Answered step by step
Verified Expert Solution
Question
1 Approved Answer
This attack collects common phrases found on a system and checks them against passwords ( CLO 7 , MLO 6 B ) Question 1 9
This attack collects common phrases found on a system and checks them against passwords
CLO MLOB
Question options:
a
Social Engineering
b
Brute Force Attack
c
Password Reset
d
Dictionary attack
Question Mandatory point
Saved
Listen
Digital forensics investigations related to administrative matters typically occur due to
CLO MLO C
Question options:
a
Possession of digital contraband
b
Digital theft of trade secrets
c
An indication that the result of a forensic process is accurate is
d
Violations of policies or procedures
Question Mandatory point
Saved
Listen
is NOT one of the digital forensics processes.
Question options:
a
Search Authority
b
Encryption
c
Reporting
d
Chain of Custody
Question Mandatory point
Saved
Listen
is a model for enabling convenient, ondemand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction.
Question options:
a
Network Computing
b
Cloud computing
c
Mainframe computing
d
Forensics computing
Question Mandatory point
Saved
Listen
In a blind test for QA:
Question options:
a
The test is aimed at blind spots of an organization
b
The test is done with enough notice in advance.
c
The test is always done by an independent agency.
d
The analyst is not aware of the test.
Question Mandatory point
Saved
Listen
Which one of the following statements about deleting files in Windows system is true?
Question options:
a
A deleted file remains on the drive until its space is overwritten.
b
All of the above
c
The space is not overwritten immediately and might take a long time.
d
Deleting the file means now that the file is deleted if the computer needs its space it can uses that space.
Question Mandatory point
Saved
Listen
In hiding data, which one of the following is the most difficult for the examiner to detect?
Question options:
a
Changing file extentions
b
Burying files deep within seemingly unrelated directories
c
Hiding files within files
d
Changing file names
Question point
Saved
Listen
Which statement is NOT true?
Question options:
Hashing is fixed length output
Slack is a clean media
Hash is a one way function
Encryption is more expensive than hashing
Question point
Saved
Listen
Order of volatility is
Question options:
the process of eliminating evidences
a document that keep the daily log
a tool for capturing live data
priority in evidence collection
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started