Question 101

The MD5 program is used to:
  • Question 102

    Harold is a web designer who has completed a website for ghttech.net. As part of the maintenance agreement he signed with the client, Harold is performing research online and seeing how much exposure the site has received so far. Harold navigates to google.com and types in the following search. link:www.ghttech.net What will this search produce?
  • Question 103

    Which of the following statements is TRUE about SQL Server error logs?
  • Question 104

    One technique for hiding information is to change the file extension from the correct one to the one that might not be noticed by an investigator. For example, changing a .jpg extension to a .doc extension so that a picture file appears to be a document. What can an investigator examine to verify that a file has the correct extension?
  • Question 105

    Which one of the following is not a first response procedure?