- (Exam Topic 3)
Examination of a computer by a technically unauthorized person will almost always result in:
Correct Answer:
A
- (Exam Topic 4)
Fill In the missing Master Boot Record component.
* 1. Master boot code
* 2. Partition table
* 3. ___________
Correct Answer:
A
- (Exam Topic 3)
Which among the following tools can help a forensic investigator to access the registry files during postmortem analysis?
Correct Answer:
C
- (Exam Topic 4)
Robert needs to copy an OS disk snapshot of a compromised VM to a storage account in different region for further investigation. Which of the following should he use in this scenario?
Correct Answer:
D
- (Exam Topic 1)
George is the network administrator of a large Internet company on the west coast. Per corporate policy, none of the employees in the company are allowed to use FTP or SFTP programs without obtaining approval from the IT department. Few managers are using SFTP program on their computers. Before talking to his boss, George wants to have some proof of their activity. George wants to use Ethereal to monitor network traffic, but only SFTP traffic to and from his network.
What filter should George use in Ethereal?
Correct Answer:
D