GAQM CFA-001 Certified Forensic Analyst CFA Exam Practice Test

Page: 1 / 14
Total 180 questions
Question 1

Log management includes all the processes and techniques used to collect, aggregate, and analyze computer-generated log messages. It consists of the hardware, software, network and media used to generate, transmit, store, analyze, and dispose of log data.



Answer : A


Question 2

During first responder procedure you should follow all laws while collecting the evidence, and contact a computer forensic examiner as soon as possible



Answer : A


Question 3

Tracks numbering on a hard disk begins at 0 from the outer edge and moves towards the center, typically reaching a value of ___________.



Answer : A


Question 4

You should always work with original evidence



Answer : B


Question 5

During the seizure of digital evidence, the suspect can be allowed touch the computer system.



Answer : B


Question 6

Networks are vulnerable to an attack which occurs due to overextension of bandwidth, bottlenecks, network data interception, etc.

Which of the following network attacks refers to a process in which an attacker changes his or her IP address so that he or she appears to be someone else?



Answer : A


Question 7

Steganography is a technique of hiding a secret message within an ordinary message and extracting it at the destination to maintain the confidentiality of data.



Answer : A


Page:    1 / 14   
Total 180 questions