what will he/she inject into the log file?
A system with a simple logging mechanism has not been given much attention during development, this
system is now being targeted by attackers, if the attacker wants to perform a new line injection attack,
what will he/she inject into the log file?
During the seizure of digital evidence, the suspect can be allowed touch the computer system.
During the seizure of digital evidence, the suspect can be allowed touch the computer system.
Consistency in the investigative report is more important than the exact format in the report to eliminate unc
Consistency in the investigative report is more important than the exact format in the report to eliminate
uncertainty and confusion.
Which of the following password cracking techniques works like a dictionary attack…?
Which of the following password cracking techniques works like a dictionary attack, but adds some
numbers and symbols to the words from the dictionary and tries to crack the password?
When dealing with the powered-off computers at the crime scene, if the computer is switched off, turn it on
When dealing with the powered-off computers at the crime scene, if the computer is switched off, turn it
on
MAC filtering is a security access control methodology, where a ___________ is assigned to each network card t
MAC filtering is a security access control methodology, where a ___________ is assigned to each
network card to determine access to the network
The ARP table can be accessed using the __________command in Windows 7.
The ARP table of a router comes in handy for Investigating network attacks, as the table contains IP
addresses associated with the respective MAC addresses. The ARP table can be accessed using the
__________command in Windows 7.
Which of the following is a root folder of the registry editor?
You can interact with the Registry through intermediate programs. Graphical user interface (GUI)
Registry editors such as Regedit.exe or Regedt32 exe are commonly used as intermediate programs in
Windows 7. Which of the following is a root folder of the registry editor?
which sessions the machine has opened with other systems?
You have been given the task to investigate web attacks on a Windows-based server. Which of the
following commands will you use to look at which sessions the machine has opened with other
systems?
What is a SCSI (Small Computer System Interface)?
What is a SCSI (Small Computer System Interface)?