In a computer forensics investigation, what describes the route that evidence takes from the time you find it until the case is closed or goes to court?
In a computer forensics investigation, what describes the route that evidence takes from the time you find it until the case is closed or goes to court?A . rules of evidenceB . law of probabilityC . chain of custodyD . policy of separationView AnswerAnswer: C
What group is actively providing tools and creating procedures for testing and validating computer forensics software?
To make sure the evidence you recover and analyze with computer forensics software can be admitted in court, you must test and validate the software. What group is actively providing tools and creating procedures for testing and validating computer forensics software?A . Computer Forensics Tools and Validation Committee (CFTVC)B . Association...
Which part of the Windows Registry contains the user's password file?
Which part of the Windows Registry contains the user's password file?A . HKEY_LOCAL_MACHINEB . HKEY_CURRENT_CONFIGURATIONC . HKEY_USERD . HKEY_CURRENT_USERView AnswerAnswer: A
What argument could the defense make to weaken your case?
You have used a newly released forensic investigation tool, which doesn't meet the Daubert Test, during a case. The case has ended-up in court. What argument could the defense make to weaken your case?A . The tool hasn't been tested by the International Standards Organization (ISO)B . Only the local law...
What is the name of the service used to synchronize time among multiple computers?
When monitoring for both intrusion and security events between multiple computers, it is essential that the computers' clocks are synchronized. Synchronized time allows an administrator to reconstruct what took place during an attack against multiple computers. Without synchronized time, it is very difficult to determine exactly when specific events took...
What term is used to describe a cryptographic technique for embedding information into something else for the sole purpose of hiding that information from the casual observer?
What term is used to describe a cryptographic technique for embedding information into something else for the sole purpose of hiding that information from the casual observer?A . rootkitB . key escrowC . steganographyD . OffsetView AnswerAnswer: C
Which federal computer crime law specifically refers to fraud and related activity in connection with access devices like routers?
Which federal computer crime law specifically refers to fraud and related activity in connection with access devices like routers?A . 18D . 1029E . 18H . 1362 . 18 . 2511 . 18 . 2703View AnswerAnswer: A
forensics examiner?
It takes _____________ mismanaged case/s to ruin your professional reputation as a computer forensics examiner?A . by law, threeB . quite a fewC . only oneD . at least twoView AnswerAnswer: C
Of these firewall rules, which among the following would be appropriate?
Study the log given below and answer the following question: Apr 24 14:46:46 [4663]: spp_portscan: portscan detected from 194.222.156.169 Apr 24 14:46:46 [4663]: IDS27/FIN Scan: 194.222.156.169:56693 -> 172.16.1.107:482 Apr 24 18:01:05 [4663]: IDS/DNS-version-query: 212.244.97.121:3485 -> 172.16.1.107:53 Apr 24 19:04:01 [4663]: IDS213/ftp-passwd-retrieval: 194.222.156.169:1425 -> 172.16.1.107:21 Apr 25 08:02:41 [5875]: spp_portscan: PORTSCAN DETECTED from 24.9.255.53 Apr 25 02:08:07...
Sectors in hard disks typically contain how many bytes?
Sectors in hard disks typically contain how many bytes?A . 256B . 512C . 1024D . 2048View AnswerAnswer: B