You work as a professional Computer Hacking Forensic Investigator. A project has been assigned to you to investigate Plagiarism occurred in the source code files of C#. Which of the following tools will you use to detect the software plagiarism?
Which of the following registry hives stores information about the file extensions that are mapped to their corresponding applications?
You work as a Forensic Investigator. Which of the following rules will you follow while working on a case?
Each correct answer represents a part of the solution. Choose all that apply.
Which of the following cryptographic methods are used in EnCase to ensure the integrity of the data, which is acquired for the investigation?
Each correct answer represents a complete solution. Choose two.
Which of the following methods can be used to start the Disk Defragmenter utility in Windows 9x?
Each correct answer represents a complete solution. Choose two.
Which of the following tools works by using standard set of MS-DOS commands and can create an MD5 hash of an entire drive, partition, or selected files?
Which of the following types of attack can guess a hashed password?
Which of the following types of cyber stalking damage the reputation of their victim and turn other people against them by setting up their own Websites, blogs or user pages for this purpose?
Which of the following is used to back up forensic evidences or data folders from the network or locally attached hard disk drives?
Which of the following switches of the XCOPY command copies file ownerships and NTFS permissions on files while copying the files?