GCFA Exam Question 21

In 2001, the Council of Europe passed a convention on cybercrime. It was the first international treaty seeking to address computer crime and Internet crimes by harmonizing national laws, improving investigative techniques, and increasing cooperation among nations. On 1 March 2006, the Additional Protocol to the Convention on Cybercrime came into force. Which of the following statements clearly describes this protocol?
  • GCFA Exam Question 22

    Which of the following NIST RA process steps has the goal to identify the potential threat-sources and compile a threat statement listing the potential threat-sources that are applicable to the IT system being evaluated?
  • GCFA Exam Question 23

    You work as a Network Administrator for Tech Perfect Inc. The company has a TCP/IP-based network.
    You are configuring a wireless LAN on the network. You experience interference on your network. Through investigation, you come to know that three foreign WAPs are within the range of your LAN. Although they have different SSIDs than yours, they are working on the same channel as yours.
    Which of the following steps will you take to reduce the interference?
  • GCFA Exam Question 24

    You company suspects an employee of sending unauthorized emails to competitors. These emails are alleged to contain confidential company data. Which of the following is the most important step for you to take in preserving the chain of custody?
  • GCFA Exam Question 25

    Which of the following hardware devices prevents broadcasts from crossing over subnets?