GCFA Exam Question 151
Adam works as a professional Computer Hacking Forensic Investigator. He has been assigned with the project of investigating an iPod, which is suspected to contain some explicit material. Adam wants to connect the compromised iPod to his system, which is running on Windows XP (SP2) operating system. He doubts that connecting the iPod with his computer may change some evidences and settings in the iPod. He wants to set the iPod to read-only mode. This can be done by changing the registry key within the Windows XP (SP2) operating system. Which of the following registry keys will Adam change to accomplish the task?
GCFA Exam Question 152
Which of the following statements about SD cards are true?
Each correct answer represents a complete solution. Choose two.
Each correct answer represents a complete solution. Choose two.
GCFA Exam Question 153
Nathan works as a professional Ethical Hacker. He wants to see all open TCP/IP and UDP ports of his computer. Nathan uses the netstat command for this purpose but he is still unable to map open ports to the running process with PID, process name, and path. Which of the following commands will Nathan use to accomplish the task?
GCFA Exam Question 154
Which of the following steps are generally followed in computer forensic examinations?
Each correct answer represents a complete solution. Choose three.
Each correct answer represents a complete solution. Choose three.
GCFA Exam Question 155
John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we- are-secure.com. He copies the whole structure of the We-are-secure Web site to the local disk and obtains all the files on the Web site. Which of the following techniques is he using to accomplish his task?