Exam Name: | Computer Hacking Forensic Investigator (CHFI-v10) | ||
Exam Code: | 312-49v10 Dumps | ||
Vendor: | ECCouncil | Certification: | CHFI v10 |
Questions: | 704 Q&A's | Shared By: | niall |
When an investigator contacts by telephone the domain administrator or controller listed by a Who is lookup to request all e-mails sent and received for a user account be preserved, what U.S.C. statute authorizes this phone call and obligates the ISP to preserve e-mail records?
What method of computer forensics will allow you to trace all ever-established user accounts on a Windows 2000 sever the course of its lifetime?
Office Documents (Word, Excel and PowerPoint) contain a code that allows tracking the MAC or unique identifier of the machine that created the document. What is that code called?
After undergoing an external IT audit, George realizes his network is vulnerable to DDoS attacks.
What countermeasures could he take to prevent DDoS attacks?