Skip to content
Equizzing
Home
Quiz Categories
Linux Entry Level LPI Level 1 LPI Level 2 LPI Level 3
Contact

Study tips 312-49

What is the name of the attack that affects the DNS cache of the name resolution servers, resulting in those servers directing users to the wrong web site?

What type of copy do you need to make to ensure that the evidence found is complete and admissible in future proceedings?

What is the term used to describe how this evidence is admissible?

Microsoft Outlook maintains email messages in a proprietary format in what type of file?

The efforts to obtain information before a trail by demanding documents, depositions, questioned and answers written under oath, written requests for admissions of fact and examination of the scene is a description of what legal term?

Which of the following would that be?

You are a computer forensics investigator working with local police department …

Hackers can gain access to Windows Registry and manipulate user passwords, DNS settings, access rights or others features that they may need in order to accomplish their objectives. One simple method for loading an application at startup is to add an entry (Key) to the following Registry Hive:

Which of the following filesystem is used by Mac OS X?

When you are running a vulnerability scan on a network and the IDS cuts off your connection, what type of IDS is being used?

Posts navigation

Previous 1 … 36 37 38 … 67 Next
Equizzing
    Privacy Policy

© 2025 Equizzing