- (Topic 1)
In which step of the computer forensics investigation methodology would you run MD5 checksum on the evidence?
Correct Answer:D
- (Topic 3)
George is performing security analysis for Hammond and Sons LLC. He is testing security vulnerabilities of their wireless network. He plans on remaining as "stealthy" as possible during the scan. Why would a scanner like Nessus is not recommended in this situation?
Correct Answer:B
- (Topic 1)
Log management includes all the processes and techniques used to collect, aggregate, and analyze computer-generated log messages. It consists of the hardware, software, network and media used to generate, transmit, store, analyze, and dispose of log data.
Correct Answer:A
- (Topic 1)
System software password cracking is defined as cracking the operating system and all other utilities that enable a computer to function
Correct Answer:A
- (Topic 1)
Which of the following commands shows you the names of all open shared files on a server and number of file locks on each file?
Correct Answer:B