1. After identifying illegal activity on a small business computer, a business owner asks the office secretary to log into the system to retrieve various files. Which of the following aspects of procedural forensic analysis were violated in this scenario?
A) A. Data preservation B) B. Proper channel reporting C) C. Initial response identification D) D. Tracking of documentation
2. Which of the following is the MAXIMUM data transfer rate of Bluetooth v3.0?
A) A. 1Mbps B) B. 3Mbps C) C. 24Mbps D) D. 54Mbps
3. Which of the following is the MAXIMUM connection distance of a Bluetooth device?
A) A. 10 feet (3.05 meters) B) B. 30 feet (9.14 meters) C) C. 100 feet (30.48 meters) D) D. 300 feet (91.44 meters)
4. Which of the following frequencies does Bluetooth use?
A) A. 900MHz B) B. 1.8GHz C) C. 2.4GHz D) D. 5GHz
5. A technician has been asked to configure a printer to be shared amongst the users in a small workgroup. Each computer in the workgroup utilizes an existing wireless router for network connectivity. The printer to be configured only connects via USB. Which of the following should be implemented to share the printer so that implementation costs are kept to a minimum?
A) A. Connect the printer to a computer within the workgroup and share it from that computer B) B. Connect the printer to the wireless router and assign it its own network address C) C. Connect the printer to an external hardware print server and share it amongst the workgroup D) D. Connect the printer to a USB hub that each computer in the workgroup has access to
Leave a comment