As a private investigator, you are not required by law to report crimes discovered during an investigation (with a few exceptions), but the IISFA Code of Ethics does require you to report such crimes.
Answer : B
In certain circumstances, it is necessary to penetrate remote systems (un-owned) in order to retrieve logs for evidence. If properly hashed at the remote site and once retrieved, will this evidence be valid for litigation?
Answer : B
A forensically safe file viewer can cross not only application but OS boundaries, and they offer the added benefit that:
Answer : A
What technique of layered security design will allow for both investigation and recovery after an incident?
Answer : B
In Microsoft's security architecture, the "SID" refers to:
Answer : C
Web anonymizers:
Answer : D
What is the difference between a zombie host and a reflector host?
Answer : C