1.
Router log files provide detailed Information about the network traffic on the Internet. It gives information about the attacks to and from the networks. The router stores log files in the____________.
2.
Which of the following is not an example of a cyber-crime?
3.
Files stored in the Recycle Bin in its physical location are renamed as Dxy.ext, where, X represents the _________.
4.
Tracks numbering on a hard disk begins at 0 from the outer edge and moves towards the center, typically reaching a value of ___________.
5.
Event correlation is a procedure that is assigned with a new meaning for a set of events that occur in a predefined interval of time. Which type of correlation will you use if your organization wants to use different OS and network hardware platforms throughout the network?
6.
Which one of the following statements is not correct while preparing for testimony?
7.
The Apache server saves diagnostic information and error messages that it encounters while processing requests. The default path of this file is usr/local/apache/logs/error.log in Linux. Identify the Apache error log from the following logs.
8.
Operating System logs are most beneficial for Identifying or Investigating suspicious activities involving a particular host. Which of the following Operating System logs contains information about operational actions performed by OS components?
9.
A mobile operating system manages communication between the mobile device and other compatible devices like computers, televisions, or printers. Which mobile operating system architecture is represented here?
10.
What is the first step that needs to be carried out to investigate wireless attacks?