What type of attack sends SYN requests to a target system with spoofed IP addresses?
With regard to using an antivirus scanner during a computer forensics investigation, you should:
To preserve digital evidence, an investigator should ____________
How often must a company keep log files for them to be admissible in a court of law?
Paul is a computer forensics investigator working for Tyler & Company Consultants. Paul has been called upon to help investigate a computer hacking ring broken up by the local police. Paul begins to inventory the PCs found in the hackers?hideout. Paul then comes across a PDA left by them that is attached to a number of different peripheral devices. What is the first step that Paul must take with the PDA to ensure the integrity of the investigation?
What method of copying should always be performed first before carrying out an investigation?
What is the slave device connected to the secondary IDE controller on a Linux OS referred to?
Davidson Trucking is a small transportation company that has three local offices in Detroit Michigan. Ten female employees that work for the company have gone to an attorney reporting that male employees repeatedly harassed them and that management did nothing to stop the problem. Davidson has employee policies that outline all company guidelines, including awareness on harassment and how it will not be tolerated. When the case is brought to court, whom should the prosecuting attorney call upon for not upholding company policy?
What will the following command accomplish? dd if=/dev/xxx of=mbr.backup bs=512 count=1
What technique is used by JPEGs for compression?