Answer:
gpresult
Explanation:
Group Policy provides the system administrator with settings that would be necessary to manage the different user accounts available in an organization. It also controls their work environment centrally by configuring the user Operating System (OS), applications and user accounts.
Group policy settings or configurations are referred to as Group Policy Objects (GPOs). These objects can be linked to organizational units (OUs), domains or sites.
There are various group policy commands such as;
- rstrui (System Restore tool will run),
- runas (using different permission to run a tool or program),
- tasklist (currently running programs are shown
- gpupdate (Group policies are refreshed)
- gpresult (group policy configurations are displayed for verification)
gpresult command can be used to verify the group policy configurations for adjustment or optimization. The technician can start troubleshooting from viewing the active settings, then running the rstrui to start the System Restore utility to restore the computer to an earlier date
Answer:
The answer is cross-site scripting(XSS)attack.
Explanation:
Hope this helps!
Answer:
In the computer forensics, it basically examining the digital media by using the different types of specialist tools which is known as forensic tool.
It has the ability to acquiring the several evidence from the computer hard disk and by copying information, the data from the machine that can be procured and after that broke down for any data that is appropriate for the case.
There are different types of forensics tools that are:
- SIFT (SANS Investigative Forensics Toolkit)
- Volatility
- Redline
- Digitally forensics framework
- COFEE