Which of the following is not an example of a cyber-crime?

Which of the following is not an example of a cyber-crime?A . Fraud achieved by the manipulation of the computer recordsB . Firing an employee for misconductC . Deliberate circumvention of the computer security systemsD . Intellectual property theft, including software piracyView AnswerAnswer: B

February 24, 2018 No Comments READ MORE +

Which of the following reports are delivered under oath to a board of directors/managers/panel of jury?

Which of the following reports are delivered under oath to a board of directors/managers/panel of jury?A . Written informal ReportB . Verbal Formal ReportC . Written Formal ReportD . Verbal Informal ReportView AnswerAnswer: B

February 23, 2018 No Comments READ MORE +

What is a chain of custody?

What is a chain of custody?A . A legal document that demonstrates the progression of evidence as it travels from the original evidence location to the forensic laboratoryB . It is a search warrant that is required for seizing evidence at a crime sceneC . It Is a document that...

February 21, 2018 No Comments READ MORE +

In the logon event ID table, which event ID entry (number) represents a successful logging on to a computer?

All the Information about the user activity on the network, like details about login and logoff attempts, is collected in the security log of the computer. When a user's login is successful, successful audits generate an entry whereas unsuccessful audits generate an entry for failed login attempts in the logon...

February 17, 2018 No Comments READ MORE +

Which of the following files contains records that correspond to each deleted file in the Recycle Bin?

The Recycle Bin exists as a metaphor for throwing files away, but it also allows user to retrieve and restore files. Once the file is moved to the recycle bin, a record is added to the log file that exists in the Recycle Bin. Which of the following files contains...

February 17, 2018 No Comments READ MORE +

When collecting electronic evidence at the crime scene, the collection should proceed from the most volatile to the least volatile

When collecting electronic evidence at the crime scene, the collection should proceed from the most volatile to the least volatileA . TrueB . FalseView AnswerAnswer: A

February 16, 2018 No Comments READ MORE +

In an echo data hiding technique, the secret message is embedded into a __________as an echo.

In an echo data hiding technique, the secret message is embedded into a __________as an echo.A . Cover audio signalB . Phase spectrum of a digital signalC . Pseudo-random signalD . Pseudo- spectrum signalView AnswerAnswer: A

February 15, 2018 No Comments READ MORE +

What is the "Best Evidence Rule"?

What is the "Best Evidence Rule"?A . It states that the court only allows the original evidence of a document, photograph, or recording at the trial rather than a copyB . It contains system time, logged-on user(s), open files, network information, process information, process-to-port mapping, process memory, clipboard contents, service/driver...

February 7, 2018 No Comments READ MORE +

Which of the following password cracking techniques works like a dictionary attack, but adds some numbers and symbols to the words from the dictionary and tries to crack the password?

Which of the following password cracking techniques works like a dictionary attack, but adds some numbers and symbols to the words from the dictionary and tries to crack the password?A . Brute forcing attackB . Hybrid attackC . Syllable attackD . Rule-based attackView AnswerAnswer: B

February 6, 2018 No Comments READ MORE +

If the partition size Is 4 GB, each cluster will be 32 K. Even If a file needs only 10 K, the entire 32 K will be allocated, resulting In 22 K of___________.

If the partition size Is 4 GB, each cluster will be 32 K. Even If a file needs only 10 K, the entire 32 K will be allocated, resulting In 22 K of___________.A . Slack spaceB . Deleted spaceC . Cluster spaceD . Sector spaceView AnswerAnswer: A

February 5, 2018 No Comments READ MORE +