Who is responsible for the following tasks?
Who is responsible for the following tasks?
Secure the scene and ensure that it is maintained In a secure state until the Forensic Team
advises
Make notes about the scene that will eventually be handed over to the Forensic Team
what will he/she inject into the log file?
A system with a simple logging mechanism has not been given much attention during
development, this system is now being targeted by attackers, if the attacker wants to perform a
new line injection attack, what will he/she inject into the log file?
During the seizure of digital evidence, the suspect can be allowed touch the computer system.
During the seizure of digital evidence, the suspect can be allowed touch the computer system.
Consistency in the investigative report is more important than the exact format in the report to eliminate unc
Consistency in the investigative report is more important than the exact format in the report to
eliminate uncertainty and confusion.
Which of the following password cracking techniques works like a dictionary attack…?
Which of the following password cracking techniques works like a dictionary attack, but adds some
numbers and symbols to the words from the dictionary and tries to crack the password?
When dealing with the powered-off computers at the crime scene, if the computer is switched off, turn it on
When dealing with the powered-off computers at the crime scene, if the computer is switched off,
turn it on
MAC filtering is a security access control methodology, where a ___________ is assigned to each network card t
MAC filtering is a security access control methodology, where a ___________ is assigned to each
network card to determine access to the network
Which of the following is a root folder of the registry editor?
You can interact with the Registry through intermediate programs. Graphical user interface (GUI)
Registry editors such as Regedit.exe or Regedt32 exe are commonly used as intermediate
programs in Windows 7. Which of the following is a root folder of the registry editor?
Which command the ARP table can be accessed using in Windows 7?
which sessions the machine has opened with other systems?
You have been given the task to investigate web attacks on a Windows-based server.
Which of the following commands will you use to look at which sessions the machine has opened
with other systems?