All Windows executables start with _____ (1st 2 bytes)
Category: Uncategorized
The security of RSA encryption algorithm is base primarily o…
The security of RSA encryption algorithm is base primarily on the difficulty to factor prime numbers
An AES key length of 192 bits requires ___ Rounds
An AES key length of 192 bits requires ___ Rounds
The AES algorithm requires that the key be expanded in order…
The AES algorithm requires that the key be expanded in order to further encrypt the data in each round. In order to do this, the key is put through a
___________ can be used in a dynamic environment to capture…
___________ can be used in a dynamic environment to capture and analyze network traffic.
It is never a good idea to store forensic data on the victim…
It is never a good idea to store forensic data on the victim system. Valid locations to store forensically collected data include a
What specific part of the PE header identifies functions/c…
What specific part of the PE header identifies functions/code that can be accessed by other programs (It says specific).
In the modern world of incident response, forensic drive ima…
In the modern world of incident response, forensic drive imaging is rare because it takes ____________
DCFLDD is a tool that can be used to image systems. The adva…
DCFLDD is a tool that can be used to image systems. The advantage that dcfldd has over traditional dd is it (choose all that apply)
Thank you for your incredible patience with the Canvas hack…
Thank you for your incredible patience with the Canvas hack and the shifting schedules. I know it’s been a whirlwind, and I’m so proud of how this class handled the curveballs. Click “Submit” below and go have a great rest of your day! I will try to get grades up soon. Have a good summer!