Which of the following file system uses Master File Table (MFT) database to store information about every file and directory on a volume?
Which of the following processes is part of the dynamic malware analysis?
Robert is a regional manager working in a reputed organization. One day, he suspected malware attack after unwanted programs started to popup after logging into his computer. The network administrator was called upon to trace out any intrusion on the computer and he/she finds that suspicious activity has taken place within Autostart locations. In this situation, which of the following tools is used by the network administrator to detect any intrusion on a system?
An investigator has acquired packed software and needed to analyze it for the presence of malice. Which of the following tools can help in finding the packaging software used?
What does the Rule 101 of Federal Rules of Evidence states?
Which of the following setups should a tester choose to analyze malware behavior?
Which among the following web application threats is resulted when developers expose various internal implementation objects, such as files, directories, database records, or key-through references?
In both pharming and phishing attacks an attacker can create websites that look similar to legitimate sites with the intent of collecting personal identifiable information from its victims. What is the difference between pharming and phishing attacks?
What do you call the process in which an attacker uses magnetic field over the digital media device to delete any previously stored data?
Which of the following tool can reverse machine code to assembly language?
What do you call the process of studying the changes that have taken place across a system or a machine after a series of actions or incidents?
An attacker has compromised a cloud environment of a company and used the employee information to perform an identity theft attack. Which type of attack is this?
NTFS sets a flag for the file once you encrypt it and creates an EFS attribute where it stores Data Decryption Field (DDF) and Data Recovery Field (DDR). Which of the following is not a part of DDF?
Which of the following tool is used to locate IP addresses?
Which of the following network attacks refers to sending huge volumes of email to an address in an attempt to overflow the mailbox or overwhelm the server where the email address is hosted so as to cause a denial-of-service attack?