Which of the following vulnerability/exploitation is referred above?

Attacker uses vulnerabilities in the authentication or session management functions such as exposed accounts, session IDs, logout, password management, timeouts, remember me. secret question, account update etc. to impersonate users, if a user simply closes the browser without logging out from sites accessed through a public computer, attacker can use...

November 29, 2018 No Comments READ MORE +

Which type of correlation will you use if your organization wants to use different OS and network hardware platforms throughout the network?

Event correlation is a procedure that is assigned with a new meaning for a set of events that occur in a predefined interval of time. Which type of correlation will you use if your organization wants to use different OS and network hardware platforms throughout the network?A . Same-platform correlationB...

November 24, 2018 No Comments READ MORE +

Files stored in the Recycle Bin in its physical location are renamed as Dxy.ext, where, “X” represents the _________.

Files stored in the Recycle Bin in its physical location are renamed as Dxy.ext, where, “X” represents the _________.A . Drive nameB . Sequential numberC . Original file name's extensionD . Original file nameView AnswerAnswer: A

November 23, 2018 No Comments READ MORE +

Cyber-crime is defined as any Illegal act involving a gun, ammunition, or its applications.

Cyber-crime is defined as any Illegal act involving a gun, ammunition, or its applications.A . TrueB . FalseView AnswerAnswer: B

November 23, 2018 No Comments READ MORE +

Which of the following network attacks refers to sending huge volumes of email to an address in an attempt to overflow the mailbox, or overwhelm the server where the email address is hosted, to cause a denial-of-service attack?

Which of the following network attacks refers to sending huge volumes of email to an address in an attempt to overflow the mailbox, or overwhelm the server where the email address is hosted, to cause a denial-of-service attack?A . Email spammingB . Mail bombingC . PhishingD . Email spoofingView AnswerAnswer:...

November 18, 2018 No Comments READ MORE +

Which of the following law is related to fraud and related activity in connection with computers?

Depending upon the Jurisdictional areas, different laws apply to different incidents. Which of the following law is related to fraud and related activity in connection with computers?A . 18 USC 7029B . 18 USC 7030C . 18 USC 7361D . 18 USC 7371View AnswerAnswer: B

November 14, 2018 No Comments READ MORE +

What is the first step that needs to be carried out to investigate wireless attacks?

What is the first step that needs to be carried out to investigate wireless attacks?A . Obtain a search warrantB . Identify wireless devices at crime sceneC . Document the scene and maintain a chain of custodyD . Detect the wireless connectionsView AnswerAnswer: A

November 5, 2018 No Comments READ MORE +

Which of the following commands shows you the names of all open shared files on a server and number of file locks on each file?

Which of the following commands shows you the names of all open shared files on a server and number of file locks on each file?A . Net sessionsB . Net fileC . NetconfigD . Net shareView AnswerAnswer: B

November 4, 2018 No Comments READ MORE +

Which of the following attributes of a forensics report can render it inadmissible in a court of law?

Computer forensics report provides detailed information on complete computer forensics investigation process. It should explain how the incident occurred, provide technical details of the incident and should be clear to understand. Which of the following attributes of a forensics report can render it inadmissible in a court of law?A ....

November 3, 2018 No Comments READ MORE +

Which of the following is not a role of first responder?

First responder is a person who arrives first at the crime scene and accesses the victim's computer system after the incident. He or She is responsible for protecting, integrating, and preserving the evidence obtained from the crime scene. Which of the following is not a role of first responder?A ....

November 1, 2018 No Comments READ MORE +