Which of the following is not correct when documenting an electronic crime scene?

Which of the following is not correct when documenting an electronic crime scene?A . Document the physical scene, such as the position of the mouse and the location of components near the systemB . Document related electronic components that are difficult to findC . Record the condition of the computer...

May 30, 2018 No Comments READ MORE +

Which is not a part of environmental conditions of a forensics lab?

Which is not a part of environmental conditions of a forensics lab?A . Large dimensions of the roomB . Good cooling system to overcome excess heat generated by the work stationC . Allocation of workstations as per the room dimensionsD . Open windows facing the public roadView AnswerAnswer: D

May 29, 2018 No Comments READ MORE +

Buffer Overflow occurs when an application writes more data to a block of memory, or buffer, than the buffer is allocated to hold. Buffer overflow attacks allow an attacker to modify the _______________in order to control the process execution, crash the process and modify internal variables.

Buffer Overflow occurs when an application writes more data to a block of memory, or buffer, than the buffer is allocated to hold. Buffer overflow attacks allow an attacker to modify the _______________in order to control the process execution, crash the process and modify internal variables.A . Target process's address...

May 23, 2018 No Comments READ MORE +

Which of the following communication standard is used in serial communication data acquisition system?

Data acquisition system is a combination of tools or processes used to gather, analyze and record Information about some phenomenon. Different data acquisition system are used depends on the location, speed, cost. etc. Serial communication data acquisition system is used when the actual location of the data is at some...

May 23, 2018 No Comments READ MORE +

Which data compression technique maintains data integrity?

Data compression involves encoding the data to take up less storage space and less bandwidth for transmission. It helps in saving cost and high data manipulation in many business applications. Which data compression technique maintains data integrity?A . Lossless compressionB . Lossy compressionC . Speech encoding compressionD . Lossy video...

May 22, 2018 No Comments READ MORE +

Which one of the following statements is not correct while preparing for testimony?

Which one of the following statements is not correct while preparing for testimony?A . Go through the documentation thoroughlyB . Do not determine the basic facts of the case before beginning and examining the evidenceC . Establish early communication with the attorneyD . Substantiate the findings with documentation and by...

May 21, 2018 No Comments READ MORE +

What does event ID 531 in Windows Security Event Log indicates?

Windows Security Event Log contains records of login/logout activity or other security-related events specified by the system's audit policy. What does event ID 531 in Windows Security Event Log indicates?A . A user successfully logged on to a computerB . The logon attempt was made with an unknown user name...

May 17, 2018 No Comments READ MORE +

Which of the following task list commands provides information about the listed processes, including the image name, PID, name, and number of the session for the process?

Task list command displays a list of applications and services with their Process ID (PID) for all tasks running on either a local or a remote computer. Which of the following task list commands provides information about the listed processes, including the image name, PID, name, and number of the...

May 17, 2018 No Comments READ MORE +

Which of the following statements is not a part of securing and evaluating electronic crime scene checklist?

Which of the following statements is not a part of securing and evaluating electronic crime scene checklist?A . Locate and help the victimB . Transmit additional flash messages to other responding unitsC . Request additional help at the scene if neededD . Blog about the incident on the internetView AnswerAnswer:...

May 15, 2018 No Comments READ MORE +

Windows Security Accounts Manager (SAM) is a registry file which stores passwords in a hashed format.

Windows Security Accounts Manager (SAM) is a registry file which stores passwords in a hashed format. SAM file in Windows is located at:A . C:windowssystem32configSAMB . C:windowssystem32conSAMC . C:windowssystem32BootSAMD . C:windowssystem32driversSAMView AnswerAnswer: A

May 15, 2018 No Comments READ MORE +