IISFA II0-001 Exam
II0-001 Certified Information Forensics Investigator (CIFI) (Page 3 )

Updated On: 7-Feb-2026

All of the following are methods of auditing except:

  1. Internal audit
  2. External audit
  3. Thorough audit
  4. 3rd party audit

Answer(s): C



In selecting Forensic tools for collecting evidence in the investigation of a crime the standard for authenticating computer records is:

  1. The same for authenticating other records. The degree of authentication does not vary simply because a record happens to be (or has been at one point) in electronic form.
  2. Much more complex, and requires an expert to be present at each step of the process.
  3. To convert the technical terms & definitions into a basic understandable language to be presented as evidence.
  4. To ensure the tools are equipped with logging to document the steps of evidence collection.

Answer(s): C



"Interesting data" is:

  1. Data relevant to your investigation
  2. Pornography
  3. Documents, spreadsheets, and databases
  4. Schematics or other economic based information

Answer(s): A



Social engineer is legal in the United States, Great Britain, Canada, and Australia as long as the social engineer does not:

  1. Attempt to extract corporate secrets
  2. Lie
  3. Apply the Frye Scenario
  4. Live outside those countries

Answer(s): A



Drive geometry refers to

  1. The algorithms used to computer a specific location of a particular segment.
  2. The functional dimensions of a drive in terms of the number of heads, cylinders, and sectors per track.
  3. Physical dimensions of the drive platters.
  4. The depth of the pits on optical media or magnetic field charge on magnetic media

Answer(s): B






Post your Comments and Discuss IISFA II0-001 exam prep with other Community members:

Join the II0-001 Discussion