What TCP/UDP port does the toolkit program netstat use?
What TCP/UDP port does the toolkit program netstat use?A . Port 7B . Port 15C . Port 23D . Port 69View AnswerAnswer: B
Why will this not be viable?
Jason has set up a honeypot environment by creating a DMZ that has no physical or logical access to his production network. In this honeypot, he has placed a server running Windows Active Directory. He has also placed a Web server in the DMZ that services a number of web...
Diskcopy is:
Diskcopy is:A . a utility by AccessDataB . a standard MS-DOS commandC . Digital Intelligence utilityD . dd copying toolView AnswerAnswer: B Explanation: diskcopy is a STANDARD DOS utility. C:WINDOWS>diskcopy /? Copies the contents of one floppy disk to another.
An Employee is suspected of stealing proprietary information belonging to your company that he had no rights to possess. The information was stored on the Employees Computer that was protected with the NTFS Encrypted File System (EFS) and you had observed him copy the files to a floppy disk just before leaving work for the weekend. You detain the Employee before he leaves the building and recover the floppy disks and secure his computer. Will you be able to break the encryption so that you can verify that that the employee was in possession of the proprietary information?
An Employee is suspected of stealing proprietary information belonging to your company that he had no rights to possess. The information was stored on the Employees Computer that was protected with the NTFS Encrypted File System (EFS) and you had observed him copy the files to a floppy disk just...
Hackers can gain access to Windows Registry and manipulate user passwords, DNS settings, access rights or others features that they may need in order to accomplish their objectives.
Hackers can gain access to Windows Registry and manipulate user passwords, DNS settings, access rights or others features that they may need in order to accomplish their objectives. One simple method for loading an application at startup is to add an entry (Key) to the following Registry Hive:A . HKEY_LOCAL_MACHINEhardwarewindowsstartB...
Which of the following is NOT a graphics file?
Which of the following is NOT a graphics file?A . Picture1.tgaB . Picture2.bmpC . Picture3.nfoD . Picture4.psdView AnswerAnswer: C
What principal of social engineering did Julia use?
Julia is a senior security analyst for Berber Consulting group. She is currently working on a contract for a small accounting firm in Florid a. They have given her permission to perform social engineering attacks on the company to see if their in-house training did any good. Julia calls the...
Where should Harold navigate on the computer to find the file?
Harold is a security analyst who has just run the rdisk /s command to grab the backup SAM files on a computer. Where should Harold navigate on the computer to find the file?A . %systemroot%system32LSAB . %systemroot%system32driversetcC . %systemroot%repairD . %systemroot%LSAView AnswerAnswer: C
What group is actively providing tools and creating procedures for testing and validating computer forensics software?
To make sure the evidence you recover and analyze with computer forensics software can be admitted in court, you must test and validate the software . What group is actively providing tools and creating procedures for testing and validating computer forensics software?A . Computer Forensics Tools and Validation Committee (CFTVC)B...
Which response organization tracks hoaxes as well as viruses?
Which response organization tracks hoaxes as well as viruses?A . NIPCB . FEDCIRCC . CERTD . CIACView AnswerAnswer: D