Amber, a black hat hacker, has embedded malware into a small enticing advertisement and posted it on a popular ad-network that displays across various websites. What is she doing?
Which of the following is a non-zero data that an application allocates on a hard disk cluster in systems running on Windows OS?
Identify the file system that uses $BitMap file to keep track of all used and unused clusters on a volume.
Select the tool appropriate for examining the dynamically linked libraries of an application or malware.
In Linux OS, different log files hold different information, which help the investigators to analyze various issues during a security incident. What information can the investigators obtain from the log file
var/log/dmesg?
If the partition size is 4 GB, each cluster will be 32 K. Even if a file needs only 10 K, the entire 32 K will be allocated, resulting in 22 K of ________.
Select the data that a virtual memory would store in a Windows-based system.
Which of the following statements is incorrect when preserving digital evidence?