Network forensics can be defined as the sniffing, recording, acquisition and analysis of the network traffic and event logs in order to investigate a network security incident.
Network forensics can be defined as the sniffing, recording, acquisition and analysis of the network traffic and event logs in order to investigate a network security incident.A . TrueB . FalseView AnswerAnswer: A
Hard disk data addressing is a method of allotting addresses to each ___________of data on a hard disk
Hard disk data addressing is a method of allotting addresses to each ___________of data on a hard diskA . Physical blockB . Logical blockC . Operating system blockD . Hard disk blockView AnswerAnswer: A
Graphics Interchange Format (GIF) is a ___________RGB bitmap Image format for Images with up to 256 distinct colors per frame.
Graphics Interchange Format (GIF) is a ___________RGB bitmap Image format for Images with up to 256 distinct colors per frame.A . 8-bitB . 16-bitC . 24-bitD . 32-bitView AnswerAnswer: A
Which of the following Wi-Fi chalking methods refers to drawing symbols in public places to advertise open Wi-Fi networks?
Which of the following Wi-Fi chalking methods refers to drawing symbols in public places to advertise open Wi-Fi networks?A . WarWalkingB . WarFlyingC . WarChalkingD . WarDhvingView AnswerAnswer: C
When a system is compromised, attackers often try to disable auditing, in Windows 7; modifications to the audit policy are recorded as entries of Event ID____________.
When a system is compromised, attackers often try to disable auditing, in Windows 7; modifications to the audit policy are recorded as entries of Event ID____________.A . 4902B . 3902C . 4904D . 3904View AnswerAnswer: A
What is a SCSI (Small Computer System Interface)?
What is a SCSI (Small Computer System Interface)?A . A set of ANSI standard electronic interfaces that allow personal computers to communicate with peripheral hardware such as disk drives, tape drives. CD-ROM drives, printers, and scannersB . A standard electronic interface used between a computer motherboard's data paths or bus...
Physical security recommendations:
Physical security recommendations: There should be only one entrance to a forensics labA . TrueB . FalseView AnswerAnswer: A
Which table is used to convert huge word lists (i .e. dictionary files and brute-force lists) into password hashes?
Which table is used to convert huge word lists (i .e. dictionary files and brute-force lists) into password hashes?A . Rainbow tablesB . Hash tablesC . Master file tablesD . Database tablesView AnswerAnswer: A
Who is responsible for the following tasks?
Who is responsible for the following tasks? Secure the scene and ensure that it is maintained In a secure state until the Forensic Team advises Make notes about the scene that will eventually be handed over to the Forensic TeamA . Non-Laboratory StaffB . System administratorsC . Local managers or...
During the seizure of digital evidence, the suspect can be allowed touch the computer system.
During the seizure of digital evidence, the suspect can be allowed touch the computer system.A . TrueB . FalseView AnswerAnswer: B