100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4,6 TrustPilot
logo-home
Examen

D431 Digital Forensics Questions And Answers Latest Top Score

Puntuación
-
Vendido
-
Páginas
5
Grado
A+
Subido en
22-09-2024
Escrito en
2024/2025

D431 Digital Forensics Questions And Answers Latest Top Score Which law requires both parties to consent to the recording of a conversation? - correct answer. ECPA (Electronic Communications Privacy Act) Which law is related to the disclosure of personally identifiable protected health information (PHI)? - correct answer. Health Insurance Portability and Accountability Act (HIPAA) Which U.S. law criminalizes the act of knowingly using a misleading domain name with the intent to deceive a minor into viewing harmful material? - correct answer. 18 U.S.C. 2252B Which U.S. law protects journalists from turning over their work or sources to law enforcement before the information is shared with the public? - correct answer. The Privacy Protection Act (PPA) Which law or guideline lists the four states a mobile device can be in when data is extracted from it? - correct answer. NIST SP 800-72 Guidelines Which law includes a provision permitting the wiretapping of VoIP calls? - correct answer. Communications Assistance to Law Enforcement Act (CALEA) Which policy is included in the CAN-SPAM Act? - correct answer. The email sender must provide some mechanism whereby the receiver can opt out of future emails and that method cannot require the receiver to pay in order to opt out. Which United States law requires telecommunications equipment manufacturers to provide built-in surveillance capabilities for federal agencies? - correct answer. Communication Assistance to Law Enforcement Act (CALEA) Which law requires a search warrant or one of the recognized exceptions to the search warrant requirements for searching email messages on a computer? - correct answer. The Fourth Amendment to the U.S. Constitution Where are local passwords stored for the Windows operating system? - correct answer. SAM file in WindowsSystem32 Where on a Windows system is the config folder located that contains the SAM file? - correct answer. C:WindowsSystem32 A forensic examiner wants to try to extract passwords for wireless networks to which a system was connected. Where should passwords for wireless networks be stored on a Windows XP system? - correct answer. Registry Which Windows password cracking tool uses rainbow tables? - correct answer. Ophcrack How does a rainbow table work to crack a password? - correct answer. It uses a table of all possible keyboard combinations and their hash values, then searches for a match. What should a forensic investigator use to gather the most reliable routing information for tracking an email message? - correct answer. Email header Which activity involves email tracing? - correct answer. Determining the ownership of the source email server A forensic examiner reviews a laptop running OS X which has been compromised. The examiner wants to know if there were any mounted volumes created from USB drives. Which digital evidence should be reviewed? - correct answer. /var/log Which log or folder contains information about printed documents on a computer running Mac OS X? - correct answer. /var/spool/cups Which Windows event log should be checked for evidence of invalid logon attempts? - correct answer. Security A cyber security organization has issued a warning about a cybercriminal who is using a known vulnerability to attack unpatched corporate Macintosh systems. A network administrator decides to examine the software updates logs on a Macintosh system to ensure the system has been patched. Which folder contains the software updates logs? - correct answer. /Library/Receipts A forensic investigator wants to image an older BlackBerry smartphone running OS 7.0. Which tool should the investigator use? - correct answer. BlackBerry Desktop Manager An investigator wants to extract information from a mobile device by connecting it to a computer. What should the investigator take great care to ensure? - correct answer. That the mobile device does not synchronize with the computer

Mostrar más Leer menos
Institución
D431 Digital Forensics
Grado
D431 Digital Forensics









Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
D431 Digital Forensics
Grado
D431 Digital Forensics

Información del documento

Subido en
22 de septiembre de 2024
Número de páginas
5
Escrito en
2024/2025
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

D431 Digital Forensics Questions And
Answers Latest Top Score


Which law requires both parties to consent to the recording of a conversation? - correct
answer. ECPA (Electronic Communications Privacy Act)

Which law is related to the disclosure of personally identifiable protected health
information (PHI)? - correct answer. Health Insurance Portability and Accountability
Act (HIPAA)

Which U.S. law criminalizes the act of knowingly using a misleading domain name with
the intent to deceive a minor into viewing harmful material? - correct answer. 18
U.S.C. 2252B

Which U.S. law protects journalists from turning over their work or sources to law
enforcement before the information is shared with the public? - correct answer. The
Privacy Protection Act (PPA)

Which law or guideline lists the four states a mobile device can be in when data is
extracted from it? - correct answer. NIST SP 800-72 Guidelines

Which law includes a provision permitting the wiretapping of VoIP calls? - correct
answer. Communications Assistance to Law Enforcement Act (CALEA)

Which policy is included in the CAN-SPAM Act? - correct answer. The email sender
must provide some mechanism whereby the receiver can opt out of future emails and
that method cannot require the receiver to pay in order to opt out.

Which United States law requires telecommunications equipment manufacturers to
provide built-in surveillance capabilities for federal agencies? - correct answer.
Communication Assistance to Law Enforcement Act (CALEA)

Which law requires a search warrant or one of the recognized exceptions to the search
warrant requirements for searching email messages on a computer? - correct answer.
The Fourth Amendment to the U.S. Constitution

, Where are local passwords stored for the Windows operating system? - correct answer.
SAM file in \Windows\System32\

Where on a Windows system is the config folder located that contains the SAM file? -
correct answer. C:\Windows\System32

A forensic examiner wants to try to extract passwords for wireless networks to which a
system was connected. Where should passwords for wireless networks be stored on a
Windows XP system? - correct answer. Registry

Which Windows password cracking tool uses rainbow tables? - correct answer.
Ophcrack

How does a rainbow table work to crack a password? - correct answer. It uses a table
of all possible keyboard combinations and their hash values, then searches for a match.

What should a forensic investigator use to gather the most reliable routing information
for tracking an email message? - correct answer. Email header

Which activity involves email tracing? - correct answer. Determining the ownership of
the source email server

A forensic examiner reviews a laptop running OS X which has been compromised. The
examiner wants to know if there were any mounted volumes created from USB drives.
Which digital evidence should be reviewed? - correct answer. /var/log

Which log or folder contains information about printed documents on a computer
running Mac OS X? - correct answer. /var/spool/cups

Which Windows event log should be checked for evidence of invalid logon attempts? -
correct answer. Security

A cyber security organization has issued a warning about a cybercriminal who is using a
known vulnerability to attack unpatched corporate Macintosh systems. A network
administrator decides to examine the software updates logs on a Macintosh system to
ensure the system has been patched. Which folder contains the software updates logs?
- correct answer. /Library/Receipts

A forensic investigator wants to image an older BlackBerry smartphone running OS 7.0.
Which tool should the investigator use? - correct answer. BlackBerry Desktop
Manager

An investigator wants to extract information from a mobile device by connecting it to a
computer. What should the investigator take great care to ensure? - correct answer.
That the mobile device does not synchronize with the computer
$12.99
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada


Documento también disponible en un lote

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
Lectsadh havard university
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
321
Miembro desde
2 año
Número de seguidores
102
Documentos
12286
Última venta
16 horas hace
lectsadh

NURSING SCHOOL IS HARD AM HERE TO SIMPLIFY THE INFORMATION AND MAKE IT EASIER!! My mission is to be your light in the dark, if you are worried or having trouble in nursing school, i really want my notes to be your guide, stay with me and you will find everything you need to study and pass any tests, quizzes and exams! Assisting students with quality work is my first priority. I know how frustrating it can get with all those assignments mate! I have essential guides that are A graded. Get verified solutions from LECTSADH.

Lee mas Leer menos
4.0

71 reseñas

5
39
4
7
3
16
2
4
1
5

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes