Test Specific Info Flashcards
What storage tech uses NAND?
SSD
What uses AFF file format?
Autopsy and Sleuth Kit
SQL Injection -Structured Query Language
May be the most common web application attack. It is based on inserting SQL commands into text boxes, such as the username and password text fields on the login screen. If the login fields expect only text and do not protect against SQL commands, the web attack is possible.
.odt format
open document text document file
Data Doctor
This product recovers all Inbox and Outbox data and all contacts data, and has an easy-to-use interface.
What is /var/log/lpr
Linux Printer Log
How does windows store passwords?
HASH
Where does windows store passwords?
SAM
Deleted Apple iphone/ipad files go where?
/.Trashes/501
What unlocks iphone passcodes?
XRY
Eudora =
.mbx
CALEA
The Communications Assistance to Law Enforcement Act of 1994 is a federal wiretap law for traditional wired telephony. It was expanded in 2004 to include wireless, voice over packets, and other forms of electronic communications, including signaling traffic and metadata.
COPPA
The Children’s Online Privacy Protection Act of 1998 (COPPA) protects children 13 years of age
and under from the collection and use of their personal information by websites. It is noteworthy
that COPPA replaces the Child Online Protection Act of 1988 (COPA), which was determined to
be unconstitutional.
CSA
The Computer Security Act of 1987 was passed to improve the security and privacy of sensitive information in federal computer systems. The law requires the establishment of minimum acceptable security practices, creation of computer security plans, and training of system users or owners of facilities that house sensitive information.
ECPA
The Electronic Communications Privacy Act of 1986 governs the privacy and disclosure, access, and interception of content and traffic data related to electronic communications.