00:00

QUESTION 91

- (Topic 2)
The efforts to obtain information before a trial by demanding documents, depositions, questions and answers written under oath, written requests for admissions of fact, and examination of the scene is a description of what legal term?

Correct Answer: D

QUESTION 92

- (Topic 1)
Networks are vulnerable to an attack which occurs due to overextension of bandwidth, bottlenecks, network data interception, etc.
Which of the following network attacks refers to a process in which an attacker changes his or her IP address so that he or she appears to be someone else?

Correct Answer: A

QUESTION 93

- (Topic 1)
Which of the following statements is incorrect related to acquiring electronic evidence at crime scene?

Correct Answer: D

QUESTION 94

- (Topic 3)
Before performing a logical or physical search of a drive in Encase, what must be added to the program?

Correct Answer: B

QUESTION 95

- (Topic 1)
You have been given the task to investigate web attacks on a Windows-based server.
Which of the following commands will you use to look at which sessions the machine has opened with other systems?

Correct Answer: B