Shane, a forensic specialist, is investigating an ongoing attack on a MySQL database server hosted on a Windows machine with SID ''WIN-ABCDE12345F.'' Which of the following log file will help Shane in tracking all the client connections and activities performed on the database server?
Answer : D
When monitoring for both intrusion and security events between multiple computers, it is essential that the computers' clocks are synchronized. Synchronized time allows an administrator to reconstruct what took place during an attack against multiple computers. Without synchronized time, it is very difficult to determine exactly when specific events took place, and how events interlace. What is the name of the service used to synchronize time among multiple computers?
Answer : B
What method of computer forensics will allow you to trace all ever-established user accounts on a Windows 2000 sever the course of its lifetime?
Answer : C
Which of the following tasks DOES NOT come under the investigation phase of a cybercrime forensics investigation case?
Answer : C
For what purpose do the investigators use tools like iPhoneBrowser, iFunBox, OpenSSHSSH, and iMazing?
Answer : A
In handling computer-related incidents, which IT role should be responsible for recovery, containment, and prevention to constituents?
Answer : B
Jacob is a computer forensics investigator with over 10 years of experience in investigations and has written over 50 articles on computer forensics. He has been called upon as a qualified witness to testify the accuracy and integrity of the technical log files gathered in an investigation into computer fraud. What is the term used for Jacob's testimony in this case?
Answer : D