What have you found?
You are working on a thesis for your doctorate degree in Computer Science. Your thesis is based on HTML, DHTML, and other web-based languages and how they have evolved over the years. You navigate to archive. org and view the HTML code of news.com. You then navigate to the current...
What is that code called?
Office Documents (Word, Excel and PowerPoint) contain a code that allows tracking the MAC or unique identifier of the machine that created the document . What is that code called?A . Globally unique IDB . Microsoft Virtual Machine IdentifierC . Personal Application ProtocolD . Individual ASCII stringView AnswerAnswer: A
The objective of this act was to protect consumers’ personal financial information held by financial institutions and their service providers.
The objective of this act was to protect consumers’ personal financial information held by financial institutions and their service providers.A . Gramm-Leach-Bliley ActB . Sarbanes-Oxley 2002C . California SB 1386D . HIPAAView AnswerAnswer: A
Why did this ping sweep only produce a few responses?
After passively scanning the network of Department of Defense (DoD), you switch over to active scanning to identify live hosts on their network. DoD is a large organization and should respond to any number of scans. You start an ICMP ping sweep by sending an IP packet to the broadcast...
When performing a forensics analysis, what device is used to prevent the system from recording data on an evidence disk?
When performing a forensics analysis, what device is used to prevent the system from recording data on an evidence disk?A . a write-blockerB . a protocol analyzerC . a firewallD . a disk editorView AnswerAnswer: A
Which of the following formats correctly specifies these sectors?
You are using DriveSpy, a forensic tool and want to copy 150 sectors where the starting sector is 1709 on the primary hard drive . Which of the following formats correctly specifies these sectors?A . 0:1000, 150B . 0:1709, 150C . 1:1709, 150D . 0:1709-1858View AnswerAnswer: B
When conducting computer forensic analysis, you must guard against ______________ So that you remain focused on the primary job and insure that the level of work does not increase beyond what was originally expected.
When conducting computer forensic analysis, you must guard against ______________ So that you remain focused on the primary job and insure that the level of work does not increase beyond what was originally expected.A . Hard Drive FailureB . Scope CreepC . Unauthorized expensesD . Overzealous marketingView AnswerAnswer: B
In General, __________________ Involves the investigation of data that can be retrieved from the hard disk or other disks of a computer by applying scientific methods to retrieve the data.
In General, __________________ Involves the investigation of data that can be retrieved from the hard disk or other disks of a computer by applying scientific methods to retrieve the data.A . Network ForensicsB . Data RecoveryC . Disaster RecoveryD . Computer ForensicsView AnswerAnswer: D
What is Simon trying to accomplish here?
Simon is a former employee of Trinitron XML Inc. He feels he was wrongly terminated and wants to hack into his former company's network. Since Simon remembers some of the server names, he attempts to run the axfr and ixfr commands using DIG . What is Simon trying to accomplish...
How many law-enforcement computer investigators should you request to staff the lab?
You are working for a local police department that services a population of 1,000,000 people and you have been given the task of building a computer forensics lab . How many law-enforcement computer investigators should you request to staff the lab?A . 8B . 1C . 4D . 2View AnswerAnswer:...