PRIV.STM
PRIV.EDB
PUB.EDB
PRIB.EDB
Universal Coordinate Tasks
Coordinated Universal Time
Coordinated User Time
Universal Computer Time
Net session
Net open
Net run
Net sessioning
Option 5
Packing
Vacationing
$Rxyte provisioning
Static analysis
Word
Excel
MS Office
RegEdit
CHKDSK
Disk Integrity
Lsck
Real-time analysis
Post-trial analysis
Post-mortem analysis
After-action anaylsis
APT attack
Network attack
Web application attack
Ids attack
BMP
JPEG
GIF
PNG
/v
/s
/u
/r
Devcon
Fsutil
Wmic service
Reg.exe
Option 5
Memory key command
Doskey history
-l display
Regedit
16
24
8
32
Malware reversing
Dynamic analysis
Registry
Bit-to-bit mapping
Tripwire
Capsa
Belkasoft RAM Cap
Regshot
Clickfunnels
Deep Log Analyzer
XRY log
LAN Who
ICCID
ESN
EIR
IMSI
Adobe Acrobat Reader
Thunderbird
MS Outlook Express
Thundercats
ELH
E5H
EH5
ESH
Capsa
Drivespy
Wireshark
Xplico
The file was deleted from the Y drive in the 6th order
The deleted file is a document file
The file was deleted with Recuva
None of the above
Kismet
Snort
Accountix Pro
Nikto 1000
The original file size
The date the file was sent to the recycle bin
The length of the files as 344 bytes long
The original file path
Ext1
NTFS
FAT
FAT32
Law firms should not perform digital forensic investigations
They may alter the date or timestamp information of the evidence
They can prosecute the attack
They have a conflict of interest, since they are involved in real estate law
Wait!
Here's an interesting quiz for you.