Which of the following two cryptography methods are used by NTFS Encrypting File System (EFS) to encrypt the data stored on a disk on a file-by-file basis?
Which of the following sections of an investigative report covers the background and summary of the report including the outcome of the case and the list of allegations?
Which of the following switches of the XCOPY command copies attributes while copying files?
You company suspects an employee of sending unauthorized emails to competitors. These emails are alleged to contain confidential company data. Which of the following is the most important step for you to take in preserving the chain of custody?
Which of the following directories cannot be placed out of the root filesystem?Each correct answer represents a complete solution. Choose all that apply.
John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. Which of the following commands will John use to display information about all mounted file systems?Each correct answer represents a complete solution. Choose all that apply.