Which of the following is a federal law enacted in the US to control the ways that financial institutions deal with the private information of individuals?
One technique for hiding information is to change the file extension from the correct one to one that might not be noticed by an investigator. For example, changing a .jpg extension to a .doc extension so that a picture file appears to be a document. What can an investigator examine to verify that a file has the correct extension?
What is the name of the Standard Linux Command that is also available as windows application that can be used to create bit-stream images?
For what purpose do the investigators use tools like iPhoneBrowser, iFunBox, OpenSSHSSH, and iMazing?
Which of the following protocols allows non-ASCII files, such as video, graphics, and audio, to be sent through the email messages?
Which of the following data structures stores attributes of a process, as well as pointers to other attributes and data structures?
Which of the following commands shows you the username and IP address used to access the system via a remote login session and the type of client from which they are accessing the system?
You have been given the task to investigate web attacks on a Windows-based server. Which of the following commands will you use to look at the sessions the machine has opened with other systems?
In what way do the procedures for dealing with evidence in a criminal case differ from the procedures for dealing with evidence in a civil case?
Which of the following is NOT a physical evidence?
What is the default IIS log location?
When a file is deleted by Windows Explorer or through the MS-DOS delete command, the operating system inserts _______________ in the first letter position of the filename in the FAT database.
An investigator has acquired packed software and needed to analyze it for the presence of malice. Which of the following tools can help in finding the packaging software used?
What method of computer forensics will allow you to trace all ever-established user accounts on a Windows 2000 sever the course of its lifetime?
What type of analysis helps to identify the time and sequence of events in an investigation?