The investigator is looking to detect something after the incident has...
This is used to perform a Quick Analysis of a crash dump file.
Shamika is the VP of Technology at XYZ, Inc. She suspects that...
This law subsection covers child pornography.
This displays all commands stored in memory.
An internal investigation, undertaken by an organization, to...
This type of warrant is used to get records from service providers.
This type of attack is a combination of both a brute force attack and...
The $l file contains all of the following EXCEPT:
Simple, sequential, flat files of a data set is called:
Johnny has been with the DEA for 17 years. He shows up on the...
This file system uses journaling.
The zz in exhibit numbering stands for:
The attorney that calls the witness to the stand is asking the...
In this stage of the Linux boot process, information is retrieved from...
This approach monitors a computer and user's behavior for...
The Master Boot Record (MBR) starts at this sector.
The attorney that called the witness to the stand is asking the...
This is the person initiating a lawsuit.
In a deposition, the following is true:
These are bootloaders for Linux.
An investigator needs to jailbreak an iOS phone.
This type of analysis is ongoing and returns simultaneously, so that...
UTC stands for which of the following:
Tanisha wants to recover files with their original file name....
Misuse of a work computer generally can lead to this type of...
Object Linking and Embedding is not used by:
The forensic investigator uses this command to see what sessions are...
This tool can be used to display details about GPT partition tables in...
This Federal statute covers child pornography
This person provides legal advice about the investigation and any...
How can you find scheduled and unscheduled tasks on the local host?
GIF has how many bits per pixel
A computer forensics lab should have windows all around the perimeter.
This rule governs proceedings in the courts of the United States.
In FAT, the first letter of the deleted file name is replaced with:
Tasha is looking for the UEFI phase that involves clearing UEFI from...
This does not use OLE.
Which of the following is not a benefit of cloud computing?
A warrantless seizure of digital evidence is used when:
You can detect Trojans with which of the following?
A deposition is different from a regular trial in that:
This is an IDS:
MIME stream is found:
This extracts data contained from an internet traffic capture
The first file system developed for Linux in 1992 was:
Google Drive Configuration files are stored at this path:
Cisco shows this: %SEC-6-IPACCESSLOGP
This Android library is used to render 2D (SGL) or 3D (OpenGL/ES)...
Sectors are how many bytes long.
The installation of Google Drive Client Version in Windows 10 creates...
POP3 is used for:
An investigator should use ______ imaging for copying data.
Google Drive logs are:
18 USC p1030 covers:
How many bits per pixel does GIF contain?
David needs a tool that contains an ISO image. He knows that...
UTC stands for:
When a file is deleted in FAT, the first letter of the deleted...
The nbtstat command can be used for:
Poor controls around passwords and accounts in general would be...
This verifies the file system integrity of a volume, fixes logical...
Which of the following is true regarding digital evidence?
This contains the manufacturer's information
This tool can recover all types of lost files from disk or removable...
For a router, the investigator should:
18 USC p 2252A covers
BigCHFIDog.com is an e-Commerce business with $500,000 in annual...
This tool can be used to restore emails
A report, presented orally, to a board of directors, jury, or managers...
These are saved in the installation folder in the user profile for...
This is a sequence of bytes, organized into blocks understandable by...
POP3 runs on port:
This tool restores deleted emails and email attachments
Paco needs to open an Android phone. He should use:
SMTP normally runs on this port:
Which Windows version boots in either UEFI-GPT or BIOS-MBR?
Keira is an investigator with the FBI that needs to recover lost files...
This is the starting point of a database.
Johnny has been caught with child porn. This investigation would...
What does ETI stand for?
A warrantless seizure can be used when
When a FAT file is deleted, what is placed at the front?
A deleted file in the Recycle Bin is named RIYH6VR.doc. This tells us:
This event correlation approach monitors computer and user behavior...
Stacey needs to crack a Windows password. She can use which tool...
This requires financial institutions to protect their customers'...
The Superblock in UFS has:
Dropbox Client path:
David needs to recover lost files from a USB flash drive. Which...
Circular, metal disks mounted into the drive enclosure are called:
In Windows Server 2012 (IIS), log files are stored at:
Scientific testimony.
Tools designated as software tools include all of the following...
The Daubert standard pertains to:
This tool displays details about GPT partition tables in Mac OS
This is wasted area of the disk cluster, lying between the end of the...
The attacker uses exploits to access other directories. This is...
This RAID level uses byte-level data striping across multiple drives...
Registry Editor
A Digital Forensic Investigator investigates this type of crime...
Nasir is needing to recover lost data from RAID. He knows that this...
Bob arrives on the scene of a large corporation after an...
John wants to root an Apple phone. Which tool should he use?
Tracked user activities can be found in this file:
John is a forensic investigator working on a case for a WHC...
This is used to render 2D (SGL) or 3D graphics to the screen.
CAN-SPAM requires senders to honor opt-out requests within:
This can do data acquisition and duplication.
All investigators keep track of the evidence path by using the:
A small law firm suspects an incident, where there was potential...
All of the following are Android rooting tools EXCEPT
A first responder secures the scene perimeter. This is:
David is looking for a tool that contains an ISO image, so he can burn...
This is part of Metasploit that can be used to hide data in the slack...
This mobile API provides telephony services, like making calls,...
This can be used to dump password hashes from the SAM file.
Which command can be used to look for suspicious connections and the...
This Tasklist command is used to run the command with the account...
Mila wants to boot with either BIOS-MBR or UEFI-GPT. Which...
UTC stands for:
System time is an example of non-volatile data.
ETI allows the investigator to:
Jamie is analyzing malware, but not executing it on his...
This standard defines the use for file systems of CD-ROM and DVD...
Jv16 can be used for
Rob wants to discover potential hidden information in an image...
This command can be used to see the names of all open shared files and...
James enjoys this tool that offers thumbnail previews
This is the smallest physical storage unit on the hard...
RAPID IMAGE 7020 X2 is designed to copy how many "Master" hard drives?
This file is found at...
In exhibit numbering, the zz is for:
CD-ROM/DVD standard.
Which is not a file system?
Rule 1003 covers:
An attacker is using every possible combination of characters to crack...
This is the Amendment that protects again unlawful search and seizure.
This can be used for Last access time change in Windows 10.
Phil is a digital forensic investigator that needs to obtain...
The FBI is investigating Sally for hacking her school's...
Stacey wants to obtain data from social media websites. Which...
Jv16 tool is used for
What is not one of the MS Exchange archive data files?
Jonathan is an investigator, but he is not the first one on the...
Intel is to EFI as PowerPC is to:
Used for registry and not malware installation file analysis.
This tool is used to open registry hives
This tool can be used to restore emails.
These determine the sector addressing for individual sectors on a...
Opposing attorney, that did not call the witness to the stand, is...
This is a tool used for monitoring log files, produced by UNIX...
The img_stat command:
This can be used to detect Trojans.
Which of the following is a starting hex value of an image file:
This contains the configuration information related to the user...
The insider threat caused a lot of chaos. Sally, the digital...
In FHS, essential user command binaries are in this.
Sara is investigating an incident and needs to display information...
You can use this to see the last access time change for win10
You can view DBX files in:
Lenny needs to reset an Administrator password in order to access a...
Show active network connections with this:
This requires Federal agencies to develop, document, and implement...
This has journaling:
Julie wants to use an open-source format. What should she...
Sally is an investigator working for Diamond Corp. She needs to...
In Windows 7, deleted files are named $Ry.ext, where the y stands for...
Internal server error is error code:
Sara is an Assistant U.S. Attorney. She knows that this rule...
A boot from restarting the OS is considered:
All of the following are Registry tools EXCEPT:
This saves data about programs, so programs load faster at boot:
Roberta suspects the company's network has been compromised. How...
David has been called to the stand to offer scientific...
Tools involved in Hashing include all of the following EXCEPT:
Data rescue 4 is:
Windows Event Log text file output format is:
Which one do you like?
Which wondows version can use uefi-gpt or bios-mbr
Richard wants to look for unusual network services. What command...
The max single file size in EXT3 is
Which of the following is known for providing quick and deep scanning?
Jamie needs a tool that can recover files with their original file...
The IMEI is obtained with:
This command can be used to obtain details about partitions.
This tool can be used to recover lost data from RAID and hard drives:
$Bitmap is in:
In ISO 9660, what two file systems add more descriptors to the...
William needs a tool that can allow him to specify a specific file...
A hacker commits a DDoS attack against a specific IP address of a...
What file type is this? FF D8 FF E1
____ launched the CFTT.
This is a network sniffer that can support several hundred network...
The first __ bits of the ESN is the manufacturer's code
This is a tool for Mac OS
In Windows 98 and earlier, deleted files are named in Dxy.ext...
Jason is an investigator with over 10 years of experience. He...
Sara wants to perform a deep scan that scans the entire system. ...
HFS+ uses: