Question 66

What method of computer forensics will allow you to trace all ever-established user accounts on a Windows
2000 sever the course of its lifetime?
  • Question 67

    Which of the following statements is incorrect when preserving digital evidence?
  • Question 68

    In Windows, prefetching is done to improve system performance. There are two types of prefetching: boot prefetching and application prefetching. During boot prefetching, what does the Cache Manager do?
  • Question 69

    What does the 56.58.152.114(445) denote in a Cisco router log?
    Jun 19 23:25:46.125 EST: %SEC-4-IPACCESSLOGP: list internet-inbound denied udp 67.124.115.35(8084) -> 56.58.152.114(445), 1 packet
  • Question 70

    What is the slave device connected to the secondary IDE controller on a Linux OS referred to?