Which of the following passwords are sent over the wire (and wireless) network, or stored on some media as it
Which of the following passwords are sent over the wire (and wireless) network, or stored on
some media as it is typed without any alteration?
Hal.dll, and boot-start device drivers?
In Windows 7 system files, which file reads the Boot.ini file and loads Ntoskrnl.exe. Bootvid.dll.
Hal.dll, and boot-start device drivers?
which an attacker changes his or her IP address so that he or she appears to be someone else?
Networks are vulnerable to an attack which occurs due to overextension of bandwidth,
bottlenecks, network data interception, etc. Which of the following network attacks refers to a
process in which an attacker changes his or her IP address so that he or she appears to be
someone else?
In an echo data hiding technique, the secret message is embedded into a __________as an echo.
In an echo data hiding technique, the secret message is embedded into a __________as an echo.
Which of the following vulnerability/exploitation is referred above?
Attacker uses vulnerabilities in the authentication or session management functions such as
exposed accounts, session IDs, logout, password management, timeouts, remember me. secret
question, account update etc. to impersonate users, if a user simply closes the browser without
logging out from sites accessed through a public computer, attacker can use the same browser
later and exploit the user’s privileges. Which of the following vulnerability/exploitation is referred
above?
Which of the following statement is true for NTP Stratum Levels?
An Internet standard protocol (built on top of TCP/IP) that assures accurate synchronization to the
millisecond of computer clock times in a network of computers. Which of the following statement is
true for NTP Stratum Levels?
Which is not a part of environmental conditions of a forensics lab?
Which is not a part of environmental conditions of a forensics lab?
Graphics Interchange Format (GIF) is a ___________RGB bitmap Image format for Images with up to 256 distinct c
Graphics Interchange Format (GIF) is a ___________RGB bitmap Image format for Images with
up to 256 distinct colors per frame.
Cyber-crime is defined as any Illegal act involving a gun, ammunition, or its applications.
Cyber-crime is defined as any Illegal act involving a gun, ammunition, or its applications.
what circumstances would you conduct searches without a warrant?
In what circumstances would you conduct searches without a warrant?