Course Hero Logo

Which two parameters should you check using ipconfig

This preview shows page 2 - 4 out of 9 pages.

Which two parameters should you check using ipconfig /all command to see that the DHCP in your computeris workingcorrectly.default gatewayhost namemedia statesubnet maskSelect one or more:a. default gatewayb. media statec. subnet maskd. host namee. description
Tablets are similar to smartphones in that they use special mobile operating systems like Android or iOS.Select one:
How you can solve the problem if a program that is listed in the registry of a Windows computer is not found on thatcomputer.Select one:
Clear my choice
09.11.2021, 09:41EndTerm QQuestion10Not yetansweredMarked out of1.00You are know two basic types of data which are collected when conducting computer forensics procedures. Which type ofdata is stored on a RAM, cache, and registries?Persistent data - Persistent data is stored on a local drive, such as an internal or external hard drive, or an optical drive.When the computer is turned off, this data is preserved.Volatile data - RAM, cache, and registries contain volatile data. Data in transit between a storage medium and a CPU isalso volatile data. If you are reporting illegal activity or are part of an incident response team, it is important to know howto capture this data, because it disappears as soon as the computer is turned off.Select one:
3/9Question11is a program that looks useful but also carries malicious code.Trojan horsesare self-replicating programs that propagate automatically without user action by exploitingvulnerabilities in software.Wormsrequire human action to propagate and infect other computers.virusNot yetansweredMarked out of1.00Question12Not yetansweredMarked out of1.00Question13Not yetansweredMarked out of1.00Clear my choiceMatch the malware with their descriptionis a program that looks useful but also carries malicious code.Trojan horsesare self-replicating programs that propagate automatically without user action by exploitingvulnerabilities in software.Wormsrequire human action to propagate and infect other computers.virus

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 9 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Fall
Professor
N/A
Tags
CPU cache

Newly uploaded documents

Show More

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture