Where would you seek evidence that Ophcrack had been used on a Windows Server 2008 machine?

A. In the IDS logs
B. In the logs of the server; look for the reboot of the system
C. In the logs of the server; look for the loading of a CD
D. In the firewall logs


Answer: B. In the logs of the server; look for the reboot of the system

Computer Science & Information Technology

You might also like to view...

Use ____________ positioning to precisely configure the location of an element outside of normal flow.

a. absolute b. static c. relative d. fixed

Computer Science & Information Technology

The ____________ element is used to create an HTML form.

a) form b) htmlForm c) h1 d) None of the above.

Computer Science & Information Technology

In Resource Sheet view, the Entry table's ____ field contains any code, number, or abbreviation you want to enter to help identify that resource.

A. Identification B. Abbreviation C. Code D. Initials

Computer Science & Information Technology

The code for the sequential search implementation is so succinct that writing it inline instead of writing a function is preferable.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology