- (Exam Topic 3)
Which of the following information is displayed when Netstat is used with -ano switch?
Correct Answer:
D
- (Exam Topic 1)
In Linux, what is the smallest possible shellcode?
Correct Answer:
A
- (Exam Topic 3)
Which layer of iOS architecture should a forensics investigator evaluate to analyze services such as Threading, File Access, Preferences, Networking and high-level features?
Correct Answer:
D
- (Exam Topic 3)
Buffer overflow vulnerability of a web application occurs when it fails to guard its buffer properly and allows writing beyond its maximum size. Thus, it overwrites the ______. There are multiple forms of buffer overflow, including a Heap Buffer Overflow and a Format String Attack.
Correct Answer:
A
- (Exam Topic 3)
Gary, a computer technician, is facing allegations of abusing children online by befriending them and sending them illicit adult images from his office computer. What type of investigation does this case require?
Correct Answer:
B