Question 191
This is the original file structure database that Microsoft originally designed for floppy disks. It is written to the outermost track of a disk and contains information about each file stored on the drive.
Question 192
Joshua is analyzing an MSSQL database for finding the attack evidence and other details, where should he look for the database logs?
Question 193
Office documents (Word, Excel, PowerPoint) contain a code that allows tracking the MAC, or unique identifier, of the machine that created the document. What is that code called?
Question 194
James is testing the ability of his routers to withstand DoS attacks. James sends ICMP
ECHO requests to the broadcast address of his network. What type of DoS attack is James testing against his network?
ECHO requests to the broadcast address of his network. What type of DoS attack is James testing against his network?
Question 195
You are contracted to work as a computer forensics investigator for a regional bank that has four 30 TB storage area networks that store customer data.
What method would be most efficient for you to acquire digital evidence from this network?
What method would be most efficient for you to acquire digital evidence from this network?
