Computer forensics CHFI with 100%
Verified Solutions | Already Passed
The iPhone OS ____ layer provides the fundamental services for applications such as Address
Book, Core Location, CFNetwork, Security, and SQLite. - ✔Core Services
The Linux ____ consists of modular components and subsystems that include device drivers,
protocols, scheduler, memory manager, virtual file system, and resource allocator. - ✔Kernal
____ is a wireless tool for Mac OS X that provides plug-ins for finding and discovering
information about AirPort networks, Bluetooth devices, and Bonjour services. - ✔iStumbler
____ is the process of synchronizing elements between a Palm handheld device and a desktop
PC. - ✔HotSync
The ____ state is the sleep mode of the PDA device, which conserves battery power to maintain
the user's data and perform other background activities. - ✔quiescent
Memory in Palm OS is arranged in chunks known as ____. - ✔records
In Windows CE, the ____ layer contains the OEM adaptation layer (OAL), drivers, and
configuration files. - ✔OEM
,In Palm OS, ____ RAM is analogous to the RAM installed on desktop computers, and it is used
as space for temporary allocation. - ✔Dynamic
The ____ tool attempts to confuse the connected wireless devices by sending deauthentication
packets. - ✔Aireplay
The first state of the PDA device when it is received from the manufacturer is the ____ state. -
✔Nascent
___ is data hiding and is meant to conceal the true meaning of a message - ✔Steganography
The ___ Attempts to eliminate driscrimination involving sexual harassment in the workplace,
educational itstitutions and other public places - ✔Australian Sex Discrimination Act of 1984
____ is the technique to garble a message in such a way that the meaning of the message is
changed - ✔Cyrptography
____ occurs when the intruder sends SYN packets (requests) to the host system faster than the
system can handle them. - ✔SYN Flooding
____ is a Linksys router log analyzer. It processes router log files, analyzes them, and then
generates a report based on the analysis. - ✔Sawmill
,A ____ is defined as the average packet rate of data packets with similar packet header
information - ✔Activity Profile
___ is a powerful tools that extracts network packets and performs statistical analsis on
those dumps. - ✔Tcpdump
A(n) ____ is an identifier string that indicates where a resource is located and the mechanism
needed to retrieve it. - ✔URL
The fraggle attack is a UDP variant of the ____ attack. - ✔Smurf
___ is a network-enabled espionage, in which an attacker uses the internet to perform
corporate espionage. - ✔netspionage
According to the USPTO, a ____ mark is any word, name, symbol, device, or any combination,
used, or intended to be used, in commerce, to identify and distinguish the services of one provider
from services provided by others, and to indicate the source of the services. - ✔Service
A ____ is a system that is put on a network that has no legitimate function. - ✔Honeypot
Espionage is the use of spies to gather information about the activities of an organization. -
✔True
, ____ is the method of wrapping data from one layer of the OSI model in a new data structure so
that each layer of the OSI model will only see and deal with the information it needs in order
to properly handle and deliver the data from one host to another on a computer network -
✔Encapsulation
A ____ is an abusive environment where an employee is subjected to unwelcomed sexual
advances from coworkers. - ✔Sexual Harrasment
____ is the process of gathering information about a network that may help an intruder attack the
network. - ✔Enumeration
____ is the U.K. hotline for reporting illegal content, specifically acting upon child sexual abuse
hosted worldwide, and content, hosted in the U.K., that is criminally obscene or incites racial
hatred. - ✔IWF Internet watch foundation
According to the USPTO, a ____ mark is a trademark or service mark used or intended to be
used, in commerce, by the members of a cooperative, an association, or other collective group
or organization, including a mark, which indicates membership in a union, an association, or
other organization. - ✔Collective
A(n) ____ is a suitor who desires a physical or intimate relationship with the victim. -
✔.Incompetent suitor
____ Centre is a U.K.-based anti-child-pornography organization. It focuses on protecting
children from sexual abuse. - ✔CEOP Child exploitation and online protection