What type of Penetration Testing is Larry planning to carry out?

Larry is an IT consultant who works for corporations and government agencies. Larry plans on shutting down the city's network using BGP devices and zombies? What type of Penetration Testing is Larry planning to carry out?A . Router Penetration Testing B. DoS Penetration Testing C. Firewall Penetration Testing D. Internal...

January 23, 2023 No Comments READ MORE +

Which firewall would be most appropriate for Harold? needs?

Harold wants to set up a firewall on his network but is not sure which one would be the most appropriate. He knows he needs to allow FTP traffic to one of the servers on his network, but he wants to only allow FTP-PUT. Which firewall would be most appropriate...

January 23, 2023 No Comments READ MORE +

Which federal computer crime law specifically refers to fraud and related activity in connection with access devices like routers?

Which federal computer crime law specifically refers to fraud and related activity in connection with access devices like routers?A . 18 U.S.C. 1029 B. 18 U.S.C. 1362 C. 18 U.S.C. 2511 D. 18 U.S.C. 2703View AnswerAnswer: A

January 23, 2023 No Comments READ MORE +

In a FAT32 system, a 123 KB file will use how many sectors?

In a FAT32 system, a 123 KB file will use how many sectors?A . 34 B. 25 C. 11 D. 56View AnswerAnswer: B

January 23, 2023 No Comments READ MORE +

What is that code called?

Office Documents (Word, Excel and PowerPoint) contain a code that allows tracking the MAC or unique identifier of the machine that created the document. What is that code called?A . Globally unique ID B. Microsoft Virtual Machine Identifier C. Personal Application Protocol D. Individual ASCII stringView AnswerAnswer: A

January 22, 2023 No Comments READ MORE +

The efforts to obtain information before a trail by demanding documents, depositions, questioned and answers written under oath, written requests for admissions of fact and examination of the scene is a description of what legal term?

The efforts to obtain information before a trail by demanding documents, depositions, questioned and answers written under oath, written requests for admissions of fact and examination of the scene is a description of what legal term?A . Detection B. Hearsay C. Spoliation D. DiscoveryView AnswerAnswer: D

January 22, 2023 No Comments READ MORE +

What area of the law is the employee violating?

You are working for a large clothing manufacturer as a computer forensics investigator and are called in to investigate an unusual case of an employee possibly stealing clothing designs from the company and selling them under a different brand name for a different company. What you discover during the course...

January 22, 2023 No Comments READ MORE +

If you plan to startup a suspect's computer, you must modify the ___________ to ensure that you do not contaminate or alter data on the suspect's hard drive by booting to the hard drive.

If you plan to startup a suspect's computer, you must modify the ___________ to ensure that you do not contaminate or alter data on the suspect's hard drive by booting to the hard drive.A . deltree command B. CMOS C. Boot.sys D. Scandisk utilityView AnswerAnswer: C

January 22, 2023 No Comments READ MORE +

Diskcopy is:

Diskcopy is:A . a utility by AccessData B. a standard MS-DOS command C. Digital Intelligence utility D. dd copying toolView AnswerAnswer: B Explanation: diskcopy is a STANDARD DOS utility. C:WINDOWS>diskcopy /? Copies the contents of one floppy disk to another.

January 22, 2023 No Comments READ MORE +

What should you examine next in this case?

You have been asked to investigate the possibility of computer fraud in the finance department of a company. It is suspected that a staff member has been committing finance fraud by printing cheques that have not been authorized. You have exhaustively searched all data files on a bitmap image of...

January 21, 2023 No Comments READ MORE +