Which of the following techniques delete the files perm…
Which of the following techniques delete the files permanently?
Which of the following tasks DOES NOT come under the in…
Which of the following tasks DOES NOT come under the investigation phase of a cybercrime forensics
investigation case?
Which of the following is a list of recently used progr…
Which of the following is a list of recently used programs or opened files?
What type of attack sends spoofed UDP packets (instead …
What type of attack sends spoofed UDP packets (instead of ping packets) with a fake source address to the IP
broadcast address of a large network?
where would investigator need to search to find email s…
When investigating a computer forensics case where Microsoft Exchange and Blackberry Enterprise server are
used, where would investigator need to search to find email sent from a Blackberry device?
What stage of the incident handling process involves re…
What stage of the incident handling process involves reporting events?
What is the actual error code that you would see in the…
When reviewing web logs, you see an entry for resource not found in the HTTP status code field.
What is the actual error code that you would see in the log for resource not found?
what field would she be considered an expert in?
While presenting his case to the court, Simon calls many witnesses to the stand to testify. Simon decides to
call Hillary Taft, a lay witness, to the stand. Since Hillary is a lay witness, what field would she be considered an
expert in?
What does this indicate on the computer?
While searching through a computer under investigation, you discover numerous files that appear to have had
the first letter of the file name replaced by the hex code byte 5h. What does this indicate on the computer?
Where is the startup configuration located on a router?
Where is the startup configuration located on a router?