1.
Physical security recommendations: There should be only one entrance to a forensics lab
2.
You should always work with original evidence
3.
Which of the following network attacks refers to sending huge volumes of email to an address in an attempt to overflow the mailbox, or overwhelm the server where the email address is hosted, to cause a denial-of-service attack?
4.
Which of the following file in Novel GroupWise stores information about user accounts?
5.
Which of the following log injection attacks uses white space padding to create unusual log entries?
6.
Which of the following is not correct when documenting an electronic crime scene?
7.
Syslog is a client/server protocol standard for forwarding log messages across an IP network. Syslog uses ___________to transfer log messages in a clear text format.
8.
Which of the following statements is incorrect related to acquiring electronic evidence at crime scene?
9.
Depending upon the Jurisdictional areas, different laws apply to different incidents. Which of the following law is related to fraud and related activity in connection with computers?
10.
Which of the following is not a part of the technical specification of the laboratory-based imaging system?