Which "Standards and Criteria" under SWDGE states that "the agency must use hardware and software that are appropriate and effective for the seizure or examination procedure"?
Answer : D
Simona has written a regular expression for the detection of web application-specific attack attempt that reads as /((\%3C)|
Answer : C
Malware analysis can be conducted in various manners. An investigator gathers a suspicious executable file and uploads It to VirusTotal in order to confirm whether the file Is malicious, provide information about Its functionality, and provide Information that will allow to produce simple network signatures. What type of malware analysis was performed here?
Answer : C
What is the extension used by Windows OS for shortcut files present on the machine?
Answer : C
Donald made an OS disk snapshot of a compromised Azure VM under a resource group being used by the affected company as a part of forensic analysis process. He then created a vhd file out of the snapshot and stored it in a file share and as a page blob as backup in a storage account under different region. What Is the next thing he should do as a security measure?
Answer : B
Frank, a cloud administrator in his company, needs to take backup of the OS disks of two Azure VMs that store business-critical dat
a. Which type of Azure blob storage can he use for this purpose?
Answer : D
Which of the following tools is used to dump the memory of a running process, either immediately or when an error condition occurs?
Answer : C