Which of the following attack Jason can infer from his findings?
Jason, a renowned forensic investigator, is investigating a network attack that resulted in the compromise of several systems in a reputed multinational's network. He started Wireshark to capture the network traffic. Upon investigation, he found that the DNS packets travelling across the network belonged to a non-company configured IP. Which...
Which of the following network attacks refers to a process in which an attacker changes his or her IP address so that he or she appears to be someone else?
Networks are vulnerable to an attack which occurs due to overextension of bandwidth, bottlenecks, network data interception, etc. Which of the following network attacks refers to a process in which an attacker changes his or her IP address so that he or she appears to be someone else?A . IP...
Email archiving is a systematic approach to save and protect the data contained in emails so that it can tie easily accessed at a later date.
Email archiving is a systematic approach to save and protect the data contained in emails so that it can tie easily accessed at a later date.A . TrueB . FalseView AnswerAnswer: A
Which one of the following is not a consideration in a forensic readiness planning checklist?
Which one of the following is not a consideration in a forensic readiness planning checklist?A . Define the business states that need digital evidenceB . Identify the potential evidence availableC . Decide the procedure for securely collecting the evidence that meets the requirement fn a forensically sound mannerD . Take...
A steganographic file system is a method to store the files in a way that encrypts and hides the data without the knowledge of others
A steganographic file system is a method to store the files in a way that encrypts and hides the data without the knowledge of othersA . TrueB . FalseView AnswerAnswer: A
Which of the following passwords are sent over the wire (and wireless) network, or stored on some media as it is typed without any alteration?
Which of the following passwords are sent over the wire (and wireless) network, or stored on some media as it is typed without any alteration?A . Clear text passwordsB . Obfuscated passwordsC . Hashed passwordsD . Hex passwordsView AnswerAnswer: A
Log management includes all the processes and techniques used to collect, aggregate, and analyze computer-generated log messages. It consists of the hardware, software, network and media used to generate, transmit, store, analyze, and dispose of log data.
Log management includes all the processes and techniques used to collect, aggregate, and analyze computer-generated log messages. It consists of the hardware, software, network and media used to generate, transmit, store, analyze, and dispose of log data.A . TrueB . FalseView AnswerAnswer: A
Determine the message length from following hex viewer record:
Determine the message length from following hex viewer record: A . 6E2FB . 13C . 27D . 810DView AnswerAnswer: D
What is the maximum drive size supported?
FAT32 is a 32-bit version of FAT file system using smaller clusters and results in efficient storage capacity. What is the maximum drive size supported?A . 1 terabytesB . 2 terabytesC . 3 terabytesD . 4 terabytesView AnswerAnswer: B
Which of the following is not a part of data acquisition forensics Investigation?
Which of the following is not a part of data acquisition forensics Investigation?A . Permit only authorized personnel to accessB . Protect the evidence from extremes in temperatureC . Work on the original storage medium not on the duplicated copyD . Disable all remote access to the systemView AnswerAnswer: C