Network forensics can be defined as the sniffing, recording, acquisition and analysis of the network traffic and event logs in order to investigate a network security incident.

Network forensics can be defined as the sniffing, recording, acquisition and analysis of the network traffic and event logs in order to investigate a network security incident.A . TrueB . FalseView AnswerAnswer: A

October 7, 2018 No Comments READ MORE +

Hard disk data addressing is a method of allotting addresses to each ___________of data on a hard disk

Hard disk data addressing is a method of allotting addresses to each ___________of data on a hard diskA . Physical blockB . Logical blockC . Operating system blockD . Hard disk blockView AnswerAnswer: A

October 7, 2018 No Comments READ MORE +

Graphics Interchange Format (GIF) is a ___________RGB bitmap Image format for Images with up to 256 distinct colors per frame.

Graphics Interchange Format (GIF) is a ___________RGB bitmap Image format for Images with up to 256 distinct colors per frame.A . 8-bitB . 16-bitC . 24-bitD . 32-bitView AnswerAnswer: A

October 6, 2018 No Comments READ MORE +

Which of the following Wi-Fi chalking methods refers to drawing symbols in public places to advertise open Wi-Fi networks?

Which of the following Wi-Fi chalking methods refers to drawing symbols in public places to advertise open Wi-Fi networks?A . WarWalkingB . WarFlyingC . WarChalkingD . WarDhvingView AnswerAnswer: C

October 2, 2018 No Comments READ MORE +

When a system is compromised, attackers often try to disable auditing, in Windows 7; modifications to the audit policy are recorded as entries of Event ID____________.

When a system is compromised, attackers often try to disable auditing, in Windows 7; modifications to the audit policy are recorded as entries of Event ID____________.A . 4902B . 3902C . 4904D . 3904View AnswerAnswer: A

October 1, 2018 No Comments READ MORE +

What is a SCSI (Small Computer System Interface)?

What is a SCSI (Small Computer System Interface)?A . A set of ANSI standard electronic interfaces that allow personal computers to communicate with peripheral hardware such as disk drives, tape drives. CD-ROM drives, printers, and scannersB . A standard electronic interface used between a computer motherboard's data paths or bus...

September 29, 2018 No Comments READ MORE +

Physical security recommendations:

Physical security recommendations: There should be only one entrance to a forensics labA . TrueB . FalseView AnswerAnswer: A

September 28, 2018 No Comments READ MORE +

Which table is used to convert huge word lists (i .e. dictionary files and brute-force lists) into password hashes?

Which table is used to convert huge word lists (i .e. dictionary files and brute-force lists) into password hashes?A . Rainbow tablesB . Hash tablesC . Master file tablesD . Database tablesView AnswerAnswer: A

September 18, 2018 No Comments READ MORE +

Who is responsible for the following tasks?

Who is responsible for the following tasks? Secure the scene and ensure that it is maintained In a secure state until the Forensic Team advises Make notes about the scene that will eventually be handed over to the Forensic TeamA . Non-Laboratory StaffB . System administratorsC . Local managers or...

September 15, 2018 No Comments READ MORE +

During the seizure of digital evidence, the suspect can be allowed touch the computer system.

During the seizure of digital evidence, the suspect can be allowed touch the computer system.A . TrueB . FalseView AnswerAnswer: B

September 15, 2018 No Comments READ MORE +