Month End Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

GIAC GSLC GIAC Security Leadership Certification (GSLC) Exam Practice Test

Demo: 85 questions
Total 567 questions

GIAC Security Leadership Certification (GSLC) Questions and Answers

Question 1

Which of the following applications work as mass-emailing worms?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Nimda virus

B.

I LOVE YOU virus

C.

Melissa virus

D.

Chernobyl virus

Question 2

PassGuide Research and Training Center is developing its new network model. Which of the following protocols should be implemented in the new network? (Click the Exhibit button on the toolbar to see the case study.) Each correct answer represents a complete solution. Choose two.

Options:

A.

IPX/SPX

B.

NetBEUI

C.

TCP/IP

D.

AppleTalk

Question 3

You work as a Network Administrator for Tech Perfect Inc. The company has a TCP/IP-based network. Rick, your assistant, is configuring some laptops for wireless access. For security, WEP needs to be configured for wireless communication. By mistake, Rick configures different WEP keys in a laptop than that is configured on the Wireless Access Point (WAP). Which of the following statements is true in such situation?

Options:

A.

The laptop will be able to access the wireless network but other wireless devices will be unable to communicate with it.

B.

The laptop will be able to access the wireless network but the security will be compromised.

C.

The WAP will allow the connection with the guest account's privileges.

D.

The laptop will not be able to access the wireless network.

Question 4

Which of the following tools can be used for the anti-phishing?

Options:

A.

Legion

B.

Spector

C.

Netcraft

D.

eblaster

Question 5

Which of the following statements are true about WPA?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

WPA provides better security than WEP.

B.

Shared-key WPA is vulnerable to password cracking attacks if a weak passphrase is used.

C.

WPA-PSK converts the passphrase into a 256-bit key.

D.

WPA-PSK requires a user to enter an 8-character to 63-character passphrase into a wireless client.

Question 6

A Web developer with your company wants to have wireless access for contractors that come in to work on various projects. The process of getting this approved takes time. So rather than wait, he has put his own wireless router attached to one of the network ports in his department. What security risk does this present?

Options:

A.

It is likely to increase network traffic and slow down network performance.

B.

An unauthorized WAP is one way for hackers to get into a network.

C.

None, adding a wireless access point is a common task and not a security risk.

D.

This circumvents network intrusion detection.

Question 7

You are the Network Administrator for a bank. In addition to the usual security issues, you are concerned that your customers could be the victim of phishing attacks that use fake bank Web sites.

Which of the following would protect against this?

Options:

A.

Three factor authentication

B.

Two factor authentication

C.

Mutual authentication

D.

MAC

Question 8

Which of the following security protocols can be used to support MS-CHAPv2 for wireless client authentication?

Each correct answer represents a complete solution. Choose two.

Options:

A.

HTTP

B.

PEAP

C.

IPSec

D.

PPTP

Question 9

You work as a Security manager for Caterxiss Inc. The headquarters of your company is connected to the branch office in another state and a service partner in the same state. The network of the company is being attacked from the connected networks. You decide to analyze and then prevent the corporate headquarters network from these attacks using a Snort IDS.

What is the most appropriate spot on the network where you should set up an Intrusion detection system (IDS)?

Options:

A.
Question 10

Dawn is the project manager of the HQQ Project and she believes the project work is done. She has prepared the final project report, which includes information on the financial performance, schedule performance, and project team performance in the project. All of the following documents are used to measure the completeness of the project scope except for which one?

Options:

A.

Project charter

B.

Project WBS Dictionary

C.

Project scope statement

D.

Project WBS

Question 11

Which of the following types of cryptography algorithms uses the MD series of encryption algorithms?

Options:

A.

Digital signature

B.

Hash algorithm

C.

Public-key

D.

Quantum

Question 12

You are the program manager for your project. You are working with the project managers regarding the procurement processes for their projects. You have ruled out one particular contract type because it is considered too risky for the program. Which one of the following contract types is usually considered to be the most dangerous for the buyer?

Options:

A.

Cost plus incentive fee

B.

Cost plus percentage of costs

C.

Time and materials

D.

Fixed fee

Question 13

Which of the following tools is used to attack the Digital Watermarking?

Options:

A.

2Mosaic

B.

Gifshuffle

C.

Active Attacks

D.

Steg-Only Attack

Question 14

A management workstation collects and connects events from multiple IPS sensors in the network.

Which protocol is used in this process?

Options:

A.

SNMP

B.

SCCP

C.

SRTP

D.

SDEE

Question 15

Maria has been recently appointed as a Network Administrator in Gentech Inc. She has been tasked to perform network security testing to find out the vulnerabilities and shortcomings of the present network infrastructure. Which of the following testing approaches will she apply to accomplish this task?

Options:

A.

Black-box testing

B.

White-box testing

C.

Unit testing

D.

Gray-box testing

Question 16

GSM uses either A5/1 or A5/2 stream cipher for ensuring over-the-air voice privacy. Which of the following cryptographic attacks can be used to break both ciphers?

Options:

A.

Man-in-the-middle attack

B.

Known plaintext attack

C.

Replay attack

D.

Ciphertext only attack

Question 17

Which of the following can be used as a countermeasure against the SQL injection attack?

Each correct answer represents a complete solution. Choose two.

Options:

A.

mysql_escape_string()

B.

session_regenerate_id()

C.

mysql_real_escape_string()

D.

Prepared statement

Question 18

Which of the following functions can you use to mitigate a command injection attack?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

escapeshellcmd()

B.

escapeshellarg()

C.

htmlentities()

D.

strip_tags()

Question 19

You have forgotten your password of an online shop. The web application of that online shop asks you to enter your email so that they can send you a new password. You enter your email you@gmail.com' and press the submit button. The Web application displays the server error. What can be the reason of the error?

Options:

A.

The remote server is down.

B.

Email entered is not valid.

C.

Your internet connection is slow.

D.

You have entered any special character in email.

Question 20

John works as a Network Security Professional. He is assigned a project to test the security of www.we-are-secure.com. He is working on the Linux operating system and wants to install an Intrusion Detection System on the We-are-secure server so that he can receive alerts about any hacking attempts. Which of the following tools can John use to accomplish the task?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

SARA

B.

Snort

C.

Tripwire

D.

Samhain

Question 21

Which key of the Asymmetric encryption is used to encrypt the data when a user sends a message or data to another user?

Options:

A.

Symmetric

B.

Private

C.

Public

D.

Asymmetric

Question 22

Which of the following methods will allow data to be sent on the Internet in a secure format?

Options:

A.

Virtual Private Networks

B.

Serial Line Interface Protocol

C.

Browsing

D.

Point-to-Point Protocol

Question 23

Which of the following terms refers to a prolonged loss of power?

Options:

A.

Spike

B.

Brownout

C.

Surge

D.

Blackout

Question 24

Which of the following is the encryption subsystem of the NTFS file system?

Options:

A.

IIS

B.

RSA

C.

ECC

D.

EFS

Question 25

Which of the following viruses replaces the boot sector data with its own malicious code?

Options:

A.

Chernobyl

B.

Explore.Zip

C.

MBR

D.

Nimda

Question 26

Which of the following is a process of monitoring data packets that travel across a network?

Options:

A.

SCP protocol

B.

Packet sniffing

C.

Rootkit

D.

ICMP

Question 27

Which of the following attacks can be performed by Brutus for cracking a password?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Hybrid attack

B.

Replay attack

C.

Brute force attack

D.

Man-in-the-middle attack

Question 28

You are concerned about attackers simply passing by your office, discovering your wireless network, and getting into your network via the wireless connection. Which of the following are NOT steps in securing your wireless connection?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Using either WEP or WPA encryption

B.

Hardening the server OS

C.

MAC filtering on the router

D.

Not broadcasting SSID

E.

Strong password policies on workstations.

Question 29

John works as an IT Technician for PassGuide Inc. One morning, John receives an e-mail from the company's Manager asking him to provide his logon ID and password, but the company policy restricts users from disclosing their logon IDs and passwords. Which type of possible attack is this?

Options:

A.

Social engineering

B.

DoS

C.

Trojan horse

D.

Replay attack

Question 30

You are the project manager for an important, high-profile project in your matrix structure. The project team members must work with a new technology that most of the team does not have experience with. What should you do in this scenario?

Options:

A.

Consult with the project sponsor to procure additional, experienced project team members.

B.

Consult with the project customer to determine if the scope can be trimmed to meet the current competency level.

C.

Consult with functional management in the matrix structure to determine if there are more suitable project team members.

D.

Consult with the project team to determine what type of training is needed.

Question 31

Which type of DNS zone is a read-only copy of the primary DNS zone?

Options:

A.

Secondary DNS zone

B.

Primary DNS zone

C.

Stub DNS zone

D.

SOA DNS zone

Question 32

Which of the following is a type of encryption that uses a single key to encrypt and decrypt data?

Options:

A.

Database encryption

B.

Symmetric encryption

C.

Asymmetric encryption

D.

XML encryption

Question 33

Which of the following is the process of comparing cryptographic hash functions of system executables and configuration files?

Options:

A.

Reconnaissance

B.

File integrity auditing

C.

Shoulder surfing

D.

Spoofing

Question 34

Which wireless security protocol is also known as IEEE 802.11i?

Options:

A.

WPA2

B.

WEP

C.

TKIP

D.

EAP

Question 35

Which of the following is a computer worm that caused a denial of service on some Internet hosts and dramatically slowed down general Internet traffic?

Options:

A.

Code red

B.

Beast

C.

Klez

D.

SQL Slammer

Question 36

You are concerned about attackers simply passing by your office, discovering your wireless network, and getting into your network via the wireless connection. Which of the following are NOT steps in securing your wireless connection?

Each correct answer represents a complete solution. Choose two.

Options:

A.

MAC filtering on the router

B.

Strong password policies on workstations.

C.

Not broadcasting SSID

D.

Using either WEP or WPA encryption

E.

Hardening the server OS

Question 37

Which of the following is a type of encryption that uses a single key to encrypt and decrypt data?

Options:

A.

Asymmetric encryption

B.

Database encryption

C.

XML encryption

D.

Symmetric encryption

Question 38

Which of the following are the types of access controls?

Each correct answer represents a complete solution. Choose three.

Options:

A.

Physical

B.

Technical

C.

Administrative

D.

Automatic

Question 39

Which of the following methods will free up bandwidth in a Wireless LAN (WLAN)?

Options:

A.

Deploying a powerful antenna.

B.

Change hub with switch.

C.

Disabling SSID broadcast.

D.

Implement WEP.

Question 40

Which of the following is a read-only copy of a zone and obtains its resource records from other name servers?

Options:

A.

Secondary zone

B.

Primary zone

C.

Stub zone

D.

SOA zone

Question 41

Which of the following statements about Digest authentication are true?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Digest authentication is a more secure authentication method as compared to Basic authentication.

B.

In Digest authentication, passwords are sent across a network as a hash value, rather than as clear text.

C.

Digest authentication is used by wireless LANs, which follow the IEEE 802.11 standard.

D.

In Digest authentication, passwords are sent across a network as clear text, rather than as a has value.

Question 42

Which of the following tools hides information about IIS Webservers so that they can be prevented from various attacks performed by an attacker?

Options:

A.

WinSSLMiM

B.

httprint

C.

ServerMask

D.

Whisker

Question 43

Which of the following port numbers is used by the LDAP protocol when it is secured?

Options:

A.

335

B.

120

C.

442

D.

636

Question 44

Which of the following is an authentication protocol used by clients to dial-in to computers running Windows 2000 Server?

Options:

A.

IWA

B.

Digest authentication

C.

MPA

D.

SPAP

Question 45

John works as a Website Administrator in ABC Inc. The company has to set a privacy policy on all the computers. The policy requires John to restrict only third party cookies that do not have a compact private policy or that use personally identifiable information without a user's implicit consent. He reports to the Technical Support Executive that he wants to set the policy. The Technical Support Executive asks him to configure the settings in the Privacy tab page. Which of the following privacy settings will John use to accomplish the task?

Options:

A.

High

B.

Low

C.

Block All Cookies

D.

The policy cannot be set.

Question 46

Which of the following provides the best protection against a man-in-the-middle attack?

Options:

A.

Strong encryption

B.

Fiber-optic cable

C.

Firewall

D.

Strong password

Question 47

You work as a Network Administrator for NetTech Inc. The company has a Windows Server 2008 Active Directory-based single domain single forest network. The company's network is connected to the Internet through a T1 line. The firewall is configured on the network for securing the internal network from the intruders on the Internet. You are designing a public key infrastructure (PKI) for the network. The network will use a root enterprise certificate authority (CA) and two subordinate CAs. The root CA will be used to issue certificates to the subordinate CAs, and the subordinate CAs will be used to issue certificates to the clients. The security policy of the company dictates that the security of high-level CAs should not be compromised. Which of the following steps will you take to implement the security policy of the company?

Options:

A.

Take the root enterprise CA offline after it issues certificates to its subordinate CAs.

B.

Place all CA servers in a locked room.

C.

Take subordinate CAs offline after they get their certificates from the root CA.

D.

Configure a firewall on the network.

Question 48

You are an Incident manager in Orangesect.Inc. You have been tasked to set up a new extension of your enterprise. The networking, to be done in the new extension, requires different types of cables and an appropriate policy that will be decided by you. Which of the following stages in the Incident handling process involves your decision making?

Options:

A.

Containment

B.

Eradication

C.

Identification

D.

Preparation

Question 49

Which of the following tools is based on Linux and used to carry out the Penetration Testing?

Options:

A.

JPlag

B.

BackTrack

C.

Vedit

D.

Ettercap

Question 50

An organization has a standardized change management plan that all project managers must adhere to. A project manager has worked with the Change Control Board in his organization to approve a change to project scope. What should the standardized change management plan require the project manager to do with the approved scope change?

Options:

A.

Perform risk assessment on the new change.

B.

Communicate the change to the vendor.

C.

Create a cost estimate for the change.

D.

Update the WBS.

Question 51

Which system is designed to analyze, detect, and report on security-related events?

Options:

A.

HIPS

B.

NIPS

C.

NIDS

D.

HIDS

Question 52

You and your project team are just starting the risk identification activities for a project that is scheduled to last for 18 months. Your project team has already identified a long list of risks that need to be analyzed. How often should you and the project team do risk identification?

Options:

A.

Identify risks is an iterative process.

B.

At least once per month

C.

It depends on how many risks are initially identified.

D.

Several times until the project moves into execution

Question 53

John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. He copies the whole structure of the We-are-secure Web site to the local disk and obtains all the files on the Web site. Which of the following techniques is he using to accomplish his task?

Options:

A.

Eavesdropping

B.

Fingerprinting

C.

Web ripping

D.

TCP FTP proxy scanning

Question 54

Which of the following RAID levels will you use to implement a RAID system for providing fault tolerance to a database?

Options:

A.

RAID 10

B.

RAID 1

C.

RAID 5

D.

RAID 0

Question 55

An intruder is trying to get user passwords by pretending to be help desk staff. Which of the following types of security attacks do you think it is?

Options:

A.

Hacking

B.

Man-in-the-middle

C.

Spoofing

D.

Social Engineering

Question 56

Which of the following are the examples of administrative controls?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Security policy

B.

Auditing

C.

Security awareness training

D.

Data Backup

Question 57

Consider the following diagram:

What is the highlighted area of the diagram known as?

Options:

A.

Rule of Seven

B.

Control point

C.

Control chart

D.

Six Sigma

Question 58

Which of the following activities result in change requests?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Preventive actions

B.

Inspection

C.

Defect repair

D.

Corrective actions

Question 59

You work as a project manager for TYU project. You are planning for risk mitigation. You need to identify the risks that will need a more in-depth analysis. Which of the following activities will help you in this?

Options:

A.

Qualitative analysis

B.

Quantitative analysis

C.

Risk identification

D.

Estimate activity duration

Question 60

Which of the following PPP configuration options is used to increase the effective throughput on PPP connections by reducing the amount of data in the frame that must travel across the link?

Options:

A.

Authentication

B.

Error detection

C.

Compression

D.

Multilink

Question 61

Which of the following protocols does IPsec use to perform various security functions in the network?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Internet Key Exchange

B.

Encapsulating Security Payload

C.

Authentication Header

D.

Skinny Client Control Protocol

Question 62

You have been asked to create a project charter for a new database project. Management has stressed that in order to effectively create a project charter, you'll first need to understand all of the following except for which one?

Options:

A.

Summary milestone for the likely project phases

B.

Measurable project objectives and related success criteria

C.

Summary budget

D.

Quality improvement program your company uses

Question 63

Which of the following types of cryptography algorithms is a symmetric key cipher which operates on fixed-length groups of bits, termed blocks, with an unvarying transformation?

Options:

A.

RC2

B.

Stream cipher

C.

Block cipher

D.

Triple DES

Question 64

You work as a Network Administrator for Tech Perfect Inc. The company has a Linux-based network. You have configured a VPN server for remote users to connect to the company's network. Which of the following encryption types will Linux use?

Options:

A.

CHAP

B.

MSCHAP

C.

RC2

D.

3DES

Question 65

Which of the following tools works both as an encryption-cracking tool and as a keylogger?

Options:

A.

Magic Lantern

B.

KeyGhost Keylogger

C.

Alchemy Remote Executor

D.

SocketShield

Question 66

You work as a Network Administrator for McNeil Inc. The company has a Windows Active Directorybased single domain single forest network. The functional level of the forest is Windows Server 2003. The company's management has decided to provide laptops to its sales team members. These laptops are equipped with smart card readers. The laptops will be configured as wireless network clients. You are required to accomplish the following tasks:

The wireless network communication should be secured.

The laptop users should be able to use smart cards for getting authenticated.

In order to accomplish the tasks, you take the following steps:

Configure 802.1x and WEP for the wireless connections.

Configure the PEAP-MS-CHAP v2 protocol for authentication

What will happen after you have taken these steps?

Options:

A.

Both tasks will be accomplished.

B.

The wireless network communication will be secured.

C.

None of the tasks will be accomplished.

D.

The laptop users will be able to use smart cards for getting authenticated.

Question 67

IP blocking is a technique that prevents the connection between a server/website and certain IP addresses or ranges of addresses. Which of the following tools use this technique?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

SSHGuard

B.

portsentry

C.

OpenSSL

D.

nmap

E.

Fail2Ban

Question 68

The MBR of a hard disk is a collection of boot records that contain disk information such as disk architecture, cluster size, and so on. The main work of the MBR is to locate and run necessary operating system files that are required to run a hard disk. In the context of the operating system, MBR is also known as the boot loader. Which of the following viruses can infect the MBR of a hard disk?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Stealth

B.

Multipartite

C.

Boot sector

D.

File

Question 69

Which of the following Acts enacted in United States allows the FBI to issue National Security Letters (NSLs) to Internet service providers (ISPs) ordering them to disclose records about their customers?

Options:

A.

Electronic Communications Privacy Act of 1986

B.

Wiretap Act

C.

Computer Fraud and Abuse Act

D.

Economic Espionage Act of 1996

Question 70

Which of the following types of computers is used for attracting potential intruders?

Options:

A.

Honey pot

B.

Files pot

C.

Bastion host

D.

Data pot

Question 71

Which of the following is a fake target that deters hackers from locating your real network?

Options:

A.

Malware

B.

Honeypot

C.

KFSensor

D.

Spyware

Question 72

What is the major difference between a worm and a Trojan horse?

Options:

A.

A worm is a form of malicious program, while a Trojan horse is a utility.

B.

A Trojan horse is a malicious program, while a worm is an anti-virus software.

C.

A worm is self replicating, while a Trojan horse is not.

D.

A worm spreads via e-mail, while a Trojan horse does not.

Question 73

Adam works as a Professional Penetration Tester for Umbrella Inc. A project has been assigned to him to carry out a Black Box penetration testing as a regular evaluation of the system security and integrity of the company's network. Which of the following statements are true about the Black Box penetration testing?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Black box testing provides the testers with complete knowledge of the infrastructure to be tested.

B.

Black box testing simulates an attack from someone who is familiar with the system.

C.

Black box testing simulates an attack from someone who is unfamiliar with the system.

D.

Black box testing assumes no prior knowledge of the infrastructure to be tested.

Question 74

Which of the following can be used to mitigate the evil twin phishing attack?

Options:

A.

Magic Lantern

B.

Obiwan

C.

IPSec VPN

D.

SARA

Question 75

Which of the following protocols uses a combination of public key and symmetric encryption to provide communication privacy, authentication, and message integrity for secure browsing on the Internet?

Options:

A.

SSL

B.

MS-CHAP v2

C.

EFS

D.

WEP

Question 76

Which of the following statements about Secure Shell (SSH) are true?

Each correct answer represents a complete solution. Choose three.

Options:

A.

It is the core routing protocol of the Internet.

B.

It was designed as a replacement for TELNET and other insecure shells.

C.

It is a network protocol used primarily on Linux and Unix based systems.

D.

It allows data to be exchanged using a secure channel between two networked devices.

Question 77

You are a project manager of a large construction project. Within the project you are working with several vendors to complete different phases of the construction. Your client has asked that you arrange for some of the materials a vendor is to install next week in the project to be changed. According to the change management plan what subsystem will need to manage this change request?

Options:

A.

Cost

B.

Schedule

C.

Contract

D.

Resources

Question 78

NIST Special Publication 800-50 is a security awareness program. It is designed for those people who are currently working in the information technology field and want information on security policies.

Which of the following are some of its critical steps?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Awareness and Training Material Effectiveness

B.

Awareness and Training Material Implementation

C.

Awareness and Training Program Design

D.

Awareness and Training Material Development

Question 79

Which type of attack is the unauthorized access of information from a wireless device through a Bluetooth connection, often between phones, desktops, laptops, and PDAs?

Options:

A.

Bluesnarfing

B.

Bluebugging

C.

Blue Jacking

D.

Bluecast

Question 80

Donna, a stakeholder in your project to create new software, has approached you about adding some features to the software package. You instruct that Donna must document the change request for it to be considered for the project. Why is it important for Donna to document the change request?

Options:

A.

The documentation of the change request ensures that there's an audit trail of the request change from the requestor to the implementation and verification of the request.

B.

The documentation of the change request allows Donna to really understand all of the requirements for the change to be entered into the project scope.

C.

It's really not that important but it will delay the request for the change or prevent the change from entering the change control system at all.

D.

The documentation of the change request ensures that Donna is the stakeholder that will pay for the request.

Question 81

You work as a Network Administrator for PassGuide Inc. You have been assigned a task to provide the right authentications to users. Which method that uses a KDC will you use to accomplish the task?

Options:

A.

Biometrics

B.

Basic authentication

C.

Digest authentication

D.

Kerberos

Question 82

The Klez worm is a mass-mailing worm that exploits a vulnerability to open an executable attachment even in Microsoft Outlook's preview pane. The Klez worm gathers email addresses from the entries of the default Windows Address Book (WAB). Which of the following registry values can be used to identify this worm?

Options:

A.

HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run

B.

HKEY_CURRENT_USER\Software\Microsoft\WAB\WAB4\Wab File Name = "file and pathname of the WAB file"

C.

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run

D.

HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunServices

Question 83

Which of the following firewalls inspects the actual contents of packets?

Options:

A.

Application-level firewall

B.

Packet filtering firewall

C.

Stateful inspection firewall

D.

Circuit-level firewall

Question 84

Which of the following tools can be used for steganography?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Anti-x

B.

Snow.exe

C.

Image hide

D.

Stegbreak

Question 85

Which of the following evidences are the collection of facts that, when considered together, can be used to infer a conclusion about the malicious activity/person?

Options:

A.

Corroborating

B.

Direct

C.

Circumstantial

D.

Incontrovertible

Demo: 85 questions
Total 567 questions