Under which Federal Statutes does FBI investigate for computer crimes involving e-mail scams and mail fraud?
Under which Federal Statutes does FBI investigate for computer crimes involving e-mail scams and mail fraud? A. 18 U.S.C. 1029 Possession of Access Devices B. 18 U.S.C. 1030 Fraud and related activity in connection with computers C. 18 U.S.C. 1343 Fraud by wire, radio or television D. 18 U.S.C. 1361 Injury to Government Property E. […]
What TCP/UDP port does the toolkit program netstat use?
What TCP/UDP port does the toolkit program netstat use? A. Port 7 B. Port 15 C. Port 23 D. Port 69
Office documents (Word, Excel, PowerPoint) contain a code that allows tracking the MAC, or unique identifier,
Office documents (Word, Excel, PowerPoint) contain a code that allows tracking the MAC, or unique identifier, of the machine that created the document. What is that code called? A. the Microsoft Virtual Machine Identifier B. the Personal Application Protocol C. the Globally Unique ID D. the Individual ASCII String
Which federal computer crime law specifically refers to fraud and related activity in connection with access d
Which federal computer crime law specifically refers to fraud and related activity in connection with access devices like routers? A. 18 U.S.C. 1029 B. 18 U.S.C. 1362 C. 18 U.S.C. 2511 D. 18 U.S.C. 2703
Which response organization tracks hoaxes as well as viruses?
Which response organization tracks hoaxes as well as viruses? A. NIPC B. FEDCIRC C. CERT D. CIAC
What method of computer forensics will allow you to trace all ever-established user accounts on a Windows 2000
What method of computer forensics will allow you to trace all ever-established user accounts on a Windows 2000 sever the course of its lifetime? A. forensic duplication of hard drive B. analysis of volatile data C. comparison of MD5 checksums D. review of SIDs in the Registry
What header field in the TCP/IP protocol stack involves the hacker exploit known as the Ping of Death?
What header field in the TCP/IP protocol stack involves the hacker exploit known as the Ping of Death? A. ICMP header field B. TCP header field C. IP header field D. UDP header field
Why should you note all cable connections for a computer you want to seize as evidence?
Why should you note all cable connections for a computer you want to seize as evidence? A. to know what outside connections existed B. in case other devices were connected C. to know what peripheral devices exist D. to know what hardware existed
You should make at least how many bit-stream copies of a suspect drive?
You should make at least how many bit-stream copies of a suspect drive? A. 1 B. 2 C. 3 D. 4
Which Intrusion Detection System (IDS) usually produces the most false alarms due to the unpredictable behavio
Which Intrusion Detection System (IDS) usually produces the most false alarms due to the unpredictable behaviors of users and networks? A. network-based IDS systems (NIDS) B. host-based IDS systems (HIDS) C. anomaly detection D. signature recognition