1.
Which of the following steganography types hides the secret message in a specifically designed pattern on the document that is unclear to the average reader?
2.
Web applications provide an Interface between end users and web servers through a set of web pages that are generated at the server-end or contain script code to be executed dynamically within the client Web browser.
3.
Which table is used to convert huge word lists (i .e. dictionary files and brute-force lists) into password hashes?
4.
Data acquisition system is a combination of tools or processes used to gather, analyze and record Information about some phenomenon. Different data acquisition system are used depends on the location, speed, cost. etc. Serial communication data acquisition system is used when the actual location of the data is at some distance from the computer. Which of the following communication standard is used in serial communication data acquisition system?
5.
Which of the following statements is incorrect when preserving digital evidence?
6.
Which of the following would you consider an aspect of organizational security, especially focusing on IT security?
7.
Which of the following approaches checks and compares all the fields systematically and intentionally for positive and negative correlation with each other to determine the correlation across one or multiple fields?
8.
Log management includes all the processes and techniques used to collect, aggregate, and analyze computer- generated log messages. It consists of the hardware, software, network and media used to generate, transmit, store, analyze, and dispose of log data.
9.
Data files from original evidence should be used for forensics analysis
10.
Attackers can manipulate variables that reference files with dot-dot-slash (./) sequences and their variations such as http://www.juggyDoy.corn/GET/process.php./././././././././etc/passwd. Identify the attack referred.