Which of the following commands shows you the NetBIOS name table each?

Which of the following commands shows you the NetBIOS name table each?A . nbtstat -nB . nbtstat -cC . nbtstat -rD . nbtstat -sView AnswerAnswer: A

April 13, 2018 No Comments READ MORE +

Recovery of the deleted partition is the process by which the investigator evaluates and extracts the deleted partitions.

Recovery of the deleted partition is the process by which the investigator evaluates and extracts the deleted partitions.A . TrueB . FalseView AnswerAnswer: A

April 10, 2018 No Comments READ MORE +

Data files from original evidence should be used for forensics analysis

Data files from original evidence should be used for forensics analysisA . TrueB . FalseView AnswerAnswer: B

April 9, 2018 No Comments READ MORE +

Which property of the image shows you the number of colors available for each pixel in an image?

An image is an artifact that reproduces the likeness of some subject. These are produced by optical devices (i.e. cameras, mirrors, lenses, telescopes, and microscopes). Which property of the image shows you the number of colors available for each pixel in an image?A . PixelB . Bit DepthC . File...

April 9, 2018 No Comments READ MORE +

How do you define forensic computing?

How do you define forensic computing?A . It is the science of capturing, processing, and investigating data security incidents and making it acceptable to a court of law.B . It is a methodology of guidelines that deals with the process of cyber investigationC . It Is a preliminary and mandatory...

April 3, 2018 No Comments READ MORE +

If a file (readme.txt) on a hard disk has a size of 2600 bytes, how many sectors are normally allocated to this file?

If a file (readme.txt) on a hard disk has a size of 2600 bytes, how many sectors are normally allocated to this file?A . 4 SectorsB . 5 SectorsC . 6 SectorsD . 7 SectorsView AnswerAnswer: C

March 31, 2018 No Comments READ MORE +

Network forensics allows Investigators to inspect network traffic and logs to identify and locate the attack system

Network forensics allows Investigators to inspect network traffic and logs to identify and locate the attack system Network forensics can reveal: (Select three answers)A . Source of security incidents’ and network attacksB . Path of the attackC . Intrusion techniques used by attackersD . Hardware configuration of the attacker's systemView...

March 28, 2018 No Comments READ MORE +

When a file or folder is deleted, the complete path, including the original file name, is stored in a special hidden file called "INF02" in the Recycled folder.

When a file or folder is deleted, the complete path, including the original file name, is stored in a special hidden file called "INF02" in the Recycled folder. If the INF02 file is deleted, it is re-created when you___________.A . Restart WindowsB . Kill the running processes in Windows task...

March 28, 2018 No Comments READ MORE +

Tracks numbering on a hard disk begins at 0 from the outer edge and moves towards the center, typically reaching a value of ___________.

Tracks numbering on a hard disk begins at 0 from the outer edge and moves towards the center, typically reaching a value of ___________.A . 1023B . 1020C . 1024D . 2023View AnswerAnswer: A

March 27, 2018 No Comments READ MORE +

What is the goal of forensic science?

What is the goal of forensic science?A . To determine the evidential value of the crime scene and related evidenceB . Mitigate the effects of the information security breachC . Save the good will of the investigating organizationD . It is a disciple to deal with the legal processesView AnswerAnswer:...

March 23, 2018 No Comments READ MORE +