Computer Hacking Forensic Investigator Certification Test! Trivia Quiz

50 Questions | Total Attempts: 232

SettingsSettingsSettings
Computer Hacking Forensic Investigator Certification Test! Trivia Quiz - Quiz

Are you preparing to sit for the computer hacking forensic investigator certification test? Getting access to people's networks and data is a very tedious thing is you do not know what you are doing, and this is why the hacking certificate is not given to just anyone. Do take up the quiz and get to see only how prepared you are for the exam.


Questions and Answers
  • 1. 
    What file structure database would you expect to find on floppy disks?
    • A. 

      NTFS

    • B. 

      FAT32

    • C. 

      FAT16

    • D. 

      FAT12

  • 2. 
    What type of attack occurs when an attacker can force a router to stop forwarding packets by flooding the router with many open connections simultaneously so that all the hosts behind the router are effectively disabled?
    • A. 

      Digital Attack

    • B. 

      Denial-of-Service (DoS)

    • C. 

      Physical Attack

    • D. 

      ARP Redirect

  • 3. 
    When examining a file with a Hex Editor, what space does the file header occupy?
    • A. 

      The last several bytes of the file

    • B. 

      The first several bytes of the file

    • C. 

      None, file headers are contained in the FAT

    • D. 

      One byte at the beginning of the file

  • 4. 
    In the context of the file deletion process, which of the following statements holds TRUE?
    • A. 

      When files are deleted, the data is overwritten and the cluster marked as available

    • B. 

      The longer a disk is in use, the less likely it is that deleted files will be overwritten

    • C. 

      While booting, the machine may create temporary files that can delete evidence

    • D. 

      Secure delete programs work by completely overwriting the file in one go

  • 5. 
    A suspect is accused of violating the acceptable use of computing resources, as he has visited adult websites and downloaded images. The investigator wants to demonstrate that the suspect did indeed visit these sites. However, the suspect has cleared the search history and emptied the cookie cache. Moreover, he has removed any images he might have downloaded. What can the investigator do to prove the violation?
    • A. 

      Image the disk and try to recover deleted files

    • B. 

      Seek the help of co-workers who are eye-witnesses

    • C. 

      Check the Windows registry for connection data (you may or may not recover)

    • D. 

      Approach the websites for evidence

  • 6. 
    A ________________ is one whereby by a computer program rather than a hacker performs the steps in the attack sequence.
    • A. 

      Blackout attack

    • B. 

      Automated attack

    • C. 

      Distributed attack

    • D. 

      Central processing attack

  • 7. 
    The offset in a hexadecimal code is:
    • A. 

      The last byte after the colon

    • B. 

      The 0x at the beginning of the code

    • C. 

      The 0x at the end of the code

    • D. 

      The first byte after the colon

  • 8. 
    It takes _____________ mismanaged case/s to ruin your professional reputation as a computer forensics examiner?
    • A. 

      By law, three

    • B. 

      Quite a few

    • C. 

      Only one

    • D. 

      At least two

  • 9. 
    With the standard Linux second extended file system (Ext2FS), a file is deleted when the inode internal link count reaches ________.
    • A. 

      0

    • B. 

      10

    • C. 

      100

    • D. 

      1

  • 10. 
    When examining the log files from a Windows IIS Web Server, how often is a new log file created?
    • A. 

      The same log is used at all times

    • B. 

      A new log file is created everyday

    • C. 

      A new log file is created each week

    • D. 

      A new log is created each time the Web Server is started

  • 11. 
    Which part of the Windows Registry contains the user's password file?
    • A. 

      HKEY_LOCAL_MACHINE

    • B. 

      HKEY_CURRENT_CONFIGURATION

    • C. 

      HKEY_USER

    • D. 

      HKEY_CURRENT_USER

  • 12. 
    An employee is attempting to wipe out data stored on a couple of compact discs (CDs) and digital video discs (DVDs) by using a large magnet. You inform him that this method will not be effective in wiping out the data because CDs and DVDs are ______________ media used to store large amounts of data and are not affected by the magnet.
    • A. 

      Logical

    • B. 

      Anti-magnetic

    • C. 

      Magnetic

    • D. 

      Optical

  • 13. 
    Lance wants to place a honeypot on his network. Which of the following would be your recommendations?
    • A. 

      Use a system that has a dynamic addressing on the network

    • B. 

      Use a system that is not directly interacting with the router

    • C. 

      Use it on a system in an external DMZ in front of the firewall

    • D. 

      It doesn't matter as all replies are faked

  • 14. 
    What does the acronym POST mean as it relates to a PC?
    • A. 

      Primary Operations Short Test

    • B. 

      Power-On Self Test

    • C. 

      Pre-Operational Situation Test

    • D. 

      Primary Operating System Test

  • 15. 
    E-mail logs contain which of the following information to help you in your investigation? (Choose four.)
    • A. 

      User account that was used to send the account

    • B. 

      Attachments sent with the e-mail message

    • C. 

      Unique message identifier

    • D. 

      Contents of the e-mail message

    • E. 

      Date and time the message was sent

  • 16. 
    In a forensic examination of hard drives for digital evidence, what type of user is most likely to have the most file slack to analyze?
    • A. 

      One who has NTFS 4 or 5 partitions

    • B. 

      One who uses dynamic swap file capability

    • C. 

      One who uses hard disk writes on IRQ 13 and 21

    • D. 

      One who has lots of allocation units per block or cluster

  • 17. 
    In what way do the procedures for dealing with evidence in a criminal case differ from the procedures for dealing with evidence in a civil case?
    • A. 

      Evidence must be handled in the same way regardless of the type of case

    • B. 

      Evidence procedures are not important unless you work for a law enforcement agency

    • C. 

      Evidence in a criminal case must be secured more tightly than in a civil case

    • D. 

      Evidence in a civil case must be secured more tightly than in a criminal case

  • 18. 
    You are assigned to work in the computer forensics lab of a state police agency. While working on a high profile criminal case, you have followed every applicable procedure, however your boss is still concerned that the defense attorney might question whether evidence has been changed while at the lab. What can you do to prove that the evidence is the same as it was when it first entered the lab?
    • A. 

      Make an MD5 hash of the evidence and compare it with the original MD5 hash that was taken when the evidence first entered the lab

    • B. 

      Make an MD5 hash of the evidence and compare it to the standard database developed by NIST

    • C. 

      There is no reason to worry about this possible claim because state labs are certified

    • D. 

      Sign a statement attesting that the evidence is the same as it was when it entered the lab

  • 19. 
     
    • A. 

      Disallow UDP 53 in from outside to DNS server

    • B. 

      Allow UDP 53 in from DNS server to outside

    • C. 

      Disallow TCP 53 in from secondaries or ISP server to DNS server

    • D. 

      Block all UDP traffic

  • 20. 
    When monitoring for both intrusion and security events between multiple computers, it is essential that the computers' clocks are synchronized. Synchronized time allows an administrator to reconstruct what took place during an attack against multiple computers. Without synchronized time, it is very difficult to determine exactly when specific events took place, and how events interlace. What is the name of the service used to synchronize time among multiple computers?
    • A. 

      Universal Time Set (UTS)

    • B. 

      Network Time Protocol (NTP)

    • C. 

      SyncTime Service (STS)

    • D. 

      Time-Sync Protocol (TSP)

  • 21. 
    When investigating a potential e-mail crime, what is your first step in the investigation?
    • A. 

      Trace the IP address to its origin

    • B. 

      Write a report

    • C. 

      Determine whether a crime was actually committed

    • D. 

      Recover the evidence

  • 22. 
    If a suspect computer is located in an area that may have toxic chemicals, you MUST:
    • A. 

      Coordinate with the HAZMAT team

    • B. 

      Determine a way to obtain the suspect computer

    • C. 

      Assume the suspect machine is contaminated

    • D. 

      Do not enter alone

  • 23. 
    The following excerpt is taken from a honeypot log. The log captures activities across three days. There are several intrusion attempts; however only a few are successful. (Note: The objective of this question is to test whether the student can read basic information from log entries and interpret the nature of the attack.)
    • A. 

      An IDS evasion technique

    • B. 

      A buffer overflow attempt

    • C. 

      A DNS zone transfer

    • D. 

      Data being retrieved from 63.226.81.13

  • 24. 
    What happens when a file is deleted by a Microsoft operating system using the FAT file system?
    • A. 

      Only the reference to the file is removed from the FAT

    • B. 

      The file is erased and cannot be recovered

    • C. 

      A copy of the file is stored and the original file is erased

    • D. 

      The file is erased but can be recovered

  • 25. 
    The following excerpt is taken from a honeypot log that was hosted at lab.wiretrip.net. Snort reported Unicode attacks from 213.116.251.162. The File Permission Canonicalization vulnerability (UNICODE attack) allows scripts to be run in arbitrary folders that do not normally have the right to run scripts. The attacker tries a Unicode attack and eventually succeeds in displaying boot.ini. He then switches to playing with Microsoft’s Remote Desktop Services (RDS), via msadcs.dll. The RDS vulnerability allows a malicious user to construct SQL statements that will execute shell commands (such as CMD.EXE) on the IIS server. He does a quick query to discover that the directory exists, and a query to msadcs.dll shows that it is functioning correctly. The attacker makes an RDS query which results in the commands run as shown below. What can you infer from the exploit given?
    • A. 

      It is a local exploit where the attacker logs in using username johna2k

    • B. 

      There are two attackers on the system - johna2k and haxedj00

    • C. 

      The attack is a remote exploit and the hacker downloads three files

    • D. 

      The attacker is unsuccessful in spawning a shell as he has specified a high end UDP port

Back to Top Back to top