Which of the following partitions contains the system files that are used to start the operating system?
Correct Answer:B
You are using the TRACERT utility to trace the route to CertLeader.com. You receive the following output:
Which of the following conclusions can you draw from viewing the output?
Each correct answer represents a complete solution. Choose two.
Correct Answer:BC
Which of the following tools can be used to check whether the network interface is in promiscuous mode or not?
Correct Answer:C
Where is the Hypertext Transfer Protocol (HTTP) used?
Correct Answer:E
Which of the following cryptographic methods are used in EnCase to ensure the integrity of the data, which is acquired for the investigation?
Each correct answer represents a complete solution. Choose two.
Correct Answer:AD
Host-based IDS (HIDS) is an Intrusion Detection System that runs on the system to be monitored. HIDS monitors only the data that it is directed to, or originates from the system on which HIDS is installed. Besides monitoring network traffic for detecting attacks, it can also monitor other parameters of the system such as running processes, file system access and integrity, and user logins for identifying malicious activities. Which of the following tools are examples of HIDS?
Each correct answer represents a complete solution. Choose all that apply.
Correct Answer:BC