In certain cases, a system may have CMOS or Boot passwords that prevent an investigator from accessing the hard drive. What technique would be most effective in circumventing the password protection?
Answer : B
When handling evidence, which of the following is not a common guideline?
Answer : B
Which of the following represents the data found at a NTFS hard drive, and lasts for 3 bytes?
Answer : B
Step 1 in analyzing data during an investigation is:
Answer : A
A new protocol that is designed to aid in intrusion protection and IP tracebacks is known as:
Answer : A
Keyloggers are impossible to detect.
Answer : B
An active traceback detects active network connections to a host.
Answer : A