GAQM CFA-001 Certified Forensic Analyst CFA Exam Practice Test

Page: 1 / 14
Total 180 questions
Question 1

Digital evidence validation involves using a hashing algorithm utility to create a binary or hexadecimal number that represents the uniqueness of a data set, such as a disk drive or file.

Which of the following hash algorithms produces a message digest that is 128 bits long?



Answer : B


Question 2

What document does the screenshot represent?



Answer : A


Question 3

A forensic investigator is a person who handles the complete Investigation process, that is, the preservation, identification, extraction, and documentation of the evidence. The investigator has many roles and responsibilities relating to the cybercrime analysis. The role of the forensic investigator is to:



Answer : C


Question 4

Which of the following is not a part of disk imaging tool requirements?



Answer : D


Question 5

What is the first step that needs to be carried out to crack the password?



Answer : A


Question 6

A mobile operating system manages communication between the mobile device and other compatible devices like computers, televisions, or printers.

Which mobile operating system architecture is represented here?



Answer : C


Question 7

Operating System logs are most beneficial for Identifying or Investigating suspicious activities involving a particular host. Which of the following Operating System logs contains information about operational actions performed by OS components?



Answer : A


Page:    1 / 14   
Total 180 questions