Harold is a security analyst who has just run the rdisk /s command to grab the backup SAM files on a computer. Where should Harold navigate on the computer to find the file?

Harold is a security analyst who has just run the rdisk /s command to grab the backup SAM files on a computer. Where should Harold navigate on the computer to find the file?A . %systemroot%system32LSA B. %systemroot%system32driversetc C. %systemroot%repair D. %systemroot%LSAView AnswerAnswer: C

January 21, 2023 No Comments READ MORE +

What does the acronym POST mean as it relates to a PC?

What does the acronym POST mean as it relates to a PC?A . Primary Operations Short Test B. PowerOn Self Test C. Pre Operational Situation Test D. Primary Operating System TestView AnswerAnswer: B

January 21, 2023 No Comments READ MORE +

What networking protocol language should she learn that routers utilize?

Kimberly is studying to be an IT security analyst at a vocational school in her town. The school offers many different programming as well as networking languages. What networking protocol language should she learn that routers utilize?A . ATM B. UDP C. BPG D. OSPFView AnswerAnswer: D

January 21, 2023 No Comments READ MORE +

How many law-enforcement computer investigators should you request to staff the lab?

You are working for a local police department that services a population of 1,000,000 people and you have been given the task of building a computer forensics lab. How many law-enforcement computer investigators should you request to staff the lab?A . 8 B. 1 C. 4 D. 2View AnswerAnswer: C

January 21, 2023 No Comments READ MORE +

During the course of an investigation, you locate evidence that may prove the innocence of the suspect of the investigation. You must maintain an unbiased opinion and be objective in your entire fact finding process. Therefore, you report this evidence.

During the course of an investigation, you locate evidence that may prove the innocence of the suspect of the investigation. You must maintain an unbiased opinion and be objective in your entire fact finding process. Therefore, you report this evidence. This type of evidence is known as:A . Inculpatory evidence...

January 21, 2023 No Comments READ MORE +

What countermeasures could he take to prevent DDoS attacks?

After undergoing an external IT audit, George realizes his network is vulnerable to DDoS attacks. What countermeasures could he take to prevent DDoS attacks?A . Enable direct broadcasts B. Disable direct broadcasts C. Disable BGP D. Enable BGPView AnswerAnswer: B

January 20, 2023 No Comments READ MORE +

What does ICMP Type 3/Code 13 mean?

What does ICMP Type 3/Code 13 mean?A . Host Unreachable B. Administratively Blocked C. Port Unreachable D. Protocol UnreachableView AnswerAnswer: B

January 20, 2023 No Comments READ MORE +

What principal of social engineering did Julia use?

Julia is a senior security analyst for Berber Consulting group. She is currently working on a contract for a small accounting firm in Florid a. They have given her permission to perform social engineering attacks on the company to see if their in-house training did any good. Julia calls the...

January 20, 2023 No Comments READ MORE +

In what way do the procedures for dealing with evidence in a criminal case differ from the procedures for dealing with evidence in a civil case?

In what way do the procedures for dealing with evidence in a criminal case differ from the procedures for dealing with evidence in a civil case?A . evidence must be handled in the same way regardless of the type of case B. evidence procedures are not important unless you work...

January 20, 2023 No Comments READ MORE +