Free CFA-001 Exam Braindumps (page: 5)

Page 4 of 46

Network forensics allows Investigators to inspect network traffic and logs to identify and locate the attack system. Network forensics can reveal: (Select three answers)

  1. Source of security incidents' and network attacks
  2. Path of the attack
  3. Intrusion techniques used by attackers
  4. Hardware configuration of the attacker's system

Answer(s): A,B,C



Determine the message length from following hex viewer record:

  1. 6E2F
  2. 13
  3. 27
  4. 810D

Answer(s): D



TCP/IP (Transmission Control Protocol/Internet Protocol) is a communication protocol used to connect different hosts in the Internet. It contains four layers, namely the network interface layer. Internet layer, transport layer, and application layer.
Which of the following protocols works under the transport layer of TCP/IP?

  1. UDP
  2. HTTP
  3. FTP
  4. SNMP

Answer(s): A



Which of the following statements does not support the case assessment?

  1. Review the case investigator's request for service
  2. Identify the legal authority for the forensic examination request
  3. Do not document the chain of custody
  4. Discuss whether other forensic processes need to be performed on the evidence

Answer(s): C






Post your Comments and Discuss GAQM CFA-001 exam with other Community members:

CFA-001 Discussions & Posts