1.
What type of attack sends spoofed UDP packets (instead of ping packets) with a fake source address to the IP broadcast address of a large network?
2.
Which of the following is a list of recently used programs or opened files?
3.
Which of the following tasks DOES NOT come under the investigation phase of a cybercrime forensics investigation case?
4.
Which of the following file contains the traces of the applications installed, run, or uninstalled from a system?
5.
Which password cracking technique uses details such as length of password, character sets used to construct the password, etc.?
6.
Which of the following tool captures and allows you to interactively browse the traffic on a network?
7.
Which of the following standard represents a legal precedent sent in 1993 by the Supreme Court of the United States regarding the admissibility of expert witnesses' testimony during federal legal proceedings?
8.
Which of the following stages in a Linux boot process involve initialization of the system's hardware?
9.
Who is responsible for the following tasks? Secure the scene and ensure that is maintained in a secure state until the Forensic Team advises Make notes about the scene that will eventually be handed over to the Forensic Team
10.
Jason discovered a file named $RIYG6VR.doc in the C:\$Recycle.Bin\\ while analyzing a hard disk image for the deleted data. What inferences can he make from the file name?