarting a computer that is already turned on through the operating system
It is the process of starting a computer from a powered-down or off state
WPA2 provides enterprise and Wi-Fi users with stronger data protection and network access control which of the following encryption algorithm is used DVWPA2?
FAT32 is a 32-bit version of FAT file system using smaller clusters and results in efficient storage capacity. What is the maximum drive size supported?
A company contracts with a third party to develop a new web application to process credit cards. Which of the following assessments will give the company the GREATEST level of assurance for the web application?
Identify the legal authority for the forensic examination request
Discuss whether other forensic processes need to be performed on the evidence
Review the case investigator's request for service
Do not document the chain of custody