Syslog is a client/server protocol standard for forwarding log messages across an IP network. Syslog uses ___________to transfer log messages in a clear text format.

Syslog is a client/server protocol standard for forwarding log messages across an IP network. Syslog uses ___________to transfer log messages in a clear text format.A . TCPB . FTPC . SMTPD . POPView AnswerAnswer: A

March 20, 2018 No Comments READ MORE +

Why is it Important to consider health and safety factors in the work carried out at all stages of the forensic process conducted by the forensic analysts?

Why is it Important to consider health and safety factors in the work carried out at all stages of the forensic process conducted by the forensic analysts?A . This is to protect the staff and preserve any fingerprints that may need to be recovered at a later dateB . All...

March 17, 2018 No Comments READ MORE +

At the time of evidence transfer, both sender and receiver need to give the information about date and time of transfer in the chain of custody record.

At the time of evidence transfer, both sender and receiver need to give the information about date and time of transfer in the chain of custody record.A . TrueB . FalseView AnswerAnswer: A

March 16, 2018 No Comments READ MORE +

Which of the following statement is not correct when dealing with a powered-on computer at the crime scene?

Which of the following statement is not correct when dealing with a powered-on computer at the crime scene?A . If a computer is switched on and the screen is viewable, record the programs running on screen and photograph the screenB . If a computer is on and the monitor shows...

March 16, 2018 No Comments READ MORE +

An expert witness is a witness, who by virtue of education, profession, or experience, is believed to have special knowledge of his/her subject beyond that of the average person, sufficient that others legally depend upon his/her opinion.

An expert witness is a witness, who by virtue of education, profession, or experience, is believed to have special knowledge of his/her subject beyond that of the average person, sufficient that others legally depend upon his/her opinion.A . TrueB . FalseView AnswerAnswer: A

March 14, 2018 No Comments READ MORE +

Which of the following registry key Smith will check to find the above information?

Smith, an employee of a reputed forensic Investigation firm, has been hired by a private organization to investigate a laptop that is suspected to be involved in hacking of organization DC server. Smith wants to find all the values typed into the Run box in the Start menu. Which of...

March 5, 2018 No Comments READ MORE +

What Jason can do in this scenario to reset the PIN and access SIM data?

Smith, as a part his forensic investigation assignment, has seized a mobile device. He was asked to recover the Subscriber Identity Module (SIM card) data the mobile device. Smith found that the SIM was protected by a Personal identification Number (PIN) code but he was also aware that people generally...

March 4, 2018 No Comments READ MORE +

Steganography is a technique of hiding a secret message within an ordinary message and extracting it at the destination to maintain the confidentiality of data.

Steganography is a technique of hiding a secret message within an ordinary message and extracting it at the destination to maintain the confidentiality of data.A . TrueB . FalseView AnswerAnswer: A

March 1, 2018 No Comments READ MORE +

Which device in a wireless local area network (WLAN) determines the next network point to which a packet should be forwarded toward its destination?

Which device in a wireless local area network (WLAN) determines the next network point to which a packet should be forwarded toward its destination?A . Wireless routerB . Wireless modemC . AntennaD . Mobile stationView AnswerAnswer: A

February 25, 2018 No Comments READ MORE +

In which step of the computer forensics investigation methodology would you run MD5 checksum on the evidence?

In which step of the computer forensics investigation methodology would you run MD5 checksum on the evidence?A . Obtain search warrantB . Evaluate and secure the sceneC . Collect the evidenceD . Acquire the dataView AnswerAnswer: D

February 25, 2018 No Comments READ MORE +