What header field in the TCP/IP protocol stack involves the hacker exploit known as the Ping of Death?

What header field in the TCP/IP protocol stack involves the hacker exploit known as the Ping of Death?A . ICMP header fieldB . TCP header fieldC . IP header fieldD . UDP header fieldView AnswerAnswer: B

December 18, 2020 No Comments READ MORE +

Under which Federal Statutes does FBI investigate for computer crimes involving e-mail scams and mail fraud?

Under which Federal Statutes does FBI investigate for computer crimes involving e-mail scams and mail fraud?A . 18D . 1029 Possession of Access DevicesE . 18H . 1030 Fraud and related activity in connection with computers . 18 . 1343 Fraud by wire, radio or television . 18 . 1361...

December 18, 2020 No Comments READ MORE +

When examining the log files from a Windows IIS Web Server, how often is a new log file created?

When examining the log files from a Windows IIS Web Server, how often is a new log file created?A . the same log is used at all timesB . a new log file is created everydayC . a new log file is created each weekD . a new log is...

December 18, 2020 No Comments READ MORE +

What method would be most efficient for you to acquire digital evidence from this network?

You are contracted to work as a computer forensics investigator for a regional bank that has four 30 TB storage area networks that store customer data. What method would be most efficient for you to acquire digital evidence from this network?A . create a compressed copy of the file with DoubleSpaceB...

December 18, 2020 No Comments READ MORE +

Which legal document allows law enforcement to search an office, place of business, or other locale for evidence relating to an alleged crime?

Which legal document allows law enforcement to search an office, place of business, or other locale for evidence relating to an alleged crime?A . bench warrantB . wire tapC . subpoenaD . search warrantView AnswerAnswer: D

December 18, 2020 No Comments READ MORE +

What does the superblock in Linux define?

What does the superblock in Linux define?A . filesynamesB . diskgeometrC . location of the firstinodeD . available spaceView AnswerAnswer: C

December 17, 2020 No Comments READ MORE +

You should make at least how many bit-stream copies of a suspect drive?

You should make at least how many bit-stream copies of a suspect drive?A . 1B . 2C . 3D . 4View AnswerAnswer: B

December 17, 2020 No Comments READ MORE +

A honey pot deployed with the IP 172.16.1.108 was compromised by an attacker. Given below is an excerpt from a Snort binary capture of the attack. Decipher the activity carried out by the attacker by studying the log. Please note that you are required to infer only what is explicit in the excerpt.

A honey pot deployed with the IP 172.16.1.108 was compromised by an attacker. Given below is an excerpt from a Snort binary capture of the attack. Decipher the activity carried out by the attacker by studying the log. Please note that you are required to infer only what is explicit...

December 17, 2020 No Comments READ MORE +

If you plan to startup a suspect's computer, you must modify the ___________ to ensure that you do not contaminate or alter data on the suspect's hard drive by booting to the hard drive.

If you plan to startup a suspect's computer, you must modify the ___________ to ensure that you do not contaminate or alter data on the suspect's hard drive by booting to the hard drive.A . deltree commandB . CMOSC . Boot.sysD . Scandisk utilityView AnswerAnswer: C

December 17, 2020 No Comments READ MORE +

While searching through the code, you come across something abnormal: What have you found?

You are working on a thesis for your doctorate degree in Computer Science. Your thesis is based on HTML, DHTML, and other web-based languages and how they have evolved over the years. You navigate to archive. org and view the HTML code of news.com. You then navigate to the current news.com...

December 17, 2020 No Comments READ MORE +