- (Exam Topic 2)
What is the size value of a nibble?
Correct Answer:
C
- (Exam Topic 3)
Which of the following information is displayed when Netstat is used with -ano switch?
Correct Answer:
D
- (Exam Topic 1)
In Linux, what is the smallest possible shellcode?
Correct Answer:
A
- (Exam Topic 3)
Which layer of iOS architecture should a forensics investigator evaluate to analyze services such as Threading, File Access, Preferences, Networking and high-level features?
Correct Answer:
D
- (Exam Topic 3)
Buffer overflow vulnerability of a web application occurs when it fails to guard its buffer properly and allows writing beyond its maximum size. Thus, it overwrites the ______. There are multiple forms of buffer overflow, including a Heap Buffer Overflow and a Format String Attack.
Correct Answer:
A