Which principle states that “anyone or anything, entering a crime scene takes something of the scene with them, and leaves something of themselves behind when they leave”?
Which of the following Windows-based tool displays who is logged onto a computer, either locally or remotely?
Which of the following is a federal law enacted in the US to control the ways that financial institutions deal with the private information of individuals?
Which of the following Linux command searches through the current processes and lists the process IDs those match the selection criteria to stdout?
Bob has encountered a system crash and has lost vital data stored on the hard drive of his Windows computer. He has no cloud storage or backup hard drives. He wants to recover all the data, which includes his personal photos, music, documents, videos, official emails, etc. Which of the following tools shall resolve Bob's purpose?
Examination of a computer by a technically unauthorized person will almost always result in:
Hard disk data addressing is a method of allotting addresses to each _______ of data on a hard disk.
After suspecting a change in MS-Exchange Server storage archive, the investigator has analyzed it. Which of the following components is not an actual part of the archive?
What must an attorney do first before you are called to testify as an expert?
In Linux OS, different log files hold different information, which help the investigators to analyze various issues during a security incident. What information can the investigators obtain from the log file
var/log/dmesg?
In a computer that has Dropbox client installed, which of the following files related to the Dropbox client store information about local Dropbox installation and the Dropbox user account, along with email IDs linked with the account?
Which of the following standard represents a legal precedent regarding the admissibility of scientific examinations or experiments in legal cases?
Which of these Windows utility help you to repair logical file system errors?
NTFS sets a flag for the file once you encrypt it and creates an EFS attribute where it stores Data Decryption Field (DDF) and Data Recovery Field (DDR). Which of the following is not a part of DDF?
> NMAP -sn 192.168.11.200-215 The NMAP command above performs which of the following?