IISFA II0-001 Exam
II0-001 Certified Information Forensics Investigator (CIFI) (Page 2 )

Updated On: 7-Feb-2026

Firewalls are an excellent source of:

  1. Details of system usage
  2. Details of protocol usage
  3. Forensic Evidence for malicious attacks
  4. Port/service mappings

Answer(s): C



What technique of layered security design will allow for both investigation and recovery after an incident?

  1. RI Technology
  2. Highly available systems
  3. Overlap design approach
  4. Honeypot placement

Answer(s): B



If a CIFI violates the ISFA code of Ethics, her CIFI certification can be immediately revoked.

  1. True
  2. False

Answer(s): B



The 1st amendment allows hackers to exercise free speech by altering content on websites to express opposing viewpoints.

  1. True
  2. False

Answer(s): B



The term "Browser Artifacts" refer to:

  1. Web browser cache, cookies, favorites, history, auto complete information
  2. Older web browser applications that have little or no security and allow for unchecked use
  3. Older web browser applications that can be used as a surveillance tool for investigators due to their lack of security
  4. Web browser cookies

Answer(s): A






Post your Comments and Discuss IISFA II0-001 exam prep with other Community members:

Join the II0-001 Discussion