Daryl, a computer forensics investigator, has just arrived at the house of an alleged computer hacker. Daryl takes pictures and tags all computer and peripheral equipment found in the house. Daryl packs all the items found in his van and takes them back to his lab for further examination. At his lab, Michael his assistant helps him with the investigation. Since Michael is still in training, Daryl supervises all of his work very carefully. Michael is not quite sure about the procedures to copy all the data off the computer and peripheral devices. How many data acquisition tools should Michael use when creating copies of the evidence for the investigation?
In a virtual test environment, Michael is testing the strength and security of BGP using multiple routers to mimic the backbone of the Internet. This project will help him write his doctoral thesis on "bringing down the Internet". Without sniffing the traffic between the routers, Michael sends millions of RESET packets to the routers in an attempt to shut one or all of them down. After a few hours, one of the routers finally shuts itself down. What will the other routers communicate between themselves?
Which of the following tool enables data acquisition and duplication?
Amber, a black hat hacker, has embedded a malware into a small enticing advertisement and posted it on a popular ad-network that displays across various websites. What is she doing?
When using an iPod and the host computer is running Windows, what file system will be used?
What feature of Decryption Collection allows an investigator to crack a password as quickly as possible?
Why would a company issue a dongle with the software they sell?
The process of restarting a computer that is already turned on through the operating system is called?
Sniffers that place NICs in promiscuous mode work at what layer of the OSI model?
Where does Encase search to recover NTFS files and folders?
Which of the following is an iOS Jailbreaking tool?
Which of the following file contains the traces of the applications installed, run, or uninstalled from a system?
Which program is the bootloader when Windows XP starts up?
Which of the following are small pieces of data sent from a website and stored on the user’s computer by the user’s web browser to track, validate, and maintain specific user information?
Which of the following is a list of recently used programs or opened files?