When investigating a malicious attack sourced from the Internet, the investigator would look for forensic evidence in:
Answer : D
What should be in an electronic forensic tool kit?
Answer : D
In order to access a desktop computer for a forensics investigation that has a BIOS boot password enabled, which of the following is not a technique to over-ride the password:
Answer : D
When auditing log files for system discrepancies, why is NTP important?
Answer : B
The USA Patriot Act of 2001 has a significant impact to the investigation of computer related crime with stiffer penalties and greater latitude in investigation by law enforcement. This act was signed into law on:
Answer : A
What method can be used to detect the use of rogue servers providing services such as illegal software distribution, music files, pornography in an environment?
Answer : A
Compression of collected evidence can't be utilized because:
Answer : D