<< Prev Question Next Question >>

Question 6/33

A company has identified that a hacker has modified files on one of the company's computers. The IT department has collected the storage media from the hacked computer.
Which evidence should be obtained from the storage media to identify which files were modified?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (33q)
Question 1: A user at a company attempts to hide the combination to a sa...
Question 2: Which policy is included in the CAN-SPAM Act?...
Question 3: Where does Windows store passwords for local user accounts?...
Question 4: Which operating system (OS) uses the NTFS (New Technology Fi...
Question 5: Which principle of evidence collection states that access to...
Question 6: A company has identified that a hacker has modified files on...
Question 7: A forensic investigator is acquiring evidence from an iPhone...
Question 8: Susan was looking at her credit report and noticed that seve...
Question 9: A computer involved in a crime is infected with malware. The...
Question 10: A forensic investigator wants to collect evidence from a fil...
Question 11: A cybercriminal hacked into an Apple iPad that belongs to a ...
Question 12: A forensic scientist is examining a computer for possible ev...
Question 13: An organization has identified a system breach and has colle...
Question 14: Which tool should be used with sound files, video files, and...
Question 15: How should a forensic scientist obtain the network configura...
Question 16: The human resources manager of a small accounting firm belie...
Question 17: What is a reason to use steganography?...
Question 18: Which Windows component is responsible for reading the boot....
Question 19: Which U.S. law criminalizes the act of knowingly using a mis...
Question 20: A company has identified that a hacker has modified files on...
Question 21: A forensic examiner is reviewing a laptop running OS X which...
Question 22: Which type of information does a Windows SAM file contain?...
Question 23: Which type of storage format should be transported in a spec...
Question 24: What is one purpose of steganography?...
Question 25: Which forensics tool can be used to bypass the passcode of a...
Question 26: How is the Windows swap file, also known as page file, used?...
Question 27: A USB flash drive was seized as evidence to be entered into ...
Question 28: A forensics investigator is investigating a Windows computer...
Question 29: Tom saved a message using the least significant bit (LSB) me...
Question 30: What are the three basic tasks that a systems forensic speci...
Question 31: Which operating system creates a swap file to temporarily st...
Question 32: Which tool identifies the presence of steganography?...
Question 33: Where is the default location for 32-bit programs installed ...