IISFA II0-001 Exam
II0-001 Certified Information Forensics Investigator (CIFI) (Page 5 )

Updated On: 7-Feb-2026

One caution an investigator should take when examining the source of a network attack is:

  1. an occurrence of Social Engineering
  2. relaxed physical security
  3. the source IP address may have been spoofed
  4. a sniffer could be on the network

Answer(s): C



Stream comparison used as a Traceback technique focuses on what two factors?

  1. the IP address and victim port
  2. the packet contents and audit logs
  3. inter-packet timing and the victim port
  4. the packet contents and inter-packet timing

Answer(s): D



To perform a successful traceback, the two most prominent problems that need to be solved are locating the source of IP packets and:

  1. the timestamp of the event
  2. determining the first node of a connection chain
  3. the reflector host
  4. the victim port

Answer(s): B



The most important network information that should be observed from the logs during a Traceback is the intruder IP address, the victim IP address, the victim port, protocol information and the:

  1. source port
  2. operating system
  3. MAC address
  4. timestamp

Answer(s): D



A new protocol that is designed to aid in intrusion protection and IP tracebacks is known as:

  1. Intruder Detection and Isolation Protocol (IDIP)
  2. Intrusion Detection and Traceback Protocol (IDTP)
  3. Facilitating Traceback Protocol (FTP)
  4. Intruder Detection and Internet Protocol (IDIP)

Answer(s): A






Post your Comments and Discuss IISFA II0-001 exam prep with other Community members:

Join the II0-001 Discussion