A forensic examiner is reviewing a laptop running OS X which has been compromised. The examiner wants to know if any shell commands were executed by any of the accounts.
Which log file or folder should be reviewed?
Which information is included in an email header?
What is one purpose of steganography?
Tom saved a message using the least significant bit (LSB) method in a sound file and uploaded this sound to his own website.
What is the carrier in this example?
Which policy is included in the CAN-SPAM Act?
Which description applies to the Advanced Forensic Format (AFF)?
Which technique allows a cybercriminal to hide information?
Which operating system (OS) uses the NTFS (New Technology File System) file operating system?
How do forensic specialists show that digital evidence was handled in a protected, secure manner during the process of collecting and analyzing the evidence?
Which United States law requires telecommunications equipment manufacturers to provide built-in surveillance capabilities for federal agencies?