Which Is a Linux journaling file system?
Which Is a Linux journaling file system?A . Ext3B . HFSC . FATD . BFSView AnswerAnswer: A
When NTFS Is formatted, the format program assigns the __________ sectors to the boot sectors and to the bootstrap code
When NTFS Is formatted, the format program assigns the __________ sectors to the boot sectors and to the bootstrap codeA . First 12B . First 16C . First 22D . First 24View AnswerAnswer: B
Dumpster Diving refers to:
Dumpster Diving refers to:A . Searching for sensitive information in the user's trash bins and printer trash bins, and searching the user's desk for sticky notesB . Looking at either the user's keyboard or screen while he/she is logging inC . Convincing people to reveal the confidential informationD . Creating...
Consistency in the investigative report is more important than the exact format in the report to eliminate uncertainty and confusion.
Consistency in the investigative report is more important than the exact format in the report to eliminate uncertainty and confusion.A . TrueB . FalseView AnswerAnswer: A
Which of the following deposition is not a standard practice?
Deposition enables opposing counsel to preview an expert witness's testimony at trial. Which of the following deposition is not a standard practice?A . Both attorneys are presentB . Only one attorneys is presentC . No jury or judgeD . Opposing counsel asks questionsView AnswerAnswer: B
Which of the following would you consider an aspect of organizational security, especially focusing on IT security?
Which of the following would you consider an aspect of organizational security, especially focusing on IT security?A . Biometric information securityB . Security from fraudsC . Application securityD . Information copyright securityView AnswerAnswer: C
Which of the following commands will you use to look at which sessions the machine has opened with other systems?
You have been given the task to investigate web attacks on a Windows-based server. Which of the following commands will you use to look at which sessions the machine has opened with other systems?A . Net sessionsB . Net useC . Net configD . Net shareView AnswerAnswer: B
Which of the following Operating System logs contains information about operational actions performed by OS components?
Operating System logs are most beneficial for Identifying or Investigating suspicious activities involving a particular host. Which of the following Operating System logs contains information about operational actions performed by OS components?A . Event logsB . Audit logsC . Firewall logsD . IDS logsView AnswerAnswer: A
Who is responsible for collecting, preserving, and packaging electronic evidence?
First response to an incident may involve three different groups of people, and each will have differing skills and need to carry out differing tasks based on the incident. Who is responsible for collecting, preserving, and packaging electronic evidence?A . System administratorsB . Local managers or other non-forensic staffC ....
Which of the following statements is incorrect related to acquiring electronic evidence at crime scene?
Which of the following statements is incorrect related to acquiring electronic evidence at crime scene?A . Sample banners are used to record the system activities when used by the unauthorized userB . In warning banners, organizations give clear and unequivocal notice to intruders that by signing onto the system they...