ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 37 - ECSS discussion

Report
Export

Wesley, a professional hacker, deleted a confidential file in a compromised system using the '/bin/rm/ command to deny access to forensic specialists.

Identify the operating system on which Don has performed the file carving activity.

A.

Windows

Answers
A.

Windows

B.

Mac OS

Answers
B.

Mac OS

C.

Linux

Answers
C.

Linux

D.

Android

Answers
D.

Android

Suggested answer: C

Explanation:

In the scenario described, Wesley used the''/bin/rm/'' commandto delete a confidential file. The ''/bin/rm/'' command is commonly associated withLinuxoperating systems. It is used to remove files and directories. By deleting the file, Wesley aimed to hinder forensic specialists' access to it.Therefore, the operating system on which Wesley performed the file carving activity isLinux.Reference: EC-Council Certified Security Specialist (E|CSS) documents and study guide12.

asked 24/10/2024
Kurt Woodfin
43 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first