Exam 14: Introduction to Forensics
Exam 1: Introduction to Computer Security24 Questions
Exam 2: Networks and the Internet25 Questions
Exam 3: Cyber Stalking, Fraud, and Abuse25 Questions
Exam 4: Denial of Service Attacks25 Questions
Exam 5: Malware25 Questions
Exam 6: Techniques Used by Hackers25 Questions
Exam 7: Industrial Espionage in Cyberspace25 Questions
Exam 8: Encryption25 Questions
Exam 9: Computer Security Software23 Questions
Exam 10: Security Policies25 Questions
Exam 11: Network Scanning and Vulnerability Scanning21 Questions
Exam 12: Cyber Terrorism and Information Warfare23 Questions
Exam 13: Cyber Detective24 Questions
Exam 14: Introduction to Forensics25 Questions
Select questions type
Using Linux to wipe the target drive,the command-line command would be ___ .
Free
(Multiple Choice)
4.9/5
(37)
Correct Answer:
B
The chain of custody accounts for the handling of evidence and documents that handling.
Free
(True/False)
4.8/5
(37)
Correct Answer:
True
The Windows Registry contains a list of USB devices that have been connected to the machine.
Free
(True/False)
4.8/5
(36)
Correct Answer:
True
The Linux log file that can reveal attempts to compromise the system or the presence of a virus or spyware is ______________.
(Multiple Choice)
4.9/5
(37)
_______ is a free tool that can be used to recover Windows files.
(Multiple Choice)
4.8/5
(35)
netstat is a command you can use with a forensic copy of a machine to compare two files.
(True/False)
4.8/5
(39)
The Linux log file that contains activity related to the web server is ______.
(Multiple Choice)
4.8/5
(36)
The Windows command to list any shared files that are currently open is ___________.
(Multiple Choice)
4.8/5
(39)
Documentation of every person who had access to evidence,how they interacted with it,and where it was stored is called the ________________.
(Multiple Choice)
4.7/5
(28)
Frequently the first responder to a computer crime is the network administrator.
(True/False)
4.8/5
(34)
Using Linux to backup your hard drive,if you want to create a hash,you would use the command-line command ___________.
(Multiple Choice)
4.9/5
(37)
_________ can include logs,portable storage,emails,tablets,and cell phones.
(Multiple Choice)
4.9/5
(35)
In Linux the command to set up a target forensics server to receive a copy of a drive is dd.
(True/False)
4.8/5
(39)
You may use Linux to make a ______________ of the hard drive.
(Multiple Choice)
4.8/5
(39)
The Windows Registry lists USB devices that have been connected to the machine.
(True/False)
4.8/5
(32)
The Windows command fc lists all active sessions to the computer.
(True/False)
4.8/5
(28)
Windows logging can be turned on and off with a tool called auditpol.exe.
(True/False)
4.9/5
(38)
In Windows the log that contains events collected from remote computers is the ____________ log.
(Multiple Choice)
4.8/5
(30)
Showing 1 - 20 of 25
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)