Question 191

This is the original file structure database that Microsoft originally designed for floppy disks. It is written to the outermost track of a disk and contains information about each file stored on the drive.
  • Question 192

    Joshua is analyzing an MSSQL database for finding the attack evidence and other details, where should he look for the database logs?
  • Question 193

    Office documents (Word, Excel, PowerPoint) contain a code that allows tracking the MAC, or unique identifier, of the machine that created the document. What is that code called?
  • Question 194

    James is testing the ability of his routers to withstand DoS attacks. James sends ICMP
    ECHO requests to the broadcast address of his network. What type of DoS attack is James testing against his network?
  • Question 195

    You are contracted to work as a computer forensics investigator for a regional bank that has four 30 TB storage area networks that store customer data.
    What method would be most efficient for you to acquire digital evidence from this network?