1.
What is the primary function of the tool CHKDSK in Windows that authenticates the file system reliability of a volume?
2.
Which of the following tool enables data acquisition and duplication?
3.
What does 254 represent in ICCID 89254021520014515744?
4.
Shane has started the static analysis of a malware and is using the tool ResourcesExtract to find more details of the malicious program. What part of the analysis is he performing?
5.
A master boot record (MBR) is the first sector ("sector zero") of a data storage device. What is the size of MBR?
6.
Which password cracking technique uses every possible combination of character sets?
7.
Which of the following Event Correlation Approach is an advanced correlation method that assumes and predicts what an attacker can do next after the attack by studying the statistics and probability and uses only two variables?
8.
NTFS has reduced slack space than FAT, thus having lesser potential to hide data in the slack space. This is because:
9.
During forensics investigations, investigators tend to collect the system time at first and compare it with UTC. What does the abbreviation UTC stand for?
10.
Buffer overflow vulnerability of a web application occurs when it fails to guard its buffer properly and allows writing beyond its maximum size. Thus, it overwrites the_________. There are multiple forms of buffer overflow, including a Heap Buffer Overflow and a Format String Attack.