How will these forms be stored to help preserve the chain of custody of the case?

You are working as an investigator for a corporation and you have just received instructions from your manager to assist in the collection of 15 hard drives that are part of an ongoing investigation. Your job is to complete the required evidence custody forms to properly document each piece of...

January 26, 2023 No Comments READ MORE +

A(n) _____________________ is one that's performed by a computer program rather than the attacker manually performing the steps in the attack sequence.

A(n) _____________________ is one that's performed by a computer program rather than the attacker manually performing the steps in the attack sequence.A . blackout attack B. automated attack C. distributed attack D. central processing attackView AnswerAnswer: B

January 26, 2023 No Comments READ MORE +

What is preventing the police from breaking down the suspects door and searching his home and seizing all of his computer equipment if they have not yet obtained a warrant?

The police believe that Melvin Matthew has been obtaining unauthorized access to computers belonging to numerous computer software and computer operating systems manufacturers, cellular telephone manufacturers, Internet Service Providers and Educational Institutions. They also suspect that he has been stealing, copying and misappropriating proprietary computer software belonging to the several...

January 26, 2023 No Comments READ MORE +

What information will you be able to gather?

As a security analyst, you setup a false survey website that will require users to create a username and a strong password. You send the link to all the employees of the company. What information will you be able to gather?A . The IP address of the employees’ computers B....

January 25, 2023 No Comments READ MORE +

What type of scan is Jessica going to perform?

Jessica works as systems administrator for a large electronics firm. She wants to scan her network quickly to detect live hosts by using ICMP ECHO Requests. What type of scan is Jessica going to perform?A . Tracert B. Smurf scan C. Ping trace D. ICMP ping sweepView AnswerAnswer: D

January 25, 2023 No Comments READ MORE +

What is a good security method to prevent unauthorized users from "tailgating"?

What is a good security method to prevent unauthorized users from "tailgating"?A . Man trap B. Electronic combination locks C. Pick-resistant locks D. Electronic key systemsView AnswerAnswer: A

January 25, 2023 No Comments READ MORE +

What can you infer from the exploit given?

The following excerpt is taken from a honeypot log that was hosted at lab.wiretrip.net. Short reported Unicode attacks from 213.116.251.162. The File Permission Canonicalization vulnerability (UNICODE attack) allows scripts to be run in arbitrary folders that do not normally have the right to run scripts. The attacker tries a Unicode...

January 24, 2023 No Comments READ MORE +

You are a computer forensics investigator working with local police department and you are called to assist in an investigation of threatening emails. The complainant has printer out 27 email messages from the suspect and gives the printouts to you. You inform her that you will need to examine her computer because you need access to the _________________________ in order to track the emails back to the suspect.

You are a computer forensics investigator working with local police department and you are called to assist in an investigation of threatening emails. The complainant has printer out 27 email messages from the suspect and gives the printouts to you. You inform her that you will need to examine her...

January 24, 2023 No Comments READ MORE +

What is Simon trying to accomplish here?

Simon is a former employee of Trinitron XML Inc. He feels he was wrongly terminated and wants to hack into his former company's network. Since Simon remembers some of the server names, he attempts to run the axfr and ixfr commands using DIG. What is Simon trying to accomplish here?A...

January 24, 2023 No Comments READ MORE +

Which of the following is NOT a graphics file?

Which of the following is NOT a graphics file?A . Picture1.tga B. Picture2.bmp C. Picture3.nfo D. Picture4.psdView AnswerAnswer: C

January 24, 2023 No Comments READ MORE +