When a system is compromised, attackers often try to disable auditing, in Windows 7; modifications to the audit policy are recorded as entries of Event ID____________.
Answer : A
Graphics Interchange Format (GIF) is a ___________RGB bitmap Image format for
Images with up to 256 distinct colors per frame.
Answer : A
Who is responsible for the following tasks?
-> Secure the scene and ensure that it is maintained In a secure state until the
Forensic Team advises -
-> Make notes about the scene that will eventually be handed over to the Forensic
Team -
Answer : A
First responder is a person who arrives first at the crime scene and accesses the victim's computer system after the incident. He or She is responsible for protecting, integrating, and preserving the evidence obtained from the crime scene.
Which of the following is not a role of first responder?
Answer : D
System software password cracking is defined as cracking the operating system and all other utilities that enable a computer to function
Answer : A
A computer forensic report is a report which provides detailed information on the complete forensics investigation process.
Answer : A
When collecting evidence from the RAM, where do you look for data?
Answer : A
Which of the following Steganography techniques allows you to encode information that ensures creation of cover for secret communication?
Answer : C
Router log files provide detailed Information about the network traffic on the Internet. It gives information about the attacks to and from the networks. The router stores log files in the____________.
Answer : A
When NTFS Is formatted, the format program assigns the __________ sectors to the boot sectors and to the bootstrap code
Answer : B
Smith, as a part his forensic investigation assignment, has seized a mobile device. He was asked to recover the Subscriber Identity Module (SIM card) data the mobile device. Smith found that the SIM was protected by a Personal identification Number (PIN) code but he was also aware that people generally leave the PIN numbers to the defaults or use easily guessable numbers such as 1234. He unsuccessfully tried three PIN numbers that blocked the SIM card. What Jason can do in this scenario to reset the PIN and access SIM data?
Answer : D
Injection flaws are web application vulnerabilities that allow untrusted data to be Interpreted and executed as part of a command or query. Attackers exploit injection flaws by constructing malicious commands or queries that result in data loss or corruption, lack of accountability, or denial of access. Which of the following injection flaws involves the injection of malicious code through a web application?
Answer : A
How do you define Technical Steganography?
Answer : A
Which of the following statements is not a part of securing and evaluating electronic crime scene checklist?
Answer : D
BMP (Bitmap) is a standard file format for computers running the Windows operating system. BMP images can range from black and white (1 bit per pixel) up to 24 bit color
(16.7 million colors). Each bitmap file contains header, the RGBQUAD array, information header, and image data. Which of the following element specifies the dimensions, compression type, and color format for the bitmap?
Answer : B
Have any questions or issues ? Please dont hesitate to contact us