Harold is a security analyst who has just run the rdisk /s command to grab the backup SAM files on a computer. Where should Harold navigate on the computer to find the file?
Harold is a security analyst who has just run the rdisk /s command to grab the backup SAM files on a computer. Where should Harold navigate on the computer to find the file?A . %systemroot%system32LSA B. %systemroot%system32driversetc C. %systemroot%repair D. %systemroot%LSAView AnswerAnswer: C
What does the acronym POST mean as it relates to a PC?
What does the acronym POST mean as it relates to a PC?A . Primary Operations Short Test B. PowerOn Self Test C. Pre Operational Situation Test D. Primary Operating System TestView AnswerAnswer: B
What networking protocol language should she learn that routers utilize?
Kimberly is studying to be an IT security analyst at a vocational school in her town. The school offers many different programming as well as networking languages. What networking protocol language should she learn that routers utilize?A . ATM B. UDP C. BPG D. OSPFView AnswerAnswer: D
How many law-enforcement computer investigators should you request to staff the lab?
You are working for a local police department that services a population of 1,000,000 people and you have been given the task of building a computer forensics lab. How many law-enforcement computer investigators should you request to staff the lab?A . 8 B. 1 C. 4 D. 2View AnswerAnswer: C
During the course of an investigation, you locate evidence that may prove the innocence of the suspect of the investigation. You must maintain an unbiased opinion and be objective in your entire fact finding process. Therefore, you report this evidence.
During the course of an investigation, you locate evidence that may prove the innocence of the suspect of the investigation. You must maintain an unbiased opinion and be objective in your entire fact finding process. Therefore, you report this evidence. This type of evidence is known as:A . Inculpatory evidence...
What countermeasures could he take to prevent DDoS attacks?
After undergoing an external IT audit, George realizes his network is vulnerable to DDoS attacks. What countermeasures could he take to prevent DDoS attacks?A . Enable direct broadcasts B. Disable direct broadcasts C. Disable BGP D. Enable BGPView AnswerAnswer: B
What does ICMP Type 3/Code 13 mean?
What does ICMP Type 3/Code 13 mean?A . Host Unreachable B. Administratively Blocked C. Port Unreachable D. Protocol UnreachableView AnswerAnswer: B
What principal of social engineering did Julia use?
Julia is a senior security analyst for Berber Consulting group. She is currently working on a contract for a small accounting firm in Florid a. They have given her permission to perform social engineering attacks on the company to see if their in-house training did any good. Julia calls the...
In what way do the procedures for dealing with evidence in a criminal case differ from the procedures for dealing with evidence in a civil case?
In what way do the procedures for dealing with evidence in a criminal case differ from the procedures for dealing with evidence in a civil case?A . evidence must be handled in the same way regardless of the type of case B. evidence procedures are not important unless you work...
You are working as a Computer forensics investigator for a corporation on a computer abuse case. You discover evidence that shows the subject of your investigation is also embezzling money from the company. The company CEO and the corporate legal counsel advise you to contact law enforcement and provide them with the evidence that you have found. The law enforcement officer that responds requests that you put a network sniffer on your network and monitor all traffic to the subject’s computer.
You are working as a Computer forensics investigator for a corporation on a computer abuse case. You discover evidence that shows the subject of your investigation is also embezzling money from the company. The company CEO and the corporate legal counsel advise you to contact law enforcement and provide them...