Why would you need to find out the gateway of a device when investigating a wireless attack?
Given the drive dimensions as follows and assuming a sector has 512 bytes, what is the capacity of the described hard drive?
22,164 cylinders/disk
80 heads/cylinder
63 sectors/track
When carrying out a forensics investigation, why should you never delete a partition on a dynamic disk?
Stephen is checking an image using Compare Files by The Wizard, and he sees the file signature is shown as FF D8 FF E1. What is the file type of the image?
What will the following command accomplish?
dd if=/dev/xxx of=mbr.backup bs=512 count=1
Which password cracking technique uses every possible combination of character sets?
An expert witness is a __________________ who is normally appointed by a party to assist the formulation and preparation of a party’s claim or defense.
Which of the following stages in a Linux boot process involve initialization of the system’s hardware?
What must an investigator do before disconnecting an iPod from any type of computer?
What is the default IIS log location?
To which phase of the Computer Forensics Investigation Process does the Planning and Budgeting of a Forensics Lab belong?
Depending upon the jurisdictional areas, different laws apply to different incidents. Which of the following law is related to fraud and related activity in connection with computers?
All Blackberry email is eventually sent and received through what proprietary RIM-operated mechanism?
Richard is extracting volatile data from a system and uses the command doskey/history. What is he trying to extract?
What is considered a grant of a property right given to an individual who discovers or invents a new machine, process, useful composition of matter or manufacture?