IISFA II0-001 Exam
II0-001 Certified Information Forensics Investigator (CIFI) (Page 8 )

Updated On: 7-Feb-2026

Which of the following are important to the investigator regarding logging?

  1. The logging methods
  2. Log retention
  3. Location of stored logs
  4. All of the above

Answer(s): D



Port 25 forgery involves:

  1. Manual communications with an SMTP server via telnet utility to forge header information.
  2. Removed SMTP packet headers for modification.
  3. A "man in the middle" attack that provides for forgery of layer 4 of the stack
  4. Opening at server, other than SMTP, on port 25 in order to capture inbound communications.

Answer(s): A



Active shunting is the process in which an malicious attack is detected and the traffic is:

  1. is routed, dynamically, through a CVP server for content filtering
  2. is a automatically squelched at the source of the attack using protocol squelching.
  3. is illegal due to its intrusive nature.
  4. is blocked via dynamic ACLs in firewall or infrastructure divides.

Answer(s): D



In order to prevent footprinting of an environment, one method that is effective is:

  1. Footprint shunting
  2. Network address translation at a perimeter security device
  3. ISPs monitoring and filtering footprinting activity
  4. None of the above

Answer(s): B



Because of overlapping security domains, it is impossible to have two perimeter security devices (firewalls) in successive layers.

  1. True
  2. False

Answer(s): B






Post your Comments and Discuss IISFA II0-001 exam prep with other Community members:

Join the II0-001 Discussion