- (Exam Topic 2)
Which of the following technique creates a replica of an evidence media?
Correct Answer:
C
- (Exam Topic 2)
When marking evidence that has been collected with the aa/ddmmyy/nnnn/zz format, what does the nnn denote?
Correct Answer:
D
- (Exam Topic 2)
A computer forensics investigator is inspecting the firewall logs for a large financial institution that has employees working 24 hours a day, 7 days a week.
What can the investigator infer from the screenshot seen below?
Correct Answer:
C
- (Exam Topic 2)
During an investigation, an employee was found to have deleted harassing emails that were sent to someone else. The company was using Microsoft Exchange and had message tracking enabled. Where could the investigator search to find the message tracking log file on the Exchange server?
Correct Answer:
A
- (Exam Topic 2)
Which password cracking technique uses details such as length of password, character sets used to construct the password, etc.?
Correct Answer:
A