Free II0-001 Exam Braindumps (page: 11)

Page 10 of 58

If a file is properly encrypted, it can not be read except by the file owner.

  1. True
  2. False

Answer(s): B



When electronic evidence has been encrypted, the best method of discovery is:

  1. Brute force to compromise the encryption.
  2. Attempt to brute force the key.
  3. Use a reverse MD5 Hash utility.
  4. You can not break contemporary encryption techniques.

Answer(s): B



What method can be used to detect the use of rogue servers providing services such as illegal software distribution, music files, pornography in an environment?

  1. A network protocol sniffer/analyzer
  2. Keymapping on all workstations in the environment
  3. Port 4090 listening
  4. Port 4099 listening

Answer(s): A



How many port/services are available using the TCP/IP suite?

  1. 6,553
  2. unlimited
  3. 65,535
  4. 65,353

Answer(s): C






Post your Comments and Discuss IISFA II0-001 exam with other Community members:

II0-001 Discussions & Posts