Which of the following commands shows you the names of all open shared files on a server and the number of file locks on each file?
On Linux/Unix based Web servers, what privilege should the daemon service be run under?
Which of the following attack uses HTML tags like <script></script>?
Which of the following is an iOS Jailbreaking tool?
You are working for a large clothing manufacturer as a computer forensics investigator and are called in to investigate an unusual case of an employee possibly stealing clothing designs from the company and selling them under a different brand name for a different company. What you discover during the course of the investigation is that the clothing designs are actually original products of the employee and the company has no policy against an employee selling his own designs on his own time. The only thing that you can find that the employee is doing wrong is that his clothing design incorporates the same graphic symbol as that of the company with only the wording in the graphic being different. What area of the law is the employee violating?
What advantage does the tool Evidor have over the built-in Windows search?
To preserve digital evidence, an investigator should ____________________.
To which phase of the Computer Forensics Investigation Process does the Planning and Budgeting of a Forensics Lab belong?
In Steganalysis, which of the following describes a Known-stego attack?
Which of the following processes is part of the dynamic malware analysis?
Under which Federal Statutes does FBI investigate for computer crimes involving e-mail scams and mail fraud?
To check for POP3 traffic using Ethereal, what port should an investigator search by?
Files stored in the Recycle Bin in its physical location are renamed as Dxy.ext, where “x” represents the ___________________.
You are employed directly by an attorney to help investigate an alleged sexual harassment case at a large pharmaceutical manufacture. While at the corporate office of the company, the CEO demands to know the status of the investigation. What prevents you from discussing the case with the CEO?
When obtaining a warrant, it is important to: