Skip to content
Equizzing
Home
Quiz Categories
Linux Entry Level LPI Level 1 LPI Level 2 LPI Level 3
Contact

Quiz 412-79

Recent Comments

  1. Jan Dowsky on which type of Layer 2 attack can you intercept traffic …
  2. Joao on Which happens if the swap file of a virtual machine is …
  3. P.C.S.O.R. on What could cause this error?
  4. mur on Which two statements about administrative access to the Cisco Secure ACS SE are true?
  5. rubik on Which GPOs will apply to User2 when the user signs in t…

Quiz 412-79

Quiz 412-79, EC-Council Certified Security Analyst (ECSA)

The MD5 program is used to:

Which is a standard procedure to perform during all computer forensics investigations?

which of the following information to help you in your investigation?

what type of user is most likely to have the most file slack to analyze?

what way do the procedures for dealing with evidence in a criminal case differ from the procedures for dealing with evidence in a civil case?

What can you do to prove that the evidence is the same as it was when it first entered the lab?

which among the following would be appropriate?

What is the name of the service used to synchronize time among multiple computers?

what is your first step in the investigation?

If a suspect computer is located in an area that may have toxic chemicals, you must:

Posts navigation

Previous 1 … 12 13 14 … 32 Next
Equizzing
    Privacy Policy

© 2025 Equizzing