What is one method of bypassing a system BIOS password?
What is one method of bypassing a system BIOS password?
what file system will be used?
When using an iPod and the host computer is running Windows, what file system will be used?
why should you never delete a partition on a dynamic disk?
When carrying out a forensics investigation, why should you never delete a partition on a dynamic disk?
What type of activity is the investigator seeing?
An investigator is searching through the firewall logs of a company and notices ICMP packets that are larger
than 65,536 bytes. What type of activity is the investigator seeing?
what does the nnn denote?
When marking evidence that has been collected with the aa/ddmmyy/nnnn/zz format, what does the nnn
denote?
what type of compression would you use?
If you are concerned about a high level of compression but not concerned about any possible data loss, what
type of compression would you use?
What type of equipment would a forensics investigator s…
What type of equipment would a forensics investigator store in a StrongHold bag?
how many investigators are you recommended having?
When making the preliminary investigations in a sexual harassment case, how many investigators are you
recommended having?
What layer of the OSI model do TCP and UDP utilize?
What layer of the OSI model do TCP and UDP utilize?
What hashing method is used to password protect Blackbe…
What hashing method is used to password protect Blackberry devices?