CORRECT QUESTIONS AND VERIFIED DETAILED ANSWERS |FREQUENTLY TESTED
QUESTIONS AND SOLUTIONS |ALREADY GRADED A+|NEWEST|GUARANTEED
PASS|LATEST UPDATE
Which law requires both parties to consent to the recording of a conversation? - correct answerECPA (Electronic
Communications Privacy Act)
Which law is related to the disclosure of personally identifiable protected health information (PHI)? - correct answerHealth
Insurance Portability and Accountability Act (HIPAA)
Which U.S. law criminalizes the act of knowingly using a misleading domain name with the intent to deceive a minor into
viewing harmful material? - correct answer18 U.S.C. 2252B
Which U.S. law protects journalists from turning over their work or sources to law enforcement before the information is
shared with the public? - correct answerThe Privacy Protection Act (PPA)
Which law or guideline lists the four states a mobile device can be in when data is extracted from it? - correct answerNIST
SP 800-72 Guidelines
Which law includes a provision permitting the wiretapping of VoIP calls? - correct answerCommunications Assistance to
Law Enforcement Act (CALEA)
Which policy is included in the CAN-SPAM Act? - correct answerThe email sender must provide some mechanism
whereby the receiver can opt out of future emails and that method cannot require the receiver to pay in order to opt out.
Which United States law requires telecommunications equipment manufacturers to provide built-in surveillance capabilities
for federal agencies? - correct answerCommunication Assistance to Law Enforcement Act (CALEA)
Which law requires a search warrant or one of the recognized exceptions to the search warrant requirements for searching
email messages on a computer? - correct answerThe Fourth Amendment to the U.S. Constitution
Where are local passwords stored for the Windows operating system? - correct answerSAM file in \Windows\System32\
Where on a Windows system is the config folder located that contains the SAM file? - correct answerC:\Windows\
System32
A forensic examiner wants to try to extract passwords for wireless networks to which a system was connected. Where
should passwords for wireless networks be stored on a Windows XP system? - correct answerRegistry
Which Windows password cracking tool uses rainbow tables? - correct answerOphcrack
How does a rainbow table work to crack a password? - correct answerIt uses a table of all possible keyboard combinations
and their hash values, then searches for a match.
What should a forensic investigator use to gather the most reliable routing information for tracking an email message? -
correct answerEmail header
Which activity involves email tracing? - correct answerDetermining the ownership of the source email server
A forensic examiner reviews a laptop running OS X which has been compromised. The examiner wants to know if there
were any mounted volumes created from USB drives. Which digital evidence should be reviewed? - correct answer/var/log
Which log or folder contains information about printed documents on a computer running Mac OS X? - correct
answer/var/spool/cups
Which Windows event log should be checked for evidence of invalid logon attempts? - correct answerSecurity
A cyber security organization has issued a warning about a cybercriminal who is using a known vulnerability to attack