Question 116

Which of the following registry hive gives the configuration information about which application was used to open various files on the system?
  • Question 117

    You are assigned to work in the computer forensics lab of a state police agency.
    While working on a high profile criminal case, you have followed every applicable procedure, however your boss is still concerned that the defense attorney might question whether evidence has been changed while at the lab. What can you do to prove that the evidence is the same as it was when it first entered the lab?
  • Question 118

    Larry is an IT consultant who works for corporations and government agencies. Larry plans on shutting down the city's network using BGP devices and zombies? What type of
    Penetration Testing is Larry planning to carry out?
  • Question 119

    An attack vector is a path or means by which an attacker can gain access to computer or network resources in order to deliver an attack payload or cause a malicious outcome.
  • Question 120

    Company ABC has employed a firewall, IDS, Antivirus, Domain Controller, and SIEM. The company's domain controller goes down. From which system would you begin your investigation?