Consistency in the investigative report is more important than the exact format in the report to eliminate uncertainty and confusion.
Answer : A
When dealing with the powered-off computers at the crime scene, if the computer is switched off, turn it on
Answer : B
MAC filtering is a security access control methodology, where a ___________ is assigned to each network card to determine access to the network
Answer : D
The ARP table of a router comes in handy for Investigating network attacks, as the table contains IP addresses associated with the respective MAC addresses.
The ARP table can be accessed using the __________command in Windows 7.
Answer : A
You can interact with the Registry through intermediate programs. Graphical user interface
(GUI) Registry editors such as Regedit.exe or Regedt32 exe are commonly used as intermediate programs in Windows 7. Which of the following is a root folder of the registry editor?
Answer : A
You have been given the task to investigate web attacks on a Windows-based server.
Which of the following commands will you use to look at which sessions the machine has opened with other systems?
Answer : B
What is a SCSI (Small Computer System Interface)?
Answer : A
The status of the network interface cards (NICs) connected to a system gives information about whether the system is connected to a wireless access point and what IP address is being used.
Which command displays the network configuration of the NICs on the system?
Answer : A
Which Is a Linux journaling file system?
Answer : A
Which of the following steganography types hides the secret message in a specifically designed pattern on the document that is unclear to the average reader?
Answer : A
Web applications provide an Interface between end users and web servers through a set of web pages that are generated at the server-end or contain script code to be executed dynamically within the client Web browser.
Answer : A
Jason, a renowned forensic investigator, is investigating a network attack that resulted in the compromise of several systems in a reputed multinational's network. He started
Wireshark to capture the network traffic. Upon investigation, he found that the DNS packets travelling across the network belonged to a non-company configured IP. Which of the following attack Jason can infer from his findings?
Answer : A
Which table is used to convert huge word lists (i .e. dictionary files and brute-force lists) into password hashes?
Answer : A
Data acquisition system is a combination of tools or processes used to gather, analyze and record Information about some phenomenon. Different data acquisition system are used depends on the location, speed, cost. etc. Serial communication data acquisition system is used when the actual location of the data is at some distance from the computer. Which of the following communication standard is used in serial communication data acquisition system?
Answer : C
Which of the following statements is incorrect when preserving digital evidence?
Answer : D
Have any questions or issues ? Please dont hesitate to contact us