What type of equipment would a forensics investigator store in a StrongHold bag?
What type of equipment would a forensics investigator store in a StrongHold bag?
which system (MAC address) had a specific IP address at a specific time?
When investigating a network that uses DHCP to assign IP addresses, where would you look to determine which system (MAC address) had a specific IP address at a specific time?
how many investigators are you recommended having?
When making the preliminary investigations in a sexual harassment case, how many investigators are you recommended having?
What layer of the OSI model do TCP and UDP utilize?
What layer of the OSI model do TCP and UDP utilize?
With regard to using an antivirus scanner during a computer forensics investigation, you should:
With regard to using an antivirus scanner during a computer forensics investigation, you should:
What should you examine next in this case?
You have been asked to investigate the possibility of computer fraud in the finance department of a company. It is suspected that a staff member has been committing finance fraud by printing cheques that have not been authorized. You have exhaustively searched all data files on a bitmap image of the target computer, but have found no evidence. You suspect the files may not have been saved.
What should you examine next in this case?
What hashing method is used to password protect Blackberry devices?
What hashing method is used to password protect Blackberry devices?
what would be the proper procedure?
If a PDA is seized in an investigation while the device is turned on, what would be the proper procedure?