- (Topic 3)
Office documents (Word, Excel, PowerPoint) contain a code that allows tracking the MAC, or unique identifier, of the machine that created the document.
What is that code called?
Correct Answer:C
- (Topic 3)
All Blackberry email is eventually sent and received through what proprietary RIM-operated mechanism?
Correct Answer:A
- (Topic 3)
What header field in the TCP/IP protocol stack involves the hacker exploit known as the Ping of Death?
Correct Answer:A
The Ping of Death occurs when the ICMP Header field contains a packet size lager than 65507 bytes.
- (Topic 1)
Which Is a Linux journaling file system?
Correct Answer:A
- (Topic 3)
Which forensic investigating concept trails the whole incident from how the attack began to how the victim was affected?
Correct Answer:B
- (Topic 3)
Chris has been called upon to investigate a hacking incident reported by one of his clients. The company suspects the involvement of an insider accomplice in the attack. Upon reaching the incident scene, Chris secures the physical area, records the scene using visual media. He shuts the system down by pulling the power plug so that he does not disturb the system in any way. He labels all cables and connectors prior to disconnecting any. What do you think would be the next sequence of events?
Correct Answer:B