Computer security logs contain information about the events occurring within an organization's systems and networks. Application and Web server log files are useful in detecting web attacks. The source, nature, and time of the attack can be determined by _________of the compromised system.
A. Analyzing rainbow tables
B. Analyzing log files
C. Analyzing hard disk boot records
D. Analyzing SAM file
正解:B
質問 2:
Under no circumstances should anyone, with the exception of qualified computer forensics personnel, make any attempts to restore or recover information from a computer system or device that holds electronic information.
A. False
B. True
正解:B
質問 3:
Which of the following commands shows you the username and IP address used to access the system via a remote login session and the Type of client from which they are accessing the system?
A. Net sessions
B. Net config
C. Net file
D. Net share
正解:A
質問 4:
What is static executable file analysis?
A. It is a process that consists of collecting information about and from an executable file by launching an executable file in a controlled and monitored environment
B. It is a process that consists of collecting information about and from an executable file by launching the file under any circumstances
C. It is a process that consists of collecting information about and from an executable file without actually launching an executable file in a controlled and monitored environment
D. It is a process that consists of collecting information about and from an executable file without actually launching the file under any circumstances
正解:D
質問 5:
The Electronic Serial Number (ESN) is a unique __________ recorded on a secure chip in a mobile phone by the manufacturer.
A. 24-bit identifier
B. 32-bit identifier
C. 64-bit identifier
D. 16-bit identifier
正解:B