- (Exam Topic 3)
Steve, a forensic investigator, was asked to investigate an email incident in his organization. The organization has Microsoft Exchange Server deployed for email communications. Which among the following files will Steve check to analyze message headers, message text, and standard attachments?
Correct Answer:
B
- (Exam Topic 2)
Files stored in the Recycle Bin in its physical location are renamed as Dxy.ext, where “x” represents the ________.
Correct Answer:
A
- (Exam Topic 3)
Buffer overflow vulnerabilities, of web applications, occurs when the application fails to guard its buffer properly and allows writing beyond its maximum size. Thus, it overwrites the ______. There are multiple forms of buffer overflow, including a Heap Buffer Overflow and a Format String Attack.
Correct Answer:
D
- (Exam Topic 2)
What is one method of bypassing a system BIOS password?
Correct Answer:
B
- (Exam Topic 2)
Which of the following technique creates a replica of an evidence media?
Correct Answer:
C