Which of the following passwords are sent over the wire (and wireless) network, or stored on some media as it
Which of the following passwords are sent over the wire (and wireless) network, or stored on some
media as it is typed without any alteration?
Hal.dll, and boot-start device drivers?
In Windows 7 system files, which file reads the Boot.ini file and loads Ntoskrnl.exe. Bootvid.dll. Hal.dll,
and boot-start device drivers?
which an attacker changes his or her IP address so that he or she appears to be someone else?
Networks are vulnerable to an attack which occurs due to overextension of bandwidth, bottlenecks,
network data interception, etc. Which of the following network attacks refers to a process in which an
attacker changes his or her IP address so that he or she appears to be someone else?
In an echo data hiding technique, the secret message is embedded into a __________as an echo.
In an echo data hiding technique, the secret message is embedded into a __________as an echo.
Which of the following vulnerability/exploitation is referred above?
Attacker uses vulnerabilities in the authentication or session management functions such as exposed
accounts, session IDs, logout, password management, timeouts, remember me. secret question,
account update etc. to impersonate users, if a user simply closes the browser without logging out from
sites accessed through a public computer, attacker can use the same browser later and exploit the
user’s privileges. Which of the following vulnerability/exploitation is referred above?
Which of the following statement is true for NTP Stratum Levels?
An Internet standard protocol (built on top of TCP/IP) that assures accurate synchronization to the
millisecond of computer clock times in a network of computers. Which of the following statement is true
for NTP Stratum Levels?
Which is not a part of environmental conditions of a forensics lab?
Which is not a part of environmental conditions of a forensics lab?
Graphics Interchange Format (GIF) is a ___________RGB bitmap Image format for Images with up to 256 distinct c
Graphics Interchange Format (GIF) is a ___________RGB bitmap Image format for Images with up to
256 distinct colors per frame.
Cyber-crime is defined as any Illegal act involving a gun, ammunition, or its applications.
Cyber-crime is defined as any Illegal act involving a gun, ammunition, or its applications.
what circumstances would you conduct searches without a warrant?
In what circumstances would you conduct searches without a warrant?