In Steganalysis, which of the following describes a Known-stego attack?
Ivanovich, a forensics investigator, is trying to extract complete information about running processes from a system. Where should he look apart from the RAM and virtual memory?
Which of the following attacks allows an attacker to access restricted directories, including application source code, configuration and critical system files, and to execute commands outside of the web server’s root directory?
While searching through a computer under investigation, you discover numerous files that appear to have had the first letter of the file name replaced by the hex code byte 5h. What does this indicate on the computer?
An executive has leaked the company trade secrets through an external drive. What process should the investigation team take if they could retrieve his system?
Which of the following techniques can be used to beat steganography?
Which of the following tool enables a user to reset his/her lost admin password in a Windows system?
Netstat is a tool for collecting information regarding network connections. It provides a simple view of TCP and UDP connections, and their state and network traffic statistics. Which of the following commands shows you the TCP and UDP network connections, listening ports, and the identifiers?
You have been given the task to investigate web attacks on a Windows-based server. Which of the following commands will you use to look at the sessions the machine has opened with other systems?
Julie is a college student majoring in Information Systems and Computer Science. She is currently writing an essay for her computer crimes class. Julie paper focuses on white-collar crimes in America and how forensics investigators investigate the cases. Julie would like to focus the subject. Julie would like to focus the subject of the essay on the most common type of crime found in corporate America. What crime should Julie focus on?
Which of the following technique creates a replica of an evidence media?
What type of attack sends SYN requests to a target system with spoofed IP addresses?
Which MySQL log file contains information on server start and stop?
What does the part of the log, “% SEC-6-IPACCESSLOGP”, extracted from a Cisco router represent?
Which of the following is an iOS Jailbreaking tool?