When collecting evidence from the RAM, where do you look for data?

When collecting evidence from the RAM, where do you look for data?A . Swap fileB . SAM fileC . Data fileD . Log fileView AnswerAnswer: A

October 29, 2018 No Comments READ MORE +

Which of the following approaches checks and compares all the fields systematically and intentionally for positive and negative correlation with each other to determine the correlation across one or multiple fields?

Which of the following approaches checks and compares all the fields systematically and intentionally for positive and negative correlation with each other to determine the correlation across one or multiple fields?A . Graph-based approachB . Neural network-based approachC . Rule-based approachD . Automated field correlation approachView AnswerAnswer: D

October 26, 2018 No Comments READ MORE +

What is the size limit for Recycle Bin in Vista and later versions of the Windows?

The Recycle Bin is located on the Windows desktop. When you delete an item from the hard disk, Windows sends that deleted item to the Recycle Bin and the icon changes to full from empty, but items deleted from removable media, such as a floppy disk or network drive, are...

October 26, 2018 No Comments READ MORE +

Which of the following wireless access control attacks allows the attacker to set up a rogue access point outside the corporate perimeter, and then lure the employees of the organization to connect to it?

Wireless access control attacks aim to penetrate a network by evading WLAN access control measures, such as AP MAC filters and Wi-Fi port access controls. Which of the following wireless access control attacks allows the attacker to set up a rogue access point outside the corporate perimeter, and then lure...

October 24, 2018 No Comments READ MORE +

System software password cracking is defined as cracking the operating system and all other utilities that enable a computer to function

System software password cracking is defined as cracking the operating system and all other utilities that enable a computer to functionA . TrueB . FalseView AnswerAnswer: A

October 20, 2018 No Comments READ MORE +

Which of the following Steganography techniques allows you to encode information that ensures creation of cover for secret communication?

Which of the following Steganography techniques allows you to encode information that ensures creation of cover for secret communication?A . Substitution techniquesB . Transform domain techniquesC . Cover generation techniquesD . Spread spectrum techniquesView AnswerAnswer: C

October 15, 2018 No Comments READ MORE +

When dealing with the powered-off computers at the crime scene, if the computer is switched off, turn it on

When dealing with the powered-off computers at the crime scene, if the computer is switched off, turn it onA . TrueB . FalseView AnswerAnswer: B

October 14, 2018 No Comments READ MORE +

Attackers can manipulate variables that reference files with "dot-dot-slash (./)" sequences and their variations such as http://www.juggyDoy.corn/GET/process.php./././././././././etc/passwd.

Attackers can manipulate variables that reference files with "dot-dot-slash (./)" sequences and their variations such as http://www.juggyDoy.corn/GET/process.php./././././././././etc/passwd. Identify the attack referred.A . Directory traversalB . SQL InjectionC . XSS attackD . File injectionView AnswerAnswer: A

October 14, 2018 No Comments READ MORE +

Digital evidence is not fragile in nature.

Digital evidence is not fragile in nature.A . TrueB . FalseView AnswerAnswer: B

October 9, 2018 No Comments READ MORE +

Which of the following log injection attacks uses white space padding to create unusual log entries?

Which of the following log injection attacks uses white space padding to create unusual log entries?A . Word wrap abuse attackB . HTML injection attackC . Terminal injection attackD . Timestamp injection attackView AnswerAnswer: A

October 8, 2018 No Comments READ MORE +