Which graphical tool should investigators use to identify publicly available information about a public IP address? A AWStats B GoAccess C SmartWhois D NsLookup {Ans: C}What is NOT a command used to determine logged-on users? A net sessions B LogonSessions C LoggedSessions D PsLoggedOn {Ans: C}Which characteristic describes an organization's forensic readiness in the context of cybercrimes? A It includes moral considerations. B It includes cost considerations. C It excludes nontechnical actions. D It excludes technical actions. {Ans: B}Which password-cracking technique uses details such as length of the password, character sets used to construct the password, etc.? A brute-force attack B dictionary attack C rule-based attack D man-in-the-middle attack {Ans: C}What is a responsibility of the first responder at a crime scene? A Package and transport the evidence B Identify the presence of rootkits on the evidence C Decrypt the evidence by cracking passwords D Detect malware present on the evidence {Ans: A}Which web application threat occurs when attackers identify a flaw, bypass authentication, and compromise the network? A broken access control B cookie poisoning C SQL injection D buffer overflow {Ans: A}