MultipleChoice
Network forensics allows Investigators to inspect network traffic and logs to identify and locate the attack system
Network forensics can reveal: (Select three answers)
OptionsMultipleChoice
Determine the message length from following hex viewer record:
MultipleChoice
In which step of the computer forensics investigation methodology would you run MD5 checksum on the evidence?
OptionsMultipleChoice
Windows Security Accounts Manager (SAM) is a registry file which stores passwords in a hashed format.
SAM file in Windows is located at:
OptionsMultipleChoice
FAT32 is a 32-bit version of FAT file system using smaller clusters and results in efficient storage capacity. What is the maximum drive size supported?
OptionsMultipleChoice
Email archiving is a systematic approach to save and protect the data contained in emails so that it can tie easily accessed at a later date.
OptionsMultipleChoice
Which of the following commands shows you the NetBIOS name table each?
OptionsMultipleChoice
What is the First Step required in preparing a computer for forensics investigation?
OptionsMultipleChoice
Network forensics can be defined as the sniffing, recording, acquisition and analysis of the network traffic and event logs in order to investigate a network security incident.
OptionsMultipleChoice
Which of the following commands shows you the names of all open shared files on a server and number of file locks on each file?
Options