IISFA II0-001 Certified Information Forensics Investigator (CIFI)
IISFA II0-001 Certified Information Forensics Investigator (CIFI)
The Certified Information Forensics Investigator, (CIFI) Certification is a
designation earned exclusively by the most qualified information forensic
professionals in the field. Along with adherence to the highest standards of
ethical conduct, the CIFI epitomizes the highest standards in knowledge
requirements and expertise. The CIFI encompasses multiple domains of knowledge,
practical experience, and a demonstration of expertise and understanding
accomplished through a rigorous exam proctored under the most controlled of
environments. Unlike many vendor certifications, the CIFI maintains vendor
neutrality and is independent of dependency requirements such as sponsored
training, purchasing of product, or requirements other than ability. In fact,
candidates may choose to sit for the exam without any restrictions other than
adherence to the IISFA code of ethics and the exam fee. The CIFI is recognized
as the only certification that truly represents the abilities of field
information forensics investigators and is the benchmark by which they are
measured. Earning the CIFI designation is a significant accomplishment and
identifies the best in the profession of information forensics investigator.
The Certified Information Forensics Investigator, (CIFI) Certification is
specifically developed for experienced information forensics investigators who
have practical experience in performing investigation for law enforcement or as
part of a corporate investigations team. The CIFI certification is designed to
demonstrate expertise in all aspects of the information investigative process
and is dedicated to bringing a level of consistency to the profession than can
be recognized outside the field.
CIFI Impacts Your Career and Your Organization Enterprises demand Forensics Investigator that possess the knowledge and
expertise to help them identify critical issues and customize practices to
support trust in and value from information systems.The skills and practices
that CIFI promotes and evaluates are the building blocks of success in the
field. Possessing the CIFI demonstrates proficiency and is the basis for
measurement in the profession.
CIFI Certification: Confirms your knowledge and experience
Quantifies and markets your expertise
Demonstrates that you have gained and maintained the level of knowledge required
to meet the dynamic challenges of a modern enterpriseIs
Is globally recognized as the mark of excellence for the Forensics Professional
Combines the achievement of passing a comprehensive exam with recognition of
work and educational experience, providing you with credibility in the
marketplace.
Increases your value to your organization
Gives you a competitive advantage over peers when seeking job growth
Helps you achieve a high professional standard through IISFA's requirements for
continuing education and ethical conduct
QUESTION 1
Firewalls are an excellent source of:
A. Details of system usage
B. Details of protocol usage
C. Forensic Evidence for malicious attacks
D. Port/service mappings
Answer: C
QUESTION 2 What technique of layered security design will allow for both investigation
and recovery after an incident?
A. RI Technology
B. Highly available systems
C. Overlap design approach
D. Honeypot placement
Answer: B
QUESTION 3
If a CIFI violates the ISFA code of Ethics, her CIFI certification can be
immediately revoked.
A. True
B. False
Answer: B
QUESTION 4 The 1st amendment allows hackers to exercise free speech by altering content
on websites to express opposing viewpoints.
A. True
B. False
Answer: B
QUESTION 5 The term "Browser Artifacts" refer to:
A. Web browser cache, cookies, favorites, history, auto complete information
B. Older web browser applications that have little or no security and allow for
unchecked use
C. Older web browser applications that can be used as a surveillance tool for
investigators due to their lack of security
D. Web browser cookies
Answer: A
QUESTION 6 All of the following are methods of auditing except:
A. Internal audit
B. External audit
C. Thorough audit
D. 3rd party audit
No comments:
Post a Comment