- (Topic 2)
The efforts to obtain information before a trial by demanding documents, depositions, questions and answers written under oath, written requests for admissions of fact, and examination of the scene is a description of what legal term?
Correct Answer:
D
- (Topic 1)
Networks are vulnerable to an attack which occurs due to overextension of bandwidth, bottlenecks, network data interception, etc.
Which of the following network attacks refers to a process in which an attacker changes his or her IP address so that he or she appears to be someone else?
Correct Answer:
A
- (Topic 1)
Which of the following statements is incorrect related to acquiring electronic evidence at crime scene?
Correct Answer:
D
- (Topic 3)
Before performing a logical or physical search of a drive in Encase, what must be added to the program?
Correct Answer:
B
- (Topic 1)
You have been given the task to investigate web attacks on a Windows-based server.
Which of the following commands will you use to look at which sessions the machine has opened with other systems?
Correct Answer:
B