00:00

QUESTION 131

- (Exam Topic 2)
The process of restarting a computer that is already turned on through the operating system is called?

Correct Answer: A

QUESTION 132

- (Exam Topic 3)
What is the purpose of using Obfuscator in malware?

Correct Answer: C

QUESTION 133

- (Exam Topic 1)
The police believe that Melvin Matthew has been obtaining unauthorized access to computers belonging to numerous computer software and computer operating systems manufacturers, cellular telephone manufacturers, Internet Service Providers and Educational Institutions. They also suspect that he has been stealing, copying and misappropriating proprietary computer software belonging to the several victim companies. What is preventing the police from breaking down the suspects door and searching his home and seizing all of his computer equipment if they have not yet obtained a warrant?

Correct Answer: A

QUESTION 134

- (Exam Topic 1)
After passively scanning the network of Department of Defense (DoD), you switch over to active scanning to identify live hosts on their network. DoD is a large organization and should respond to any number of scans. You start an ICMP ping sweep by sending an IP packet to the broadcast address. Only five hosts respond to your ICMP pings; definitely not the number of hosts you were expecting. Why did this ping sweep only produce a few responses?

Correct Answer: D

QUESTION 135

- (Exam Topic 4)
What is the extension used by Windows OS for shortcut files present on the machine?

Correct Answer: C