Which of the following attack Jason can infer from his findings?

Jason, a renowned forensic investigator, is investigating a network attack that resulted in the compromise of several systems in a reputed multinational's network. He started Wireshark to capture the network traffic. Upon investigation, he found that the DNS packets travelling across the network belonged to a non-company configured IP. Which...

August 17, 2018 No Comments READ MORE +

Which of the following network attacks refers to a process in which an attacker changes his or her IP address so that he or she appears to be someone else?

Networks are vulnerable to an attack which occurs due to overextension of bandwidth, bottlenecks, network data interception, etc. Which of the following network attacks refers to a process in which an attacker changes his or her IP address so that he or she appears to be someone else?A . IP...

August 16, 2018 No Comments READ MORE +

Email archiving is a systematic approach to save and protect the data contained in emails so that it can tie easily accessed at a later date.

Email archiving is a systematic approach to save and protect the data contained in emails so that it can tie easily accessed at a later date.A . TrueB . FalseView AnswerAnswer: A

August 15, 2018 No Comments READ MORE +

Which one of the following is not a consideration in a forensic readiness planning checklist?

Which one of the following is not a consideration in a forensic readiness planning checklist?A . Define the business states that need digital evidenceB . Identify the potential evidence availableC . Decide the procedure for securely collecting the evidence that meets the requirement fn a forensically sound mannerD . Take...

August 14, 2018 No Comments READ MORE +

A steganographic file system is a method to store the files in a way that encrypts and hides the data without the knowledge of others

A steganographic file system is a method to store the files in a way that encrypts and hides the data without the knowledge of othersA . TrueB . FalseView AnswerAnswer: A

August 13, 2018 No Comments READ MORE +

Which of the following passwords are sent over the wire (and wireless) network, or stored on some media as it is typed without any alteration?

Which of the following passwords are sent over the wire (and wireless) network, or stored on some media as it is typed without any alteration?A . Clear text passwordsB . Obfuscated passwordsC . Hashed passwordsD . Hex passwordsView AnswerAnswer: A

August 13, 2018 No Comments READ MORE +

Log management includes all the processes and techniques used to collect, aggregate, and analyze computer-generated log messages. It consists of the hardware, software, network and media used to generate, transmit, store, analyze, and dispose of log data.

Log management includes all the processes and techniques used to collect, aggregate, and analyze computer-generated log messages. It consists of the hardware, software, network and media used to generate, transmit, store, analyze, and dispose of log data.A . TrueB . FalseView AnswerAnswer: A

August 12, 2018 No Comments READ MORE +

Determine the message length from following hex viewer record:

Determine the message length from following hex viewer record: A . 6E2FB . 13C . 27D . 810DView AnswerAnswer: D

July 29, 2018 No Comments READ MORE +

What is the maximum drive size supported?

FAT32 is a 32-bit version of FAT file system using smaller clusters and results in efficient storage capacity. What is the maximum drive size supported?A . 1 terabytesB . 2 terabytesC . 3 terabytesD . 4 terabytesView AnswerAnswer: B

July 25, 2018 No Comments READ MORE +

Which of the following is not a part of data acquisition forensics Investigation?

Which of the following is not a part of data acquisition forensics Investigation?A . Permit only authorized personnel to accessB . Protect the evidence from extremes in temperatureC . Work on the original storage medium not on the duplicated copyD . Disable all remote access to the systemView AnswerAnswer: C

July 23, 2018 No Comments READ MORE +