- (Exam Topic 3)
As a part of the investigation, Caroline, a forensic expert, was assigned the task to examine the transaction logs pertaining to a database named Transfers. She used SQL Server Management Studio to collect the active transaction log files of the database. Caroline wants to extract detailed information on the logs, including AllocUnitId, page id, slot id, etc. Which of the following commands does she need to execute in order to extract the desired information?
Correct Answer:
D
- (Exam Topic 1)
Lance wants to place a honeypot on his network. Which of the following would be your recommendations?
Correct Answer:
D
- (Exam Topic 2)
Bob works as information security analyst for a big finance company. One day, the anomaly-based intrusion detection system alerted that a volumetric DDOS targeting the main IP of the main web server was occurring. What kind of attack is it?
Correct Answer:
D
- (Exam Topic 3)
Select the tool appropriate for finding the dynamically linked lists of an application or malware.
Correct Answer:
D
- (Exam Topic 2)
While presenting his case to the court, Simon calls many witnesses to the stand to testify. Simon decides to call Hillary Taft, a lay witness, to the stand. Since Hillary is a lay witness, what field would she be considered an expert in?
Correct Answer:
B