In a computer forensics investigation, what describes the route that evidence takes from the time you find it until the case is closed or goes to court?

In a computer forensics investigation, what describes the route that evidence takes from the time you find it until the case is closed or goes to court?A . rules of evidenceB . law of probabilityC . chain of custodyD . policy of separationView AnswerAnswer: C

December 15, 2020 No Comments READ MORE +

What group is actively providing tools and creating procedures for testing and validating computer forensics software?

To make sure the evidence you recover and analyze with computer forensics software can be admitted in court, you must test and validate the software. What group is actively providing tools and creating procedures for testing and validating computer forensics software?A . Computer Forensics Tools and Validation Committee (CFTVC)B . Association...

December 15, 2020 No Comments READ MORE +

Which part of the Windows Registry contains the user's password file?

Which part of the Windows Registry contains the user's password file?A . HKEY_LOCAL_MACHINEB . HKEY_CURRENT_CONFIGURATIONC . HKEY_USERD . HKEY_CURRENT_USERView AnswerAnswer: A

December 15, 2020 No Comments READ MORE +

What argument could the defense make to weaken your case?

You have used a newly released forensic investigation tool, which doesn't meet the Daubert Test, during a case. The case has ended-up in court. What argument could the defense make to weaken your case?A . The tool hasn't been tested by the International Standards Organization (ISO)B . Only the local law...

December 14, 2020 No Comments READ MORE +

What is the name of the service used to synchronize time among multiple computers?

When monitoring for both intrusion and security events between multiple computers, it is essential that the computers' clocks are synchronized. Synchronized time allows an administrator to reconstruct what took place during an attack against multiple computers. Without synchronized time, it is very difficult to determine exactly when specific events took...

December 14, 2020 No Comments READ MORE +

What term is used to describe a cryptographic technique for embedding information into something else for the sole purpose of hiding that information from the casual observer?

What term is used to describe a cryptographic technique for embedding information into something else for the sole purpose of hiding that information from the casual observer?A . rootkitB . key escrowC . steganographyD . OffsetView AnswerAnswer: C

December 14, 2020 No Comments READ MORE +

Which federal computer crime law specifically refers to fraud and related activity in connection with access devices like routers?

Which federal computer crime law specifically refers to fraud and related activity in connection with access devices like routers?A . 18D . 1029E . 18H . 1362 . 18 . 2511 . 18 . 2703View AnswerAnswer: A

December 14, 2020 No Comments READ MORE +

forensics examiner?

It takes _____________ mismanaged case/s to ruin your professional reputation as a computer forensics examiner?A . by law, threeB . quite a fewC . only oneD . at least twoView AnswerAnswer: C

December 14, 2020 No Comments READ MORE +

Of these firewall rules, which among the following would be appropriate?

Study the log given below and answer the following question: Apr 24 14:46:46 [4663]: spp_portscan: portscan detected from 194.222.156.169 Apr 24 14:46:46 [4663]: IDS27/FIN Scan: 194.222.156.169:56693 -> 172.16.1.107:482 Apr 24 18:01:05 [4663]: IDS/DNS-version-query: 212.244.97.121:3485 -> 172.16.1.107:53 Apr 24 19:04:01 [4663]: IDS213/ftp-passwd-retrieval: 194.222.156.169:1425 -> 172.16.1.107:21 Apr 25 08:02:41 [5875]: spp_portscan: PORTSCAN DETECTED from 24.9.255.53 Apr 25 02:08:07...

December 14, 2020 No Comments READ MORE +

Sectors in hard disks typically contain how many bytes?

Sectors in hard disks typically contain how many bytes?A . 256B . 512C . 1024D . 2048View AnswerAnswer: B

December 14, 2020 No Comments READ MORE +