Information Security Mock Exam - 600 Verified Questions

Page 1


Information Security

Mock Exam

Course Introduction

Information Security is a comprehensive course that introduces students to the fundamental principles and practices of protecting information systems from unauthorized access, use, disclosure, disruption, modification, or destruction. The course covers essential topics such as cryptography, risk assessment, access control, network security, security policies, and legal and ethical issues related to information security. Students will gain practical skills in identifying vulnerabilities, implementing security measures, and developing strategies for safeguarding data and maintaining system integrity in both organizational and individual contexts. This course prepares students for emerging challenges in the digital world and equips them with the knowledge needed to ensure the confidentiality, integrity, and availability of information assets.

Recommended Textbook

Computer Forensics Principles and Practices 1st Edition by Linda Volonino

Available Study Resources on Quizplus

13 Chapters

600 Verified Questions

600 Flashcards

Source URL: https://quizplus.com/study-set/2159 Page 2

Chapter 1: Forensic Evidence and Crime Investigation

Available Study Resources on Quizplus for this Chatper

33 Verified Questions

33 Flashcards

Source URL: https://quizplus.com/quiz/43035

Sample Questions

Q1) Crimes against computers can include which of the following?

A)Attacks on networks

B)Unauthorized access

C)Tampering with data

D)All the above

Answer: D

Q2) Based on preliminary evidence obtained at the start of an investigation,an investigator may form a(n)________ about what happened.

Answer: theory

Q3) ________ evidence is that type that could incorrectly lead an investigator to believe the evidence is related to the crime.

Answer: Artifact

Q4) Proper collection of evidence and handling procedures must be followed to ensure the evidence is ________.

Answer: admissible

Q5) Only ________ evidence supports or helps confirm a given theory.

Answer: inculpatory

Q6) ________ charges are those brought by a person or company.

Answer: Civil

To view all questions and flashcards with answers, click on the resource link above. Page 3

Chapter 2: Computer Forensics Anddigital Detective Work

Available Study Resources on Quizplus for this Chatper

28 Verified Questions

28 Flashcards

Source URL: https://quizplus.com/quiz/43036

Sample Questions

Q1) Which of the following is NOT considered one of the five stages of a computer investigation?

A)Intelligence

B)Hypothesis

C)Conviction

D)Conclusion

Answer: C

Q2) A(n)________ is a reasonable belief that a person has committed a crime.

Answer: probable cause

Q3) What unique piece of evidence finally gave police the break they'd needed in order to solve the BTK serial murderer case?

A)A phone number located within a computer

B)A USB drive with his deleted address

C)A floppy disk with his deleted address

D)A floppy disk with a deleted address of a church

Answer: D

Q4) ________ is a term generally used to indicate a message is hidden within another file.

Answer: Steganography

To view all questions and flashcards with answers, click on the resource link above. Page 4

Chapter 3: Tools, Environments, Equipment, and Certifications

Available Study Resources on Quizplus for this Chatper

48 Verified Questions

48 Flashcards

Source URL: https://quizplus.com/quiz/43037

Sample Questions

Q1) Write blocker

A) Unique digital signature of data

B) Additional sectors created to fill a cluster

C) Application that prevents changes to a hard drive

D) Captures a "snapshot" of everything on the drive

E) Mathematical computations that validate a copy

Answer: C

Q2) Hidden data

A) A file renamed to look like an operating system file

B) Data easily viewed through file manager programs

C) Cache files and history files

D) File space that is now available for being written to

Answer: A

Q3) ________,from Paraben Forensics,is a comprehensive tool for investigating the contents of Palm Pocket PCs that run on Windows CE.

Answer: PDA Seizure

Q4) When a copy is made,the contents of a hard drive are stored as a series of compressed ________ files.

Answer: image

To view all questions and flashcards with answers, click on the resource link above. Page 5

Chapter 4: Policies and Procedures

Available Study Resources on Quizplus for this Chatper

63 Verified Questions

63 Flashcards

Source URL: https://quizplus.com/quiz/43038

Sample Questions

Q1) If you encounter files that have been password protected,one option is to

A)Ask the user to give you the password

B)Reconfigure the BIOS to allow access to the file

C)Try a number of standard passwords to try to find a match

D)Consult a hacker site for help with the password

Q2) With the original evidence safely stored,you should make a(n)________ of the forensic image.

Q3) A(n)________ examination involves searches of the areas the operating system does not recognize as being normally used.

Q4) Bootable media

A)Useful for transferring large amounts of data or images

B)Necessary if there are no convenient plugs

C)Startup disks, CDs, or USB drives

D)Used to keep notes or upload photographs

E)Screwdrivers, pliers, duct tape

Q5) Common criteria for accepting a case include all of the following EXCEPT

A)Whether it is a criminal or civil case

B)The law enforcement agency in charge of the case

C)The potential impact upon the organization

D)Liability issues

Page 6

To view all questions and flashcards with answers, click on the resource link above.

Chapter 5: Data, PDA, and Cell Phone Forensics

Available Study Resources on Quizplus for this Chatper

45 Verified Questions

45 Flashcards

Source URL: https://quizplus.com/quiz/43039

Sample Questions

Q1) Most recent ZIP drives can handle up to what amount of data?

A)500GB

B)1GB

C)750MB

D)120MB

Q2) If a PDA is off at the time it is seized,it should be

A)Switched on

B)Attached to the forensic examiner platform

C)Left off

D)Plugged into the nearest power strip

Q3) ________ media use light from laser or LED sources to determine 0s and 1s.

Q4) Guidance software

A)Considered to be the gold standard

B)Highly regarded and able to generate detailed reports

C)Considered most reliable for hardware

D)Has Faraday bags

Q5) The simple rule for powering down equipment is that you pull the plug on everything but ________.

Q6) To understand how hardware works,you must understand the ________ of how drives store 0s and 1s.

Page 7

To view all questions and flashcards with answers, click on the resource link above.

Chapter 6: Operating Systems and Data Transmission

Basics for Digital Investigations

Available Study Resources on Quizplus for this Chatper

52 Verified Questions

52 Flashcards

Source URL: https://quizplus.com/quiz/43040

Sample Questions

Q1) The OSI model has ________ layers.

Q2) The set of rules that govern how commands are entered into DOS is called

Q3) FAT 16

A)Has an upper limit of \( 4 \mathrm{~GB} \) for file size

B)Has an upper limit of \( 2 \mathrm{~GB} \) for file size

C)Resembles a phone book

D)Lists other files and directories

Q4) The two main components of a FAT file system are the

A)file directory and root directory

B)file allocation table and root directory

C)root directory table and file allocation directory

D)file database and superuser directory

Q5) The Windows NT kernel operates in a protected method called ________ mode.

Q6) The Windows 95 ________ feature automated the installation of hardware.

Q7) Internet

A)Uses IP as its transmission protocol

B)The reliability layer

C)Handles physical aspects of a network

D)Routes packets over a network Page 8

To view all questions and flashcards with answers, click on the resource link above.

Page 9

Chapter 7: Investigating Windows, linux, and Graphic Files

Available Study Resources on Quizplus for this Chatper

57 Verified Questions

57 Flashcards

Source URL: https://quizplus.com/quiz/43041

Sample Questions

Q1) HKEY_USERS Default

A)Default

B)System

C)SAM

D)Software

Q2) Inodes

A)Contain metadata for each file

B)Unit of allocation for storage

C)Created for every file system mounted

D)Contains information about the directory structure

Q3) ________ are used to determine where data starts and ends when graphic files are located in unallocated or slack space.

Q4) Data block

A)Contain metadata for each file

B)Unit of allocation for storage

C)Created for every file system mounted

D)Contains information about the directory structure

Q5) A(n)________ is designed as a hierarchical listing of folders and files.

Q6) Files are first loaded into a(n)________ before being printed.

Q7) A(n)________ is created by the computer for each user.

To view all questions and flashcards with answers, click on the resource link above. Page 10

Chapter 8: E-Mail and Webmail Forensics

Available Study Resources on Quizplus for this Chatper

47 Verified Questions

47 Flashcards

Source URL: https://quizplus.com/quiz/43042

Sample Questions

Q1) Which of the following file extensions would most likely be found in an e-mail search for someone using Outlook?

A).eml

B).wab

C).dbx

D).mbx

Q2) Which RAID array uses a minimum of three disks,two for striping and one to store parity information?

A)RAID 9

B)RAID 5

C)RAID 3

D)RAID 1

Q3) The ________ comes before the @ sign in an e-mail address

Q4) Which of the following is NOT a webmail program?

A)Yahoo!Mail

B)Hotmail

C)LotusMail

D)Gmail

Q5) ________ uses two or more hard drives accessed in parallel to create a pool of storage.

11

To view all questions and flashcards with answers, click on the resource link above.

Chapter 9: Internet and Network Forensics and Intrusion Detection

Available Study Resources on Quizplus for this Chatper

39 Verified Questions

39 Flashcards

Source URL: https://quizplus.com/quiz/43043

Sample Questions

Q1) The ________ is a major source of forensic data in both the stand-alone and network forensic fields.

Q2) Software clients called ________ installed on network devices are designed to collect information from the host.

Q3) The NFAT software usually contains a query language such as A)IMS

B)IIS

C)SQL

D)PHP

Q4) A problem that can occur with IDS alerts is ________,when an IDS mistakenly flags an innocent file as being suspicious.

Q5) Identifying situations such as regular spikes in late-night traffic is an example of A)Pattern analysis

B)Content analysis

C)Playback analysis

D)Timeline sequencing analysis

Q6) A(n)________ is the standard operation procedures of the network when it is running normally.

Page 12

To view all questions and flashcards with answers, click on the resource link above.

Chapter 10: Tracking Down Those Who Intend to Do Harm

on a Large Scale

Available Study Resources on Quizplus for this Chatper

39 Verified Questions

39 Flashcards

Source URL: https://quizplus.com/quiz/43044

Sample Questions

Q1) Which of the following is NOT considered a tactic used by hackers to hijack a computer?

A)DoS attacks

B)Spamming activities

C)Phishing scams

D)Breaking and entering

Q2) assam.com

A)Alleged to have flashed pictures of persecuted Muslims

B)Designed to teach users to conduct attacks

C)Used by jihad in Afghanistan

D)Featured international news on al Qaeda

Q3) From May through June of 2002,the al Qaeda Web site appeared at a Web location in

A)Malaysia

B)Texas

C)Michigan

D)All of the above

Q4) Adversaries unable to counter the U.S.military on the battlefield instead exploit military ________.

Q5) David Smith and VicodinES both signed off using the word ________.

To view all questions and flashcards with answers, click on the resource link above. Page 13

Chapter 11: Fraud and Forensic Accounting Investigation

Available Study Resources on Quizplus for this Chatper

40 Verified Questions

40 Flashcards

Source URL: https://quizplus.com/quiz/43045

Sample

Questions

Q1) Section 302 of the ________ Act compels companies to report all occupational fraud regardless of the amount of the loss.

Q2) What is considered as the number one reason people feel pressured to commit fraud?

A)Financial problems

B)Health-related problems

C)The feeling of power in getting away with the deed

D)All of the above

Q3) Motive

A)Destroying documents prior to an investigation

B)Showing perp had a chance to commit crime

C)Is a strong circumstantial element

D)Finding multiple events of the same error

Q4) The law of ________ holds that some information is protected by law from being released.

Q5) All of the following are good advice about how to handle a fraud suspect EXCEPT

A)Make copies of suspicious documents secretly

B)Don't interview the suspect in his office

C)Show the suspect all the evidence you have collected

D)Convert a verbal confession into a written statement

Page 14

To view all questions and flashcards with answers, click on the resource link above.

Chapter 12: Federal Rules and Criminal Codes

Available Study Resources on Quizplus for this Chatper

49 Verified Questions

49 Flashcards

Source URL: https://quizplus.com/quiz/43046

Sample Questions

Q1) Pen/Trap Statute

A)When hijackings are suspected

B)Used to collect noncontent traffic

C)Creates a paper tape record of outgoing calls

D)Used when the information likely to be obtained is relevant to an ongoing criminal investigation

Q2) Electronic records that are business records made during the ordinary course of business are admissible under the

A)Business records exception rule

B)Hearsay evidence rule

C)Business exclusionary rule

D)Motion in limine rule

Q3) The ________ extended the Federal Wiretap Statute to include authority over digital transmissions over computer networks.

Q4) What are rules?

A)Regulations that govern legal conduct

B)Regulations that govern the conduct of the people

C)Regulations that govern a society

D)Expectations of the people for a decent society

To view all questions and flashcards with answers, click on the resource link above. Page 15

Chapter 13: Ethical and Professional Responsibility in Testimony

Available Study Resources on Quizplus for this Chatper

30 Verified Questions

30 Flashcards

Source URL: https://quizplus.com/quiz/43047

Sample Questions

Q1) ________ is intentionally making a false statement under oath.

Q2) Guidelines for how to respond to counsel include all of the following EXCEPT

A)Refuse to answer any questions to which you do not know the answer.

B)Do not allow anyone to rush you.

C)Direct your replies to the judge and jury.

D)Do not try to educate the questioner on the topic.

Q3) A common trap used by lawyers is to ask you to offer opinions outside ________.

Q4) As an expert witness,what should you NOT do while in court?

A)Be patient.

B)Try to be relaxed and look at the jury when answering.

C)Be truthful,careful,and precise.

D)Dress casually and comfortably.

Q5) As an expert witness,you are being paid for all the following EXCEPT

A)Your expertise

B)Your ability to prove guilt

C)Your time

D)Your expert view

Q7) Opposing counsel will do their best to ________ or discredit your testimony. Page 16

Q6) Everyone involved in the courts has a(n)________ to protect the legal system and the Constitution.

To view all questions and flashcards with answers, click on the resource link above.

Page 17

Turn static files into dynamic content formats.

Create a flipbook