- (Topic 2)
A small law firm located in the Midwest has possibly been breached by a computer hacker looking to obtain information on their clientele. The law firm does not have any on-site IT employees, but wants to search for evidence of the breach themselves to prevent any possible media attention. Why would this not be recommended?
Correct Answer:
D
- (Topic 2)
When performing a forensics analysis, what device is used to prevent the system from recording data on an evidence disk?
Correct Answer:
A
- (Topic 1)
Event correlation is a procedure that is assigned with a new meaning for a set of events that occur in a predefined interval of time.
Which type of correlation will you use if your organization wants to use different OS and network hardware platforms throughout the network?
Correct Answer:
B
- (Topic 1)
An image is an artifact that reproduces the likeness of some subject. These are produced by optical devices (i.e. cameras, mirrors, lenses, telescopes, and microscopes).
Which property of the image shows you the number of colors available for each pixel in an image?
Correct Answer:
B
- (Topic 2)
What must be obtained before an investigation is carried out at a location?
Correct Answer:
A