Windows 10
BDDC Ch. 11
BDDC Ch. 12
CHFI Mod. 6
CHFI Mod. 7
100

Number of bits in an IPv4 address.

What is 32 bits.

100

This map includes a process, receive event, send event, and process link.

What is the Process MAP?

100

Three parts of the analysis phase.

What is research about the organization and its competitors, a list of ICT-mediated objectives, and a gap analysis?

  

100

The following is the temporary storage area where the system stores data during copy-and-paste operations.

What is clipboard contents?


100

The following command assists investigators in determining how long the system has been running since its last restart?

What is uptime?

200

This command is used to determine the route a packet takes.

What is tracert?

200

BPM is typically the responsibility of this role, though others in the organization are also involved.

Who is a Business System Analyst?

200

The Business-Driven Infrastructure Design Cycle includes 4 Phases.


What is Analysis, Implementation, Post-Implementation, and Design? 

200

Forensic investigators use these tools to examine the Zone.Identifier streams of downloaded files.

What is Windows PowerShell? 



200

An investigator wants to extract information about the status of network interface cards (NICs) in an organization's network. This is the command-line utility that would help the investigator detect the network status.

What is ipconfig?

300

This NTFS permission should be configured for a security group when you want members of the group to be able to create new files but not be able to make changes to existing files.

What is Write?

300

In BPMN diagrams, the two types of objects are called these.

What are Pools and Lanes?

300

The Design Phase includes 3 stages.


What is Reviewing recommendations, Gap analysis, Plans for improved processes?

300

The Windows Registry key that tracks every device connected to the computer as well as the allotted drive letter used by NTFS.

What is MountedDevices?



300

Identify the command that helps investigators extract information about past user logins on a Mac system to determine unauthorized access.

What is last command? 



400

The following are containers in a domain that allow you to organize and group resources for easier administration, including providing for delegating administrative rights.

What are organizational units?

400

Among common technologies, this one is typically the slowest communication speed?

What is ISDN?

400

The Post-Implementation Phase includes 3 stages.

What is Final monitoring data collected, Customer Survey results, and recommendations for future projects? 

  

400

This command allows a user to map the network drives to a local computer?

What is net use?

400

The following utility helps investigators view the list of all commands previously executed in the terminal session by the currently logged-in user.

What is history?

500

This command is recommended for activating Windows for large networks?

What is KMS?

500

When calculating the cost of bandwidth, these three factors should be considered.

What is Customer Opportunity Costs, Employee Opportunity Costs, and Time Saving?

500

The Implementation Phase includes 4 stages.


What is check for site readiness for recommended hardware and software, documented plan, list of equipment serial numbers, and documented testing plan?

  

  

500

An insider/attacker attempts to print confidential data related to an organization using a Windows machine. In this case, what file should the forensic investigator examine to retrieve details such as the number of copies printed, the owner of the document, and the document printed?

What is spool files?

500

The following colored dots in the Type column of the Mac console indicates debug log messages.

What is dark grey?