- (Topic 3)
A suspect is accused of violating the acceptable use of computing resources, as he has visited adult websites and downloaded images. The investigator wants to demonstrate that the suspect did indeed visit these sites. However, the suspect has cleared the search history and emptied the cookie cache. Moreover, he has removed any images he might have downloaded. What can the investigator do to prove the violation? Choose the most feasible option.
Correct Answer:A
- (Topic 3)
What will the following command produce on a website login page? SELECT email, passwd, login_id, full_name FROM members WHERE email = 'someone@somehwere.com';
DROP TABLE members; --'
Correct Answer:C
The third line deletes the table named members.
- (Topic 1)
Centralized logging is defined as gathering the computer system logs for a group of systems in a centralized location. It is used to efficiently monitor computer system logs with the frequency required to detect security violations and unusual activity.
Correct Answer:A
- (Topic 3)
In General, ____ Involves the investigation of data that can be retrieved from the hard disk or other disks of a computer by applying scientific methods to retrieve the data.
Correct Answer:D
- (Topic 2)
What term is used to describe a cryptographic technique for embedding information into something else for the sole
purpose of hiding that information from the casual observer?
Correct Answer:B
- (Topic 3)
Area density refers to:
Correct Answer:AC