In a FAT32 system, a 123 KB file will use how many sectors?

In a FAT32 system, a 123 KB file will use how many sectors?A . 34B . 25C . 11D . 56View AnswerAnswer: B

November 6, 2021 No Comments READ MORE +

Which feature will you disable to eliminate the ability to enumerate this information on your Cisco routers?

Your company uses Cisco routers exclusively throughout the network. After securing the routers to the best of your knowledge, an outside security firm is brought in to assess the network security. Although they found very few issues, they were able to enumerate the model, OS version, and capabilities for all...

November 6, 2021 No Comments READ MORE +

In what way do the procedures for dealing with evidence in a criminal case differ from the procedures for dealing with evidence in a civil case?

In what way do the procedures for dealing with evidence in a criminal case differ from the procedures for dealing with evidence in a civil case?A . evidence must be handled in the same way regardless of the type of caseB . evidence procedures are not important unless you work...

November 6, 2021 No Comments READ MORE +

What method of computer forensics will allow you to trace all ever-established user accounts on a Windows 2000 sever the course of its lifetime?

What method of computer forensics will allow you to trace all ever-established user accounts on a Windows 2000 sever the course of its lifetime?A . forensic duplication of hard driveB . analysis of volatile dataC . comparison of MD5 checksumsD . review of SIDs in the RegistryView AnswerAnswer: C

November 6, 2021 No Comments READ MORE +

Printing under a Windows Computer normally requires which one of the following files types to be created?

Printing under a Windows Computer normally requires which one of the following files types to be created?A . EMEB . MEMC . EMFD . CMEView AnswerAnswer: C

November 5, 2021 No Comments READ MORE +

What is a Virtual Environment?

Bob has been trying to penetrate a remote production system for the past two weeks. This time however, he is able to get into the system. He was able to use the System for a period of three weeks. However, law enforcement agencies were recoding his every activity and this...

November 5, 2021 No Comments READ MORE +

What type of DoS attack is James testing against his network?

James is testing the ability of his routers to withstand DoS attacks. James sends ICMP ECHO requests to the broadcast address of his network . What type of DoS attack is James testing against his network?A . SmurfB . TrinooC . FraggleD . SYN floodView AnswerAnswer: A

November 5, 2021 No Comments READ MORE +

Windows identifies which application to open a file with by examining which of the following?

Windows identifies which application to open a file with by examining which of the following?A . The File extensionB . The file attributesC . The file Signature at the end of the fileD . The file signature at the beginning of the fileView AnswerAnswer: A

November 5, 2021 No Comments READ MORE +

During the course of an investigation, you locate evidence that may prove the innocence of the suspect of the investigation. You must maintain an unbiased opinion and be objective in your entire fact finding process. Therefore, you report this evidence.

During the course of an investigation, you locate evidence that may prove the innocence of the suspect of the investigation. You must maintain an unbiased opinion and be objective in your entire fact finding process. Therefore, you report this evidence. This type of evidence is known as:A . Inculpatory evidenceB...

November 5, 2021 No Comments READ MORE +

If an attacker's computer sends an IPID of 31400 to a zombie computer on an open port in IDLE scanning, what will be the response?

If an attacker's computer sends an IPID of 31400 to a zombie computer on an open port in IDLE scanning, what will be the response?A . The zombie will not send a responseB . 31402C . 31399D . 31401View AnswerAnswer: D

November 5, 2021 No Comments READ MORE +