What group is actively providing tools and creating procedures for testing and validating computer forensics software?
To make sure the evidence you recover and analyze with computer forensics software can be admitted in court, you must test and validate the software. What group is actively providing tools and creating procedures for testing and validating computer forensics software?A . Computer Forensics Tools and Validation Committee (CFTVC) B....
What would be the primary reason for you to recommend a disk imaging tool?
Melanie was newly assigned to an investigation and asked to make a copy of all the evidence from the compromised system. Melanie did a DOS copy of all the files on the system. What would be the primary reason for you to recommend a disk imaging tool?A . A disk...
The use of warning banners helps a company avoid litigation by overcoming an employee assumed __________________________. When connecting to the company's intranet, network or Virtual Private Network (VPN) and will allow the company's investigators to monitor, search and retrieve information stored within the network.
The use of warning banners helps a company avoid litigation by overcoming an employee assumed __________________________. When connecting to the company's intranet, network or Virtual Private Network (VPN) and will allow the company's investigators to monitor, search and retrieve information stored within the network.A . Right to work B. Right...
After a computer has been compromised by a hacker, which of the following would be most important in forming a profile of the incident?
Profiling is a forensics technique for analyzing evidence with the goal of identifying the perpetrator from their various activity. After a computer has been compromised by a hacker, which of the following would be most important in forming a profile of the incident?A . The manufacturer of the system compromised...
In General, __________________ Involves the investigation of data that can be retrieved from the hard disk or other disks of a computer by applying scientific methods to retrieve the data.
In General, __________________ Involves the investigation of data that can be retrieved from the hard disk or other disks of a computer by applying scientific methods to retrieve the data.A . Network Forensics B. Data Recovery C. Disaster Recovery D. Computer ForensicsView AnswerAnswer: D
Why would a scanner like Nessus is not recommended in this situation?
George is performing security analysis for Hammond and Sons LLC. He is testing security vulnerabilities of their wireless network. He plans on remaining as "stealthy" as possible during the scan. Why would a scanner like Nessus is not recommended in this situation?A . Nessus is too loud B. Nessus cannot...
You are called by an author who is writing a book and he wants to know how long the copyright for his book will last after he has the book published?
You are called by an author who is writing a book and he wants to know how long the copyright for his book will last after he has the book published?A . 70 years B. the life of the author C. the life of the author plus 70 years D....
What term is used to describe a cryptographic technique for embedding information into something else for the sole purpose of hiding that information from the casual observer?
What term is used to describe a cryptographic technique for embedding information into something else for the sole purpose of hiding that information from the casual observer?A . rootkit B. key escrow C. steganography D. OffsetView AnswerAnswer: C
What type of attack occurs when an attacker can force a router to stop forwarding packets by flooding the router with many open connections simultaneously so that all the hosts behind the router are effectively disabled?
What type of attack occurs when an attacker can force a router to stop forwarding packets by flooding the router with many open connections simultaneously so that all the hosts behind the router are effectively disabled?A . digital attack B. denial of service C. physical attack D. ARP redirectView AnswerAnswer:...
To preserve digital evidence, an investigator should ____________________.
To preserve digital evidence, an investigator should ____________________.A . Make two copies of each evidence item using a single imaging tool B. Make a single copy of each evidence item using an approved imaging tool C. Make two copies of each evidence item using different imaging tools D. Only store...