During first responder procedure you should follow all laws while collecting the evidence, and contact a computer forensic examiner as soon as possible

During first responder procedure you should follow all laws while collecting the evidence, and contact a computer forensic examiner as soon as possibleA . TrueB . FalseView AnswerAnswer: A

February 5, 2018 No Comments READ MORE +

Which of the following commands shows you all of the network services running on Windows-based servers?

Which of the following commands shows you all of the network services running on Windows-based servers?A . Net startB . Net useC . Net SessionD . Net shareView AnswerAnswer: A

February 4, 2018 No Comments READ MORE +

Is digital photography accepted as evidence in the court of law?

Digital photography helps in correcting the perspective of the Image which Is used In taking the measurements of the evidence. Snapshots of the evidence and incident-prone areas need to be taken to help in the forensic process. Is digital photography accepted as evidence in the court of law?A . YesB...

February 2, 2018 No Comments READ MORE +

What is cold boot (hard boot)?

What is cold boot (hard boot)?A . It is the process of starting a computer from a powered-down or off stateB . It is the process of restarting a computer that is already turned on through the operating systemC . It is the process of shutting down a computer from...

February 1, 2018 No Comments READ MORE +

Which of the following statements is incorrect when preserving digital evidence?

Which of the following statements is incorrect when preserving digital evidence?A . Document the actions and changes that you observe in the monitor, computer, printer, or in other peripheralsB . Verily if the monitor is in on, off, or in sleep modeC . Remove the power cable depending on the...

January 31, 2018 No Comments READ MORE +

Identify the attack from following sequence of actions?

Identify the attack from following sequence of actions? Step 1: A user logs in to a trusted site and creates a new session Step 2: The trusted site stores a session identifier for the session in a cookie in the web browser Step 3: The user is tricked to visit...

January 30, 2018 No Comments READ MORE +

The ARP table of a router comes in handy for Investigating network attacks, as the table contains IP addresses associated with the respective MAC addresses.

The ARP table of a router comes in handy for Investigating network attacks, as the table contains IP addresses associated with the respective MAC addresses. The ARP table can be accessed using the __________command in Windows 7.A . C:arp -aB . C:arp -dC . C:arp -sD . C:arp -bView AnswerAnswer:...

January 24, 2018 No Comments READ MORE +

SMTP (Simple Mail Transfer protocol) receives outgoing mail from clients and validates source and destination addresses, and also sends and receives emails to and from other SMTP servers.

SMTP (Simple Mail Transfer protocol) receives outgoing mail from clients and validates source and destination addresses, and also sends and receives emails to and from other SMTP servers.A . TrueB . FalseView AnswerAnswer: A

January 24, 2018 No Comments READ MORE +

Subscriber Identity Module (SIM) is a removable component that contains essential information about the subscriber. Its main function entails authenticating the user of the cell phone to the network to gain access to subscribed services. SIM contains a 20-digit long Integrated Circuit Card identification (ICCID) number, identify the issuer identifier Number from the ICCID below.

Subscriber Identity Module (SIM) is a removable component that contains essential information about the subscriber. Its main function entails authenticating the user of the cell phone to the network to gain access to subscribed services. SIM contains a 20-digit long Integrated Circuit Card identification (ICCID) number, identify the issuer identifier...

January 18, 2018 No Comments READ MORE +

The Apache server saves diagnostic information and error messages that it encounters while processing requests. The default path of this file is usr/local/apache/logs/error.log in Linux. Identify the Apache error log from the following logs.

The Apache server saves diagnostic information and error messages that it encounters while processing requests. The default path of this file is usr/local/apache/logs/error.log in Linux. Identify the Apache error log from the following logs.A . 127.0.0.1 - frank [10/Oct/2000:13:55:36-0700] "GET /apache_pb.grf HTTP/1.0" 200 2326B . [Wed Oct 11 14:32:52 2000]...

January 15, 2018 No Comments READ MORE +