Which password cracking technique uses details such as length of password, character sets used to construct the password, etc.?
On an Active Directory network using NTLM authentication, where on the domain controllers are the passwords stored?
What layer of the OSI model do TCP and UDP utilize?
Paraben Lockdown device uses which operating system to write hard drive data?
Jacky encrypts her documents using a password. It is known that she uses her daughter’s year of birth as part of the password. Which password cracking technique would be optimal to crack her password?
How many times can data be written to a DVD+R disk?
Which of the following is a record of the characteristics of a file system, including its size, the block size, the empty and the filled blocks and their respective counts, the size and location of the inode tables, the disk block map and usage information, and the size of the block groups?
Microsoft Security IDs are available in Windows Registry Editor. The path to locate IDs in Windows 7 is:
Jacob is a computer forensics investigator with over 10 years experience in investigations and has written over 50 articles on computer forensics. He has been called upon as a qualified witness to testify the accuracy and integrity of the technical log files gathered in an investigation into computer fraud. What is the term used for Jacob testimony in this case?
What is the smallest physical storage unit on a hard drive?
When carrying out a forensics investigation, why should you never delete a partition on a dynamic disk?
How often must a company keep log files for them to be admissible in a court of law?
Which of the following Perl scripts will help an investigator to access the executable image of a process?
Which of the following statements is incorrect when preserving digital evidence?
What value of the "Boot Record Signature" is used to indicate that the boot-loader exists?
PDF + Testing Engine
|
---|
$66 |
Testing Engine
|
---|
$50 |
PDF (Q&A)
|
---|
$42 |
ECCouncil Free Exams |
---|
![]() |