Question 21

In which implementation of RAID will the image of a Hardware RAID volume be different from the image taken separately from the disks?
  • Question 22

    George is the network administrator of a large Internet company on the west coast. Per corporate policy, none of the employees in the company are allowed to use FTP or SFTP programs without obtaining approval from the IT department. Few managers are using
    SFTP program on their computers. Before talking to his boss, George wants to have some proof of their activity. George wants to use Ethereal to monitor network traffic, but only
    SFTP traffic to and from his network. What filter should George use in Ethereal?
  • Question 23

    What is considered a grant of a property right given to an individual who discovers or invents a new machine, process, useful composition of matter or manufacture?
  • Question 24

    You are working as an independent computer forensics investigator and received a call from a systems administrator for a local school system requesting your assistance. One of the students at the local high school is suspected of downloading inappropriate images from the Internet to a PC in the Computer Lab. When you arrive at the school, the systems administrator hands you a hard drive and tells you that he made a "simple backup copy" of the hard drive in the PC and put it on this drive and requests that you examine the drive for evidence of the suspected images. You inform him that a "simple backup copy" will not provide deleted files or recover file fragments. What type of copy do you need to make to ensure that the evidence found is complete and admissible in future proceeding?
  • Question 25

    Which of the following tool enables data acquisition and duplication?