Question

( computer forensics ) Working with Windows and CLI Systems 1. DART can be used to...

( computer forensics ) Working with Windows and CLI Systems

1. DART can be used to boot a Windows computer. True or False?

2. RAM can be captured most safely after a computer is shut down. True or False?

3. DART acquisition tools include which of the following? (Choose all that apply.) a) OSForensics b) DumpIt c) RamCapture d) Tcpdump

4. You can use TestDisk to search both Windows and Linux partitions. True or False?

5. DART includes password recovery tools. True or False?

1. The Registry contains how many hives? a) Three b) Two c) Five d) Six

2. How many user accounts are disabled? a) Two b) Seven c) One d) Three

3. The SAM hive uses PIDs to store information on user accounts. True or False?

4. Name two SID values that indicate whether an account was created automatically.

5. The Key Properties pane in Registry Viewer shows when user accounts have changed their passwords. True or False?

1.What’s the computer name of this system? a) mnmsrv b) GCFI5E c) HAL d) MSDTC

2. What’s the time zone setting for this computer? a) EST b) MST c) CST d) PST

3. How many mounted devices on this system have assigned drive letters?

4. What information is stored in the Enum folder? a) User account information b) Password information c) File locations d) Hardware and software values

5. The SYSTEM hive contains configuration data for passwords. True or False?

1. The ntuser.dat file contains information on multiple account holders. True or False?

2. What’s the e-mail account for the Denise user? a) [email protected] b) [email protected] c) [email protected] d) [email protected]

3. The ntuser.dat file contains information on which of the following? (Choose all that apply.) a) Drive letter designations b) Personalized desktop settings c) PID key d) MRU devices

4. Password decryption tools often need which of the following to retrieve user passwords? (Choose all that apply.) 1. SYSTEM hive 2. SAM hive 3. ntuser.dat file 4. Enum folder

5. The ntuser.dat file is in which of the following paths?

Homework Answers

Answer #1

ANSWERS

1. DART can be used to boot a Windows computer. TRUE

2. RAM can be captured most safely after a computer is shut down. FALSE

3. DART acquisition tools include which of the following? b)DumpIt & c)RamCapture

4. You can use TestDisk to search both Windows and Linux partitions. TRUE

5. The SYSTEM hive contains configuration data for passwords. TRUE

_____________________________________________________________________

ANSWERS

1. The Registry contains how many hives? d) SIX

2. How many user accounts are disabled? d)THREE

3. The SAM hive uses PIDs to store information on user accounts. TRUE

4. Name two SID values that indicate whether an account was created automatically. 501 and 1000

5. The Key Properties pane in Registry Viewer shows when user accounts have changed their passwords. TRUE

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
Instructions PowerShell Assignment #1 Objective: Learn basic Powershell scripting in Windows Setup: A Windows computer with...
Instructions PowerShell Assignment #1 Objective: Learn basic Powershell scripting in Windows Setup: A Windows computer with the latest Powershell environment installed Script #1 – Hello World! Description:  The classical introductory exercise: Just say "Hello, World!". Purpose: A "Hello, World!" program is traditionally used to introduce novice programmers to a programming language. It is also to make sure that the interpreter is installed correctly, and that the user understands how to use it. Instructions:  Complete this assignment to make sure that you know...
CIS - WINDOWS SERVER ADMIN - KNOWLEDGE BASED ASSESSMENT [101-BASICS] Additional Questions (5) Total. 183. Identify...
CIS - WINDOWS SERVER ADMIN - KNOWLEDGE BASED ASSESSMENT [101-BASICS] Additional Questions (5) Total. 183. Identify the correct Powershell command used to load group policy module. Select one: a.Import-Module ServerManager Add-WindowsFeature GPMC b. Import-module gpedit c. Import-Module grouppolicy d. None of the listed options. 184. You want to setup password policy for users. From where you can setup these policies? Select one: a. User Configuration\Policies\Windows Settings\Security Settings\Account Policies\Password Policy. b. User Configuration\Administrative Templates\Policies\Windows Settings\Security Settings\Account Policies\Password Policy. c. Computer Configuration\Administrative...
1. In order to use an instant messaging service, most services require the user to provide...
1. In order to use an instant messaging service, most services require the user to provide or create an e-mail account. a. true b. false 2. Although some companies, such as Yahoo! and Hotmail, provide free e-mail accounts, the account setup information provided by the end user is verified by the company and it is probably accurate. a. true b. false 3. For IM-related complaints, which of the the following information from the complainant would not be beneficial? a. The...
1. A node is a.An exchange b. A computer on a blockchain network c. A blockchain...
1. A node is a.An exchange b. A computer on a blockchain network c. A blockchain d..A type of cryptocurrency 2. A miner is a. Computers that validate and process blockchain transactions b. A type of blockchain c. A person doing calculations to verity a transaction d. An algorithm that predicts the next part of the chain 3. A blockchain is a. A centralized ledger b. A distributed ledger on a peer to peer network c. An exchange d. A...
life science 2 thx a lot 1. Reservoirs of infection A. refer to the normal host...
life science 2 thx a lot 1. Reservoirs of infection A. refer to the normal host of the pathogen B. include cats, birds, rodent, livestock, and insects C. have spread diseases such as HIV, Ebola, Swine flu, and SARS D. all of the above 2. Viral epidemics began around 12,000 years ago A. when humans lived in isolation B. when humans developed more densely populated agricultural communities C. when human became hunter-gatherers D. when antibiotics were discovered 3. The number...
1) Which of the following is not a valid way that a CRM system can collect...
1) Which of the following is not a valid way that a CRM system can collect information? A. accounting system B. order fulfillment system C. inventory system D. customer’s personal computer 2)Which of the following is a common marketing CRM metric? A. number of new prospective customers B. average number of service calls per day C. average time to resolution D. cost per interaction by marketing campaign 3)Which question below represents a CRM reporting technology example? A. Why did sales...
Complete a Java program named ARMgr that maintains customer accounts receivable in a database. The code...
Complete a Java program named ARMgr that maintains customer accounts receivable in a database. The code to initialize the CustomerAccountsDB database table and add a set of customer accounts is provided. Finish the code in these 3 methods in CustomerAccountDB.java to update or query the database: -purchase(double amountOfPurchase) -payment(double amountOfPayment) -getCustomerName() Hint: For getCustomerName(), look at the getAccountBalance() method to see an example of querying data from the database. For the purchase() and payment() methods, look at the addCustomerAccount() method...
Problem 1 You are an internal audit manager in a central government department that pays subsidies...
Problem 1 You are an internal audit manager in a central government department that pays subsidies to agricultural businesses involved in the production of basic foodstuffs. You will soon be undertaking an internal audit of the claims processing unit in your department. In preparation for the assignment you are reviewing the audit file on the previous audit carried out three years earlier. You find the following extract from one of the previous internal audit’s planning schedules: • “The unit receives...
Question 61 ​The tag for creating a numbered list is ____. a. ​<ol> b. ​<li />...
Question 61 ​The tag for creating a numbered list is ____. a. ​<ol> b. ​<li /> c. ​<ul> d. ​<nl> 1 points Question 62 ​The term for a collection of website files stored on a web server is ____. a. ​active website b. ​local website c. ​remote website d. ​plug-in website 1 points Question 63 ​The text editor installed with Windows is called ____. a. ​web pad b. ​MS Sketch c. ​Notebook d. ​Notepad 1 points Question 64 ​The text...
Can someone please edit my code so that it satisfies the assignments' requirements? I pasted the...
Can someone please edit my code so that it satisfies the assignments' requirements? I pasted the codes below. Requirement: Goals for This Project:  Using class to model Abstract Data Type  OOP-Data Encapsulation You are asked to write an app to keep track of a relatively small music library. The app should load song information from a data file once the app is started. It should allow user to view, add, remove, and search for songs. The app should...
ADVERTISEMENT
Need Online Homework Help?

Get Answers For Free
Most questions answered within 1 hours.

Ask a Question
ADVERTISEMENT