II0-001 Dumps

II0-001 Braindumps

II0-001 Real Questions II0-001 Practice Test

II0-001 Actual Questions


IISFA


II0-001


Certified Information Forensics Investigator (CIFI)


https://killexams.com/pass4sure/exam-detail/II0-001


QUESTION 223

Added "Received:" headers often include bogus information. All of the following items

except one, is usually incomplete:


  1. "To:" header

  2. IDs

  3. Path

  4. Dates


Answer: A


QUESTION 224

Generally, which header is used to reveal reliable information from forged emails:


  1. Reply-to header

  2. Return-receipt-to header

  3. Received header

  4. Comments header


Answer: C


QUESTION 225

Which tool is used to confirm the name or IP address of an Internet host:


  1. Ping

  2. Traceroute

  3. Nslookup

  4. Finger


Answer: C


QUESTION 226

In the OSI stack, which layer is associated with TCP transmissions?


  1. The application layer

  2. The data link layer

  3. The transport layer

  4. The network layer


Answer: C


QUESTION 227

The result of an attack Traceback can be characterized by these three parameters, the

degree of which determines success:


  1. confidentiality, integrity, and availability

  2. precision, integrity, and timeliness

  3. confidentiality, integrity, and accuracy

  4. precision, accuracy, and timeliness


Answer: D


QUESTION 228

A SYN attack exploits what aspect of TCP communications?


  1. Three-way handshake

  2. Unilateral communication

  3. Transport layer communication

  4. Connectionless oriented communication


Answer: A


QUESTION 229

Which method is NOT regarded as a prevention technique for IP spoofing:


  1. Not relying on IP address based authentication

  2. Intrusion Detection System implementation

  3. Encryption requirement on all network traffic

  4. Router based packet filtering


Answer: C