You want to retrieve information whether your system is in promiscuous mode or not. Which of the following commands will you use?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following is a documentation of guidelines that computer forensics experts use to handle evidences?
Which of the following statements about the HKEY_LOCAL_MACHINE registry hive is true?
Which of the following wireless network standards operates on the 5 GHz band and transfers data at a rate of 54 Mbps?
Adam works as a professional Computer Hacking Forensic Investigator. A project has been assigned to him to investigate the BlackBerry, which is suspected to be used to hide some important information. Which of the following is the first step taken to preserve the information in forensic investigation of the BlackBerry?
The incident response team has turned the evidence over to the forensic team. Now, it is the time to begin looking for the ways to improve the incident response process for next time. What are the typical areas for improvement?
Each correct answer represents a complete solution. Choose all that apply.
Normally, RAM is used for temporary storage of data. But sometimes RAM data is stored in the hard disk, what is this method called?
You work as a Web developer for ABC Inc. You want to investigate the Cross-Site Scripting attack on your company's Web site. Which of the following methods of investigation can you use to accomplish the task?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following Acts enacted in United States allows the FBI to issue National Security Letters (NSLs) to Internet service providers (ISPs) ordering them to disclose records about their customers?
Which of the following standard file formats is used by Apple's iPod to store contact information?