Are you preparing to sit for the computer hacking forensic investigator certification test? Getting access to people's networks and data is a very tedious thing is you do not know what you are doing, and this is why the hacking certificate is not given to just anyone. Do take up the quiz and get to see only how prepared you See moreare for the exam.
Digital Attack
Denial-of-Service (DoS)
Physical Attack
ARP Redirect
Rate this question:
The last several bytes of the file
The first several bytes of the file
None, file headers are contained in the FAT
One byte at the beginning of the file
Rate this question:
When files are deleted, the data is overwritten and the cluster marked as available
The longer a disk is in use, the less likely it is that deleted files will be overwritten
While booting, the machine may create temporary files that can delete evidence
Secure delete programs work by completely overwriting the file in one go
Rate this question:
Image the disk and try to recover deleted files
Seek the help of co-workers who are eye-witnesses
Check the Windows registry for connection data (you may or may not recover)
Approach the websites for evidence
Rate this question:
Blackout attack
Automated attack
Distributed attack
Central processing attack
Rate this question:
The last byte after the colon
The 0x at the beginning of the code
The 0x at the end of the code
The first byte after the colon
Rate this question:
By law, three
Quite a few
Only one
At least two
Rate this question:
0
10
100
1
Rate this question:
The same log is used at all times
A new log file is created everyday
A new log file is created each week
A new log is created each time the Web Server is started
Rate this question:
HKEY_LOCAL_MACHINE
HKEY_CURRENT_CONFIGURATION
HKEY_USER
HKEY_CURRENT_USER
Rate this question:
Logical
Anti-magnetic
Magnetic
Optical
Rate this question:
Use a system that has a dynamic addressing on the network
Use a system that is not directly interacting with the router
Use it on a system in an external DMZ in front of the firewall
It doesn't matter as all replies are faked
Rate this question:
Primary Operations Short Test
Power-On Self Test
Pre-Operational Situation Test
Primary Operating System Test
Rate this question:
User account that was used to send the account
Attachments sent with the e-mail message
Unique message identifier
Contents of the e-mail message
Date and time the message was sent
Rate this question:
One who has NTFS 4 or 5 partitions
One who uses dynamic swap file capability
One who uses hard disk writes on IRQ 13 and 21
One who has lots of allocation units per block or cluster
Rate this question:
Evidence must be handled in the same way regardless of the type of case
Evidence procedures are not important unless you work for a law enforcement agency
Evidence in a criminal case must be secured more tightly than in a civil case
Evidence in a civil case must be secured more tightly than in a criminal case
Rate this question:
Make an MD5 hash of the evidence and compare it with the original MD5 hash that was taken when the evidence first entered the lab
Make an MD5 hash of the evidence and compare it to the standard database developed by NIST
There is no reason to worry about this possible claim because state labs are certified
Sign a statement attesting that the evidence is the same as it was when it entered the lab
Rate this question:
Disallow UDP 53 in from outside to DNS server
Allow UDP 53 in from DNS server to outside
Disallow TCP 53 in from secondaries or ISP server to DNS server
Block all UDP traffic
Rate this question:
Universal Time Set (UTS)
Network Time Protocol (NTP)
SyncTime Service (STS)
Time-Sync Protocol (TSP)
Rate this question:
Trace the IP address to its origin
Write a report
Determine whether a crime was actually committed
Recover the evidence
Rate this question:
Coordinate with the HAZMAT team
Determine a way to obtain the suspect computer
Assume the suspect machine is contaminated
Do not enter alone
Rate this question:
An IDS evasion technique
A buffer overflow attempt
A DNS zone transfer
Data being retrieved from 63.226.81.13
Rate this question:
Only the reference to the file is removed from the FAT
The file is erased and cannot be recovered
A copy of the file is stored and the original file is erased
The file is erased but can be recovered
Rate this question:
It is a local exploit where the attacker logs in using username johna2k
There are two attackers on the system - johna2k and haxedj00
The attack is a remote exploit and the hacker downloads three files
The attacker is unsuccessful in spawning a shell as he has specified a high end UDP port
Rate this question:
Rootkit
Key escrow
Steganography
Offset
Rate this question:
Inculpatory evidence
Mandatory evidence
Exculpatory evidence
Terrible evidence
Rate this question:
True
False
Rate this question:
Multi-purpose Internet Mail Extensions (MIME)
Unix-to-Unix ENCODE-ing (UUEncode)
Internet Message Access Protocol (IMAP)
Simple Mail Transfer Protocol (SMTP)
Rate this question:
The system files have been copied by a remote attacker
The system administrator has created an incremental backup
The system has been compromised using a t0rnrootkit
Nothing in particular as these can be operational files
Rate this question:
137.189.96.52
8.12.1.0
203.218.39.20
203.218.39.50
Rate this question:
A utility by AccessData
A standard MS-DOS command
Digital Intelligence utility
Dd copying tool
Rate this question:
256
512
1024
2048
Rate this question:
The amount of data per disk
The amount of data per partition
The amount of data per square inch
The amount of data per platter
Rate this question:
The users have standard corporate equipment and software
The investigator does not have to get a warrant
The investigator has to get a warrant
The users can load whatever they want on their machines
Rate this question:
Isolation
Restricted access
Open access
An entry log
Rate this question:
Internet Fraud Complaint Center
Local or national office of the U.S. Secret Service
National Infrastructure Protection Center
CERT Coordination Center
Rate this question:
Network-based Intrusion Detection System (NIDS)
Host-based Intrusion Detection System (HIDS)
Anomaly detection
Signature recognition
Rate this question:
1
2
3
4
Rate this question:
To know what outside connections existed
In case other devices were connected
To know what peripheral devices exist
To know what hardware existed
Rate this question:
ICMP header field
TCP header field
IP header field
UDP header field
Rate this question:
Forensic duplication of hard drive
Analysis of volatile data
Comparison of MD5 checksums
Review of SIDs in the Registry
Rate this question:
National Photographic Interpretation Center (NIPC)
Federal Computer Incident Response Center (FedCIRC)
Computer Emergency Response Team (CERT)
Computer Incident Advisory Capability (CIAC)
Joint Cybersecurity Coordination Center (JC3)
Department Of Energy - Computer Incident Response Center (DOE-CIRC)
Rate this question:
18 U.S.C. § 1029 - Fraud and related activity in connection with access devices
18 U.S.C. § 1362 - Communication lines, stations or systems
18 U.S.C. § 2511 - Interception and disclosure of wire, oral, or electronic communications prohibited
18 U.S.C. § 2703 - Required disclosure of customer communications or records
Rate this question:
The Microsoft Virtual Machine Identifier
The Personal Application Protocol
The Globally Unique IDentifier (GUID)
The Individual ASCII String
Rate this question:
TCP/UDP Port 7
TCP/UDP Port 15
TCP/UDP Port 23
TCP/UDP Port 69
Rate this question:
On the individual computer's ARP cache
In the Web Server log files
In the DHCP Server log files
There is no way to determine the specific IP address
Rate this question:
A Honeypot that traps hackers
A system Using Trojaned commands
An environment set up after the user logs in
An environment set up before a user logs in
Rate this question:
Computer Forensics Tools and Validation Committee (CFTVC)
Association of Computer Forensics Software Manufactures (ACFSM)
National Institute of Standards and Technology (NIST)
Society for Valid Forensics Tools and Testing (SVFTT)
Rate this question:
Quiz Review Timeline (Updated): Mar 22, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.