What is one method of bypassing a system BIOS password?
What is one method of bypassing a system BIOS password?
what file system will be used?
When using an iPod and the host computer is running Windows, what file system will be used?
When carrying out a forensics investigation, why should you never delete a partition on a dynamic disk?
When carrying out a forensics investigation, why should you never delete a partition on a dynamic disk?
What type of file is represented by a colon (:) with a name following it in the Master File Table (MFT) of an
What type of file is represented by a colon (:) with a name following it in the Master File Table (MFT) of an NTFS disk?
What type of activity is the investigator seeing?
An investigator is searching through the firewall logs of a company and notices ICMP packets that are larger than 65,536 bytes.
What type of activity is the investigator seeing?
what legal term?
The efforts to obtain information before a trial by demanding documents, depositions, questions and answers written under oath, written requests for admissions of fact, and examination of the scene is a description of what legal term?
What port do you send the email to on the company SMTP server?
You are working in the Security Department of a law firm. One of the attorneys asks you about the topic of sending fake email because he has a client who has been charged with doing just that. His client alleges that he is innocent and that there is no way for a fake email to actually be sent. You inform the attorney that his client is mistaken and that fake email is a possibility and that you can prove it. You return to your desk and craft a fake email to the attorney that appears to come from his boss.
What port do you send the email to on the company SMTP server?
what does the nnn denote?
When marking evidence that has been collected with the aa/ddmmyy/nnnn/zz format, what does the nnn denote?
what type of compression would you use?
If you are concerned about a high level of compression but not concerned about any possible data loss, what type of compression would you use?
what device is used to prevent the system from recording data on an evidence disk?
When performing a forensics analysis, what device is used to prevent the system from recording data on an evidence disk?