Question 111
James, a hacker, identifies a vulnerability in a website. To exploit the vulnerability, he visits the login page and notes down the session ID that is created. He appends this session ID to the login URL and shares the link with a victim. Once the victim logs into the website using the shared URL, James reloads the webpage (containing the URL with the session ID appended) and now, he can browse the active session of the victim. Which attack did James successfully execute?
Question 112
The objective of this act was to protect consumers' personal financial information held by financial institutions and their service providers.
Question 113
When is it appropriate to use computer forensics?
Question 114
Volatile Memory is one of the leading problems for forensics.
Worms such as code Red are memory resident and do not write themselves to the hard drive, if you turn the system off they disappear.
In a lab environment, which of the following options would you suggest as the most appropriate to overcome the problem of capturing volatile memory?
Worms such as code Red are memory resident and do not write themselves to the hard drive, if you turn the system off they disappear.
In a lab environment, which of the following options would you suggest as the most appropriate to overcome the problem of capturing volatile memory?
Question 115
What is the name of the first reserved sector in File allocation table?
