

False True A globally accessible knowledge base of Adversary Tactics, Techniques, and Procedures (TTPs) based on observations from real-world attacks is known as: As an example, a disk sanitization utility might overwrite the data on the drive with the value of one in the first pass, change that value to zero in the second pass, and finally perform five more passes, overwriting the contents with random characters (the Schneier method).

The data overwriting technique is used by drive wipe utilities which might employ different methods (including multiple overwriting rounds) to decrease the likelihood of data retrieval. Cain & Abel One of the ways to prevent data recovery from a hard drive is to overwrite its contents. Packet-crafting utility Exploitation framework Examples of password-cracking utilities include: (Select 2 answers): Metasploit FTK imager What is Metasploit? WinHex WinHex Which of the following answers refers to a tool for creating forensic images of computer data? Autopsy Memdump Which of the following answers refers to a multi-function disk and binary data editor used for low-level data processing, data recovery, and digital forensics? format dd Which of the following forensic utilities enables the extraction of RAM contents? Tcpreplay WireShark A Linux command-line utility that can be used in the forensic process for creating and copying image files is called:

Tcpreplay tcpdump Which of the following answers refers to an advanced cross-platform packet-capturing tool equipped with a Graphical User Interface (GUI)? theHarvester Tcpreplay Which of the following is a Command-Line Interface (CLI) packet-capturing tool used in Unix-like operating systems? WireShark Tcprelay Which of the following tools enables sending custom packets that can be used to evaluate the security of a network device? Which of the following answers refers to a Command-Line Interface (CLI) packet-crafting tool?
