Which of the following commands shows you the NetBIOS name table each?
Which of the following commands shows you the NetBIOS name table each?A . nbtstat -nB . nbtstat -cC . nbtstat -rD . nbtstat -sView AnswerAnswer: A
Recovery of the deleted partition is the process by which the investigator evaluates and extracts the deleted partitions.
Recovery of the deleted partition is the process by which the investigator evaluates and extracts the deleted partitions.A . TrueB . FalseView AnswerAnswer: A
Data files from original evidence should be used for forensics analysis
Data files from original evidence should be used for forensics analysisA . TrueB . FalseView AnswerAnswer: B
Which property of the image shows you the number of colors available for each pixel in an image?
An image is an artifact that reproduces the likeness of some subject. These are produced by optical devices (i.e. cameras, mirrors, lenses, telescopes, and microscopes). Which property of the image shows you the number of colors available for each pixel in an image?A . PixelB . Bit DepthC . File...
How do you define forensic computing?
How do you define forensic computing?A . It is the science of capturing, processing, and investigating data security incidents and making it acceptable to a court of law.B . It is a methodology of guidelines that deals with the process of cyber investigationC . It Is a preliminary and mandatory...
If a file (readme.txt) on a hard disk has a size of 2600 bytes, how many sectors are normally allocated to this file?
If a file (readme.txt) on a hard disk has a size of 2600 bytes, how many sectors are normally allocated to this file?A . 4 SectorsB . 5 SectorsC . 6 SectorsD . 7 SectorsView AnswerAnswer: C
Network forensics allows Investigators to inspect network traffic and logs to identify and locate the attack system
Network forensics allows Investigators to inspect network traffic and logs to identify and locate the attack system Network forensics can reveal: (Select three answers)A . Source of security incidents’ and network attacksB . Path of the attackC . Intrusion techniques used by attackersD . Hardware configuration of the attacker's systemView...
When a file or folder is deleted, the complete path, including the original file name, is stored in a special hidden file called "INF02" in the Recycled folder.
When a file or folder is deleted, the complete path, including the original file name, is stored in a special hidden file called "INF02" in the Recycled folder. If the INF02 file is deleted, it is re-created when you___________.A . Restart WindowsB . Kill the running processes in Windows task...
Tracks numbering on a hard disk begins at 0 from the outer edge and moves towards the center, typically reaching a value of ___________.
Tracks numbering on a hard disk begins at 0 from the outer edge and moves towards the center, typically reaching a value of ___________.A . 1023B . 1020C . 1024D . 2023View AnswerAnswer: A
What is the goal of forensic science?
What is the goal of forensic science?A . To determine the evidential value of the crime scene and related evidenceB . Mitigate the effects of the information security breachC . Save the good will of the investigating organizationD . It is a disciple to deal with the legal processesView AnswerAnswer:...