You are the network administrator for a small bank in Dallas, Texas. To ensure network security, you enact a security policy that requires all users to have 14 character passwords. After giving your users 2 weeks notice, you change the Group Policy to force 14 character passwords. A week later you dump the SAM database from the standalone server and run a password-cracking tool against it. Over 99% of the passwords are broken within an hour. Why were these passwords cracked so Quickly?
Answer : A
Which forensic investigation methodology believes that criminals commit crimes solely to benefit their criminal enterprises?
Answer : C
When using an iPod and the host computer is running Windows, what file system will be used?
Answer : D
A packet is sent to a router that does not have the packet destination address in its route table.
How will the packet get to its proper destination?
Answer : C
When examining a file with a Hex Editor, what space does the file header occupy?
Answer : D
Which of the following directory contains the binary files or executables required for system maintenance and administrative tasks on a Linux system?
Answer : A
When cataloging digital evidence, the primary goal is to
Answer : B