Authentication was a one-way process for SSL v1 and v2, with only the server providing authentication.
1.5 / 1.5 points
A browser helper object (BHO) has unrestricted access to the Internet Explorer event model and can perform tasks such as capturing keystrokes.
1.5 / 1.5 points
Which protocol is used for the transfer of hyperlinked data over the Internet, from web servers to browsers?
1.5 / 1.5 points
Which plug-in helps a browser maintain an HTTPS connection and gives a warning when it is not present?
1.5 / 1.5 points
Which attack works on both SSL and TLS by transparently converting the secure HTTPS connection into a plain HTTP connection, removing the transport layer encryption protections?
1.5 / 1.5 points
Which statement correctly describes SSL v3 and TLS authentication?
1.5 / 1.5 points
FTP encrypts traffic by default.
1.5 / 1.5 points
Which browser plug-in allows the user to determine which domains have trusted scripts?
1.5 / 1.5 points
What application is associated with TCP Ports 989 and 990?
1.5 / 1.5 points
What is the goal of TCP?
1.5 / 1.5 points
The term __________ describes a series of digits near the beginning of the file that provides information about the file format.
1.5 / 1.5 points
Evidence that is material to the case or has bearing on the matter at hand is known as __________.
1.5 / 1.5 points
Evidence that must be legally qualified and reliable is known as __________.
1.5 / 1.5 points
Minor procedural missteps have no legal consequences provided the overall investigation is properly conducted.
0 / 1.5 points
What is a software bomb?
Correct Answer:
Software that can destroy or modify files when commands are executed on the computer
1.5 / 1.5 points
Both forensics and e-discovery are secondary processes from a business perspective.
1.5 / 1.5 points
Oral testimony that proves a specific fact with no inferences or presumptions is which type of evidence?
1.5 / 1.5 points
When analyzing computer storage components, the original system should be analyzed.
1.5 / 1.5 points
When performing forensics on a computer system, you should use the utilities provided by that system.
1.5 / 1.5 points
From a forensics perspective, Linux systems have the same artifacts as Windows systems.
Comments
Post a Comment