1. How many bits are used by the MBR partition scheme for storing LBAs (Logical Block Addresses) and the size information on a 512-byte sector?: 32 pg.
... [Show More] 179
2. How many byte folder entries does the FAT file system have for every folder?: 32
pg. 201
3. How should expert witnesses conduct themselves while presenting testi- mony to any court or attorney?: Avoid leaning and develop self-confidence
pg. ?
4. In MS-DOS and earlier versinos of Microsoft Windows, which partition must be first and a primary partition?: C:
pg. 174
5. In the GUID Partition Table, which Logical Block Address contains the Partition Entry Array?: LBA 2
pg. 179
6. MBR almost always refers to the partition sector of a disk also known as:: 512-byte boot sector
pg. 176
7. What cloud service offers a platform for developing applications and services?: PaaS
pg. 798
8. What cloud service offers application software to subscribers on demand or over the internet and is charged for by the provider on a pay-per-use basis, by subscription, by adverstising, or by sharing amond multiple users?: SaaS pg. 799
9. What is a common technique used to distribute malware on the web when an attacker exploits flaws in browser software to install malware just by visiting a website?: drive-by downloads
pg. 873
10. What is a proprietary information security standard for organizations that handle cardholder information for major debit, credit, prepaid, e-purse, ATM, and POS cards?: PCI DSS
pg. 617
11. What is a standard Microsoft-developed graphics image file format used to store images on Windows operating systems?: BMP
pg. 253
12. What is a standard partitioning scheme for hard disks and part of the Unified Extensible Firmware Interface?: GUID Partition Table (GPT)
pg. 179
13. What is considered the biggest threat to mobile devices?: data loss pg. 992
14. What is NOT a command used to determine logged-on users?: Logged-
Sessions pg. 456
15. What is NOT one of the three tiers a log management infrastructure typically comprises?: log rotation
pg. 625-626
16. What is the first step an investigator should take to carry out the on-site examination of an email server?: Obtain a search warrant application in the appropriate language.
pg. 953
17. What is the maximum single file size in the ext3 file system?: 2TB pg. 228
18. What is the RAID level that executes mirroring as it duplicates drive data onto multiple drives?: RAID 1
pg. 243
19. What is the RAID level that uses byte-level stripping with a dedicated parity disk to store checksums?: RAID 3
pg. 245
20. What layer of web application architecture is composed of cloud services which hold all commercial transactions and a server that supplies an orga- nization's production data in a structured form?: database layer
pg. 698
21. What partition holds the information regarding the operating system, system area, and other information required for booting?: primary partion pg. 174
22. What prefetch does value 1 from the registry entry, EnablePrefetcher, tell the system to use?: Application prefetching is enabled
pg. 542
23. What replacement file system did Apple develop in September 1985 to support the [Show Less]