What search string will you use to locate them?
You are trying to locate Microsoft Outlook Web Access Default Portal using Google search on the Internet . What search string will you use to locate them?A . allinurl:"exchange/logon.asp"B . intitle:"exchange server"C . locate:"logon page"D . outlook:"search"View AnswerAnswer: A
The use of warning banners helps a company avoid litigation by overcoming an employee assumed __________________________. When connecting to the company's intranet, network or Virtual Private Network (VPN) and will allow the company's investigators to monitor, search and retrieve information stored within the network.
The use of warning banners helps a company avoid litigation by overcoming an employee assumed __________________________. When connecting to the company's intranet, network or Virtual Private Network (VPN) and will allow the company's investigators to monitor, search and retrieve information stored within the network.A . Right to workB . Right...
What operating system would respond to the following command?
What operating system would respond to the following command?A . Windows 95B . FreeBSDC . Windows XPD . Mac OS XView AnswerAnswer: B
How will these forms be stored to help preserve the chain of custody of the case?
You are working as an investigator for a corporation and you have just received instructions from your manager to assist in the collection of 15 hard drives that are part of an ongoing investigation. Your job is to complete the required evidence custody forms to properly document each piece of...
To preserve digital evidence, an investigator should ____________________.
To preserve digital evidence, an investigator should ____________________.A . Make two copies of each evidence item using a single imaging toolB . Make a single copy of each evidence item using an approved imaging toolC . Make two copies of each evidence item using different imaging toolsD . Only store...
What is the name of the attack that affects the DNS cache of the name resolution servers, resulting in those servers directing users to the wrong web site?
You are assisting in the investigation of a possible Web Server Hack. The company who called you stated that customers reported to them that whenever they entered the web address of the company in their browser, what they received was a porno graphic web site. The company checked the web...
What binary coding is used most often for e-mail purposes?
What binary coding is used most often for e-mail purposes?A . MIMEB . UuencodeC . IMAPD . SMTPView AnswerAnswer: A
When using Windows acquisitions tools to acquire digital evidence, it is important to use a well-tested hardware write-blocking device to:
When using Windows acquisitions tools to acquire digital evidence, it is important to use a well-tested hardware write-blocking device to:A . Automate Collection from image filesB . Avoiding copying data from the boot partitionC . Acquire data from host-protected area on a diskD . Prevent Contamination to the evidence driveView...
What assistance can the ISP provide?
In conducting a computer abuse investigation you become aware that the suspect of the investigation is using ABC Company as his Internet Service Provider (ISP). You contact ISP and request that they provide you assistance with your investigation . What assistance can the ISP provide?A . The ISP can investigate...
What type of virus is this that you are testing?
You are running known exploits against your network to test for possible vulnerabilities. To test the strength of your virus software, you load a test network to mimic your production network. Your software successfully blocks some simple macro and encrypted viruses. You decide to really test the software by using...