Question 36

Jessica works as systems administrator for a large electronics firm. She wants to scan her network quickly to detect live hosts by using ICMP ECHO Requests. What type of scan is Jessica going to perform?
  • Question 37

    A forensic examiner is examining a Windows system seized from a crime scene. During the examination of a suspect file, he discovered that the file is password protected. He tried guessing the password using the suspect's available information but without any success. Which of the following tool can help the investigator to solve this issue?
  • Question 38

    Which of the following options will help users to enable or disable the last access time on a system running Windows 10 OS?
  • Question 39

    What term is used to describe a cryptographic technique for embedding information into something else for the sole purpose of hiding that information from the casual observer?
  • Question 40

    When the operating system marks cluster as used, but does not allocate them to any file, such clusters are known as ___________.