Question 16
When monitoring for both intrusion and security events between multiple computers, it is essential that the computers' clocks are synchronized. Synchronized time allows an administrator to reconstruct what took place during an attack against multiple computers. Without synchronized time, it is very difficult to determine exactly when specific events took place, and how events interlace. What is the name of the service used to synchronize time among multiple computers?
Question 17
What system details can an investigator obtain from the NetBIOS name table cache?
Question 18
Which among the following web application threats is resulted when developers expose various internal implementation objects, such as files, directories, database records, or key-through references?
Question 19
MAC filtering is a security access control methodology, where a ___________ is assigned to each network card to determine access to the network.
Question 20
In a forensic examination of hard drives for digital evidence, what type of user is most likely to have the most file slack to analyze?
