Jason is the security administrator of ACMA metal Corporation.
Jason is the security administrator of ACMA metal Corporation. One day he notices the company’s Oracle database server has been compromised and the customer information along with financial data has been stolen. The financial loss will be in millions of dollars if the database gets into the hands of the competitors. Jason wants to report […]
Which of the following should a computer forensics lab used for investigations have?
Which of the following should a computer forensics lab used for investigations have? A. isolation B. restricted access C. open access D. an entry log
Corporate investigations are typically easier than public investigations because:
Corporate investigations are typically easier than public investigations because: A. the users have standard corporate equipment and software B. the investigator does not have to get a warrant C. the investigator has to get a warrant D. the users can load whatever they want on their machines
Area density refers to:
Area density refers to: A. the amount of data per disk B. the amount of data per partition C. the amount of data per square inch D. the amount of data per platter
Sectors in hard disks typically contain how many bytes?
Sectors in hard disks typically contain how many bytes? A. 256 B. 512 C. 1024 D. 2048
Diskcopy is:
Diskcopy is: A. a utility by AccessData B. a standard MS-DOS command C. Digital Intelligence utility D. dd copying tool Explanation: diskcopy is a STANDARD DOS utility. C:\WINDOWS>diskcopy /? Copies the contents of one floppy disk to another.
What does the superblock in Linux define?
What does the superblock in Linux define? A. filesynames B. diskgeometr C. location of the firstinode D. available space
When obtaining a warrant, it is important to:
When obtaining a warrant, it is important to: A. particularlydescribe the place to be searched and particularly describe the items to be seized B. generallydescribe the place to be searched and particularly describe the items to be seized C. generallydescribe the place to be searched and generally describe the items to be seized D. particularlydescribe […]
You are working for a local police department that services a population of 1,000,000 people and you have been
You are working for a local police department that services a population of 1,000,000 people and you have been given the task of building a computer forensics lab. How many law-enforcement computer investigators should you request to staff the lab? A. 8 B. 1 C. 4 D. 2
If you see the files Zer0.tar.gz and copy.tar.gz on a Linux system while doing an investigation, what can you
If you see the files Zer0.tar.gz and copy.tar.gz on a Linux system while doing an investigation, what can you conclude? A. The system files have been copied by a remote attacker B. The system administrator has created an incremental backup C. The system has been compromised using a t0rnrootkit D. Nothing in particular as these […]