Digital Forensics Essentials all Questions With 100% CORRECT ANSWERS
Terms in this set (95)
Jack, a disgruntled employee of an organization, Internal Attack
gained access to the organization's database
server. He manipulated client records stored on
the database server to damage the reputation of
the organization and to make the organization
face legal consequences for losing integrity.
Identify the type of attack performed by Jack in
the above scenario.
External attack
Brute-force attack
Internal attack
Trojan horse attack
1/29
,Identify the SWGDE standards and criteria Standards and Criteria 1.2
stating that the agency management must review
the SOPs on an annual basis to ensure their
continued suitability and effectiveness.
Standards and Criteria 1.1
Standards and Criteria 1.2
Standards and Criteria 1.3
Standards and Criteria 1.4
Digital Forensics Essentials all Questions
2/29
, James, a newly recruited employee of an Phishing Attack
organization, received an email containing a fake
appointment letter. The letter claims to have
been sent by the real organization. James failed
to identify the legitimacy of the letter and
downloaded it. Consequently, malicious
software was installed on his system, and it
provided remote access to the attacker.
Identity the type of cybercrime performed by
James in the above scenario.
Denial-of-service attack
Privilege escalation attack
SQL injection attack
Phishing attack
Which of the following types of cybercrime SQL injection attack
involves taking advantage of unsanitized input
vulnerabilities to pass commands through a web
application and thereby retrieve information
from the target database?
SQL injection attack
Brute-force attack
Espionage
Trojan horse attack
Benjamin, a professional hacker, joined as an Privilege escalation attack
intern in an organization and obtained some
permissions to access the resources related to
his job. Soon after gaining trust in the
organization, he obtained elevated permissions
to access restricted parts of the network. Thus,
he gained access to confidential data of the
organization.
Identify the type of attack performed by
Benjamin in the above scenario.
Session hijacking attack
SQL injection attack
Privilege escalation attack
Denial-of-service attack
Digital Forensics Essentials all Questions
3/29