Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

This attack collects common phrases found on a system and checks them against passwords ( CLO 7 , MLO 6 B ) Question 1 9

This attack collects common phrases found on a system and checks them against passwords
(CLO7, MLO6B)
Question 19 options:
a)
Social Engineering
b)
Brute Force Attack
c)
Password Reset
d)
Dictionary attack
Question 20(Mandatory)(1 point)
Saved
Listen
Digital forensics investigations related to administrative matters typically occur due to
(CLO 1, MLO 1C)
Question 20 options:
a)
Possession of digital contraband
b)
Digital theft of trade secrets
c)
An indication that the result of a forensic process is accurate is
d)
Violations of policies or procedures
Question 21(Mandatory)(1 point)
Saved
Listen
_______ is NOT one of the 8 digital forensics processes.
Question 21 options:
a)
Search Authority
b)
Encryption
c)
Reporting
d)
Chain of Custody
Question 22(Mandatory)(1 point)
Saved
Listen
________ is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction.
Question 22 options:
a)
Network Computing
b)
Cloud computing
c)
Mainframe computing
d)
Forensics computing
Question 23(Mandatory)(1 point)
Saved
Listen
In a blind test for QA:
Question 23 options:
a)
The test is aimed at blind spots of an organization
b)
The test is done with enough notice in advance.
c)
The test is always done by an independent agency.
d)
The analyst is not aware of the test.
Question 24(Mandatory)(1 point)
Saved
Listen
Which one of the following statements about deleting files in Windows system is true?
Question 24 options:
a)
A deleted file remains on the drive until its space is overwritten.
b)
All of the above
c)
The space is not overwritten immediately and might take a long time.
d)
Deleting the file means now that the file is deleted if the computer needs its space it can uses that space.
Question 25(Mandatory)(1 point)
Saved
Listen
In hiding data, which one of the following is the most difficult for the examiner to detect?
Question 25 options:
a)
Changing file extentions
b)
Burying files deep within seemingly unrelated directories
c)
Hiding files within files
d)
Changing file names
Question 26(1 point)
Saved
Listen
Which statement is NOT true?
Question 26 options:
Hashing is fixed length output
Slack is a clean media
Hash is a one way function
Encryption is more expensive than hashing
Question 27(1 point)
Saved
Listen
Order of volatility is ............
Question 27 options:
the process of eliminating evidences
a document that keep the daily log
a tool for capturing live data
priority in evidence collection

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Students also viewed these Databases questions

Question

Mechanism please LDA,thenC10H15NO4pH8.5

Answered: 1 week ago

Question

Find y'. y= |x + X (x) (x) X 1 02x+ 2x 1 O 2x + 1/3 Ex 2x +

Answered: 1 week ago