Which of the following forensic tools can be used to analyze the Windows Registry and crack passwords?

a. Disk Investigator
b. Access Data FTK
c. Disk Digger
d. Sleuth Kit


ANS: B

Computer Science & Information Technology

You might also like to view...

To increase the _______ of a photo, you should increase the difference between the light and dark parts.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The __________ notation is used to indicate that a copy of the letter is being sent to another person.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

What standard must be satisfied before the government may install a pen register on a telephone line for surveillance purposes?

A. The information likely to be obtained is relevant to an ongoing criminal investigation B. Probably cause exists that the person using the line has committed a crime C. Specific and articulable facts justifying the use of the pen register D. The use of a pen does not constitute a search and therefore may be freely installed by the governments.

Computer Science & Information Technology

Which of the following network vulnerability scan indicators BEST validates a successful, active scan?

A. The scan job is scheduled to run during off-peak hours. B. The scan output lists SQL injection attack vectors. C. The scan data identifies the use of privileged-user credentials. D. The scan results identify the hostname and IP address.

Computer Science & Information Technology