A. Lossless compression
B. Lossy compression
C. Speech encoding compression
D. Lossy video compression
Which of the following statements is incorrect related to acquiring electronic evidence at crime
A. Sample banners are used to record the system activities when used by the unauthorized user
B. In warning banners, organizations give clear and unequivocal notice to intruders that by
signing onto the system they are expressly consenting to such monitoring
C. The equipment is seized which is connected to the case, knowing the role of the computer
which wil indicate what should be taken
D. At the time of seizing process, you need to shut down the computer immediately
Centralized logging is defined as gathering the computer system logs for a group of systems in
a centralized location. It is used to efficiently monitor computer system logs with the frequency
required to detect security violations and unusual activity.
Which wireless standard has bandwidth up to 54 Mbps and signals in a regulated frequency
spectrum around 5 GHz?
Hash injection attack allows attackers to inject a compromised hash into a local session and use
the hash to validate network resources.