A SYN attack exploits what aspect of TCP communications?
Answer : A
An advanced application of making use of proxies to hide an IP that makes tracing virtually impossible is called:
Answer : B
The 1st sector of a hard disk is sometimes called:
Answer : A
LBA is:
Answer : B
The investigator must be ethical
Answer : A
When handling evidence, which of the following is not a common guideline?
Answer : B
There are several types of evidence that can be used in a trial. Which type of evidence listed below provides the most reliability?
Answer : C