Windows Networking & Computer Fundamentals Exercises Solutions Quiz

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Tui
T
Tui
Community Contributor
Quizzes Created: 1 | Total Attempts: 584
| Attempts: 584 | Questions: 200
Please wait...
Question 1 / 200
0 %
0/100
Score 0/100
1. This ISO standard defines file systems and protocols for exchanging data between optical disks. What is it?

Explanation

ISO 9660 is the correct answer because it is an ISO standard that specifically defines file systems and protocols for exchanging data between optical disks. ISO/IEC 13940 and ISO 9060 are not relevant to this topic, and IEC 3490 is not an ISO standard.

Submit
Please wait...
About This Quiz
Windows Networking & Computer Fundamentals Exercises Solutions Quiz - Quiz

Attempt this 'Windows Networking & Computer Fundamentals Exercises Solutions' quiz and evaluate yourself whether you're a true computer genius or not. This quiz covers almost every topic related... see moreto computers, including windows, the internet, networking, system drives, cyber security, and many more. If you consider yourself a true computer engineer or an expert when it comes to computers, you should really play the quiz and assess yourself. The test becomes tougher after every question. So, go ahead and try to score at least 75 percent! Good luck! see less

2. The MD5 program is used to:

Explanation

The MD5 program is used to verify that a disk is not altered when you examine it. MD5 (Message Digest Algorithm 5) is a widely used cryptographic hash function that produces a unique hash value for a given input. By comparing the hash value of a disk before and after examination, you can determine if any changes or alterations have been made to the disk. This is important for ensuring the integrity and authenticity of the evidence on the disk.

Submit
3. Which of the following tasks DOES NOT come under the investigation phase of a cybercrime forensics investigation case?

Explanation

During the investigation phase of a cybercrime forensics investigation case, various tasks are performed to gather evidence and analyze data. Data collection involves gathering relevant information and evidence related to the cybercrime. Secure the evidence involves ensuring the preservation and protection of the collected evidence to maintain its integrity. Data analysis involves examining and interpreting the collected data to identify patterns, anomalies, and other important information. However, the first response is not a task that falls under the investigation phase. The first response refers to the initial actions taken immediately after the detection of a cybercrime, such as reporting the incident and securing the affected systems.

Submit
4. When monitoring for both intrusion and security events between multiple computers, it is essential that the computers' clocks are synchronized. Synchronized time allows an administrator to reconstruct what took place during an attack against multiple computers. Without synchronized time, it is very difficult to determine exactly when specific events took place, and how events interlace. What is the name of the service used to synchronize time among multiple computers?

Explanation

The correct answer is Network Time Protocol. Network Time Protocol (NTP) is a service used to synchronize time among multiple computers. It ensures that the clocks of different computers are aligned, allowing administrators to accurately reconstruct events during an attack or security incident. Without synchronized time, it becomes challenging to determine the exact timing and sequence of events.

Submit
5. Stephen is checking an image using Compare Files by The Wizard, and he sees the file signature is shown as FF D8 FF E1. What is the file type of the image?

Explanation

The file signature FF D8 FF E1 corresponds to the file type JPEG. File signatures are unique sequences of bytes that help identify the file type. In this case, the given file signature matches the signature commonly associated with JPEG files, indicating that the image Stephen is checking is in JPEG format.

Submit
6. What is one method of bypassing a system BIOS password?

Explanation

Removing the CMOS battery is one method of bypassing a system BIOS password. The CMOS battery is responsible for powering the CMOS chip, which stores the BIOS settings. By removing the battery, the power to the CMOS chip is cut off, causing it to lose all the stored settings, including the BIOS password. This allows the user to bypass the password and access the BIOS settings without entering the correct password.

Submit
7. Billy, a computer forensics expert, has recovered a large number of DBX files during the forensic investigation of a laptop. Which of the following email clients can he use to analyze the DBX files?

Explanation

Billy, as a computer forensics expert, can use Microsoft Outlook Express to analyze the DBX files. DBX files are associated with Microsoft Outlook Express, which was a popular email client in the past. Therefore, it would be the most suitable choice for analyzing the recovered DBX files.

Submit
8. Daryl, a computer forensics investigator, has just arrived at the house of an alleged computer hacker. Daryl takes pictures and tags all computer and peripheral equipment found in the house. Daryl packs all the items found in his van and takes them back to his lab for further examination. At his lab, Michael his assistant helps him with the investigation. Since Michael is still in training, Daryl supervises all of his work very carefully. Michael is not quite sure about the procedures to copy all the data off the computer and peripheral devices. How many data acquisition tools should Michael use when creating copies of the evidence for the investigation?

Explanation

Michael should use two data acquisition tools when creating copies of the evidence for the investigation. This is because it is important to have redundancy and ensure that the evidence is properly preserved. By using two tools, Michael can create two separate copies of the data, which can be compared to ensure accuracy and integrity. Additionally, having two copies provides a backup in case one of the copies becomes corrupted or compromised. Therefore, using two data acquisition tools is the best practice in this situation.

Submit
9. It takes            mismanaged case/s to ruin your professional reputation as a computer forensics examiner?

Explanation

It only takes one mismanaged case to ruin your professional reputation as a computer forensics examiner. This means that even a single instance of mishandling a case can have a significant impact on your reputation in the field. It highlights the importance of being diligent and thorough in conducting computer forensic examinations to maintain professional integrity.

Submit
10. You are a security analyst performing reconnaissance on a company you will be carrying out a penetration test for. You conduct a search for IT jobs on Dice.com and find the following information for an open position: 7+ years experience in Windows Server environment 5+ years experience in Exchange 2000/2003 environment Experience with Cisco Pix Firewall, Linksys 1376 router, Oracle 11i and MYOB v3.4 Accounting software are required MCSA desired, MCSE, CEH preferred No Unix/Linux Experience needed What is this information posted on the job website considered?

Explanation

The given information on the job website is considered as an information vulnerability because it provides details about the company's IT infrastructure, including specific technologies and software used. This information can be valuable to potential attackers as it gives insight into the company's systems and can be used to exploit any vulnerabilities or weaknesses.

Submit
11. In a computer forensics investigation, what describes the route that evidence takes from the time you find it until the case is closed or goes to court?

Explanation

Chain of custody refers to the documentation and procedures that ensure the integrity and reliability of evidence in a legal investigation. It involves maintaining a detailed record of the possession, handling, and transfer of evidence from the time it is collected until it is presented in court. This ensures that the evidence is not tampered with or compromised, and establishes its authenticity and admissibility in court. The chain of custody is crucial in computer forensics investigations to maintain the integrity of digital evidence and to establish its reliability in court.

Submit
12. When carrying out a forensics investigation, why should you never delete a partition on a dynamic disk?

Explanation

Deleting a partition on a dynamic disk can corrupt the disk because dynamic disks use a complex disk management system that relies on metadata stored on the disk. Deleting a partition can disrupt this system and cause data loss or corruption. It is important to avoid deleting partitions on dynamic disks during a forensics investigation to preserve the integrity of the disk and any potential evidence it may contain.

Submit
13. You have been asked to investigate after a user has reported a threatening e-mail they have received from an external source. Which of the following are you most interested in when trying to trace the source of the message?

Explanation

When trying to trace the source of a threatening email, the most important piece of information to investigate is the email header. The email header contains metadata about the email, including the sender's IP address, the route the email took to reach its destination, and other identifying information. By analyzing the email header, it is possible to track the source of the email and gather evidence for further investigation. The X509 Address, SMTP reply Address, and Host Domain Name may provide some information, but they are not as crucial as the email header in identifying the source of the threatening email.

Submit
14. What method of copying should always be performed first before carrying out an investigation?

Explanation

A bit-stream copy should always be performed first before carrying out an investigation. This method copies the entire contents of a storage device, including the data and any hidden or deleted files. It creates an exact replica of the original device, preserving all the data and metadata. By performing a bit-stream copy, investigators can ensure that the original evidence remains intact and unaltered, allowing for a thorough examination without the risk of data loss or corruption.

Submit
15. In conducting a computer abuse investigation you become aware that the suspect of the investigation is using ABC Company as his Internet Service Provider (ISP). You contact ISP and request that they provide you assistance with your investigation. What assistance can the ISP provide?

Explanation

The correct answer is that the ISP can investigate computer abuse committed by their employees, but must preserve the privacy of their customers and therefore cannot assist without a warrant. This means that while the ISP can help with the investigation, they cannot provide assistance without proper legal authorization such as a warrant. This is to ensure that the privacy rights of their customers are protected.

Submit
16. When performing a forensics analysis, what device is used to prevent the system from recording data on an evidence disk?

Explanation

A write-blocker is used in forensics analysis to prevent the system from recording data on an evidence disk. This device ensures that no changes or modifications are made to the data on the disk, preserving its integrity and preventing any potential tampering. By blocking write commands, the write-blocker allows investigators to safely examine and analyze the data on the evidence disk without altering it in any way.

Submit
17. Which one do you like?

Explanation

RAID Level 5 is the correct answer because it provides both data striping and parity information across multiple drives. This level offers a good balance between performance and data redundancy, as it can sustain the failure of one drive without losing any data. The parity information allows for data reconstruction in case of a drive failure, making RAID Level 5 a reliable choice for data storage and protection.

Submit
18. Which of the following protocols allows non-ASCII files, such as video, graphics, and audio, to be sent through the email messages?

Explanation

MIME (Multipurpose Internet Mail Extensions) is a protocol that allows non-ASCII files, such as video, graphics, and audio, to be sent through email messages. It extends the capabilities of email by encoding these files into ASCII format, which can be transmitted over the internet. This ensures that the files can be properly understood and displayed by different email clients and systems. BINHEX, UT-16, and UUCODE are not specifically designed for handling non-ASCII files in email messages.

Submit
19. You are working as an independent computer forensics investigator and received  a  call  from  a  systems  administrator  for  a  local  school system requesting your assistance. One of the students at the local high school is suspected of downloading inappropriate images from the Internet to a PC in the Computer Lab. When you arrive at the school, the systems administrator hands you a hard drive and tells you that he   made a "simple backup copy" of the hard drive in the PC and put it on this drive and requests that you examine the drive for evidence of the suspected images. You inform him that a "simple backup copy" will not provide deleted files or recover file fragments. What type of copy do you need to make to ensure that the evidence found is complete and admissible in future proceeding?

Explanation

A bit-stream copy is needed to ensure that the evidence found is complete and admissible in future proceedings. A bit-stream copy is a sector-by-sector copy of the entire hard drive, including all data, deleted files, and file fragments. This type of copy preserves the integrity of the original drive and allows for a thorough examination of the evidence without altering or modifying any data. It is the most reliable and comprehensive method for forensic analysis in this situation.

Submit
20. You have been asked to investigate the possibility of computer fraud in the finance department of a company. It is suspected that a staff member has been committing finance fraud by printing cheques that have not been authorized. You have exhaustively searched all data files on a bitmap image of the target computer, but have found no evidence. You suspect the files may not have been saved. What should you examine next in this case?

Explanation

The swap file should be examined next in this case because it is a temporary storage area on the computer's hard drive where data is stored when there is not enough RAM available. It is possible that the staff member may have saved or temporarily stored evidence of the finance fraud in the swap file, especially if they were trying to hide it. Therefore, examining the swap file may provide valuable information or evidence that was not found in the data files on the bitmap image of the target computer.

Submit
21. Which of the following technique creates a replica of an evidence media?

Explanation

Bit Stream Imaging is a technique that creates a complete and exact replica of an evidence media. It captures every bit and byte of data, including deleted and hidden files, as well as the file system structure. This ensures that the integrity of the original evidence is preserved, allowing for a thorough analysis without altering or damaging the original data. Backup, Data Extraction, and Data Deduplication do not create a complete replica of the evidence media, making Bit Stream Imaging the correct answer.

Submit
22. Which of the following Android libraries are used to render 2D (SGL) or 3D (OpenGL/ES) graphics content to the screen?

Explanation

OpenGL/ES and SGL are the Android libraries used to render 2D or 3D graphics content to the screen. OpenGL/ES is a widely used graphics API that allows developers to create high-performance 2D and 3D graphics on Android devices. SGL (Software Graphics Library) is a software-based rendering library that provides a fallback option for devices that do not support hardware acceleration. Together, these libraries enable developers to create visually appealing and interactive graphics on Android devices.

Submit
23. _______________ is simply the application of Computer Investigation and analysis techniques in the interests of determining potential legal evidence.

Explanation

Computer Forensics is the correct answer because it involves the use of computer investigation and analysis techniques to uncover potential legal evidence. This field focuses on gathering and analyzing digital evidence from computers, networks, and other digital devices in order to support legal investigations or proceedings. Computer Forensics professionals use specialized tools and techniques to preserve, extract, and analyze data from digital devices, ensuring that the evidence remains admissible in court.

Submit
24. Which of the following attack uses HTML tags like <script></script>?

Explanation

XSS attack uses HTML tags like to inject malicious scripts into a website or web application. These scripts can be used to steal sensitive information, manipulate website content, or redirect users to malicious websites. Phishing, SQL injection, and spam attacks do not specifically rely on HTML tags for their execution.

Submit
25. On an Active Directory network using NTLM authentication, where on the domain controllers are the passwords stored?

Explanation

In an Active Directory network using NTLM authentication, the passwords are stored in the Security Account Manager (SAM) database on the domain controllers. The SAM database is a registry file that contains user account information, including usernames and password hashes. This database is used for local authentication and security policies on the domain controllers.

Submit
26. CAN-SPAM act requires that you:

Explanation

The correct answer is "Don't use deceptive subject lines." The CAN-SPAM act is a law that regulates commercial email messages. It requires that email marketers do not use deceptive subject lines to mislead or trick recipients into opening their emails. This is to ensure transparency and honesty in email marketing practices. The other options listed are not accurate requirements of the CAN-SPAM act.

Submit
27. What does the acronym POST mean as it relates to a PC?

Explanation

The acronym POST stands for PowerOn Self Test. This test is performed by a computer when it is powered on to check if all the hardware components are functioning properly. It checks the memory, keyboard, hard drive, and other essential components. If any issues are detected during the POST, the computer may display error messages or emit beep codes to indicate the problem. The POST is an important diagnostic tool that helps identify hardware failures and ensures that the computer is in a good operational state before the operating system is loaded.

Submit
28. To make sure the evidence you recover and analyze with computer forensics software can be admitted in court, you must test and validate the software. What group is actively providing tools and creating procedures for testing and validating computer forensics software?

Explanation

The National Institute of Standards and Technology (NIST) is actively providing tools and creating procedures for testing and validating computer forensics software. This ensures that the evidence recovered and analyzed using the software can be admitted in court.

Submit
29. You are running known exploits against your network to test for possible vulnerabilities. To test the strength of your virus software, you load a test network to mimic your production network. Your software successfully blocks some simple macro and encrypted viruses. You decide to really test the software by using virus code where the code rewrites itself entirely and the signatures change from child to child, but the functionality stays the same. What type of virus is this that you are testing?

Explanation

The type of virus being tested in this scenario is a metamorphic virus. This type of virus is able to rewrite its own code completely, changing its signatures from child to child while maintaining the same functionality. This makes it difficult for antivirus software to detect and block the virus, as the signatures keep changing.

Submit
30. Which of the following should a computer forensics lab used for investigations have?

Explanation

A computer forensics lab should have restricted access to ensure the security and integrity of the investigations. This means that only authorized personnel should be allowed to enter the lab, minimizing the risk of tampering or unauthorized access to the evidence. Restricted access helps maintain the chain of custody and ensures that the evidence collected is admissible in court. It also helps protect the lab from potential threats or breaches that could compromise the investigations.

Submit
31. Andie, a network administrator, suspects unusual network services running on a windows system. Which of the following commands should he use to verify unusual network services started on a Windows system?

Explanation

The correct answer is "net start". This command is used to display a list of running services on a Windows system. By using this command, Andie can verify if there are any unusual network services running on the system.

Submit
32. Which of the following is a database in which information about every file and directory on an NT File System (NTFS) volume is stored?

Explanation

The Master File Table (MFT) is a database in which information about every file and directory on an NT File System (NTFS) volume is stored. It acts as a directory for the file system, keeping track of the location and metadata of each file and directory on the volume. The MFT is a crucial component of the NTFS file system and is used by the operating system to access and manage files and directories efficiently.

Submit
33. Which one of the following is not a first response procedure?

Explanation

The correct answer is "Crack passwords" because it is not a first response procedure. First response procedures typically involve actions that are immediate and necessary to preserve evidence or secure a scene. Preserving volatile data, filling forms, and taking photos are all examples of first response procedures that help in documenting and securing the evidence. However, cracking passwords is a more advanced and time-consuming process that typically occurs after the initial response and is not considered a first response procedure.

Submit
34. What is the name of the Standard Linux Command that is also available as windows application that can be used to create bit-stream images?

Explanation

The correct answer is "dd". The dd command is a standard Linux command that is also available as a Windows application. It can be used to create bit-stream images.

Submit
35. What type of attack occurs when an attacker can force a router to stop forwarding packets by flooding the router with many open connections simultaneously so that all the hosts behind the router are effectively disabled?

Explanation

A denial of service attack occurs when an attacker floods a router with numerous open connections simultaneously, causing the router to stop forwarding packets. This overwhelms the router's resources and prevents it from functioning properly, effectively disabling all the hosts behind the router.

Submit
36. Madison is on trial for allegedly breaking into her university internal network. The police raided her dorm room and seized all of her computer equipment. Madison lawyer is trying to convince the judge that the seizure was unfounded and baseless. Under which US Amendment is Madison lawyer trying to prove the police violated?

Explanation

Madison's lawyer is trying to prove that the police violated the 4th Amendment. This amendment protects individuals from unreasonable searches and seizures by the government. The lawyer is arguing that the police raid and seizure of Madison's computer equipment was unfounded and baseless, meaning it was not supported by probable cause or a valid warrant. By invoking the 4th Amendment, the lawyer is asserting that Madison's rights were violated and the evidence obtained should be excluded from the trial.

Submit
37. Which of the following files stores information about local Dropbox installation and account, email IDs linked with the account, current version/build for the local application, the hostjd, and local path information?

Explanation

The file "config.db" stores information about the local Dropbox installation and account, email IDs linked with the account, current version/build for the local application, the host ID, and local path information.

Submit
38. Which code does the FAT file system use to mark the file as deleted?

Explanation

The FAT file system uses the code E5H to mark a file as deleted. This code is used as a placeholder in the file allocation table to indicate that the file has been deleted and its space is now available for reuse. When a file is deleted, the first character of its file name is replaced with E5H to indicate its deletion status. This allows the file system to keep track of available space and manage file allocation efficiently.

Submit
39. What value of the "Boot Record Signature" is used to indicate that the boot-loader exists?

Explanation

The value "AA55" is used as the "Boot Record Signature" to indicate that the boot-loader exists. This value is commonly found in the last two bytes of the boot sector of a disk. It serves as a marker for the boot-loader program, allowing the system to recognize and execute it during the boot process.

Submit
40. To preserve digital evidence, an investigator should .

Explanation

Making two copies of each evidence item using different imaging tools is the best practice for preserving digital evidence. This ensures redundancy and reduces the risk of data loss or corruption. By using different imaging tools, any potential errors or limitations of a single tool can be mitigated. Additionally, having multiple copies allows for verification and comparison of the evidence to ensure its integrity. Storing only the original evidence item is not sufficient as it leaves no room for error or loss of the data.

Submit
41. Which one d Netstat is a tool for collecting information regarding network connections. It provides a simple view of TCP and UDP connections, and their state and network traffic statistics. Which of the following commands shows you the TCP and UDP network connections, listening ports, and the identifiers?

Explanation

The correct answer is "netstat - ano" because the "-ano" option in the netstat command displays all active TCP and UDP connections, listening ports, and the associated process identifiers (PID) for each connection. This allows the user to identify which processes are using specific network connections.

Submit
42. An expert witness is a    _______________ who is normally appointed by a party to assist the formulation and preparation of a party's claim or defense.

Explanation

An expert witness is a subject matter specialist who is appointed by a party to assist in formulating and preparing their claim or defense. This individual has specialized knowledge and expertise in a specific field relevant to the case and provides their professional opinion and analysis to support the party's position. Their role is to provide expert testimony based on their expertise and assist the court in understanding complex technical or scientific matters.

Submit
43. Which of the following is NOT a graphics file?

Explanation

The file extension ".nfo" is typically associated with text files that contain information or documentation about a software program. It is not typically used for graphics files. Therefore, "Picture3.nfo" is not a graphics file.

Submit
44. Which of the following file system uses Master File Table (MFT) database to store information about every file and directory on a volume?

Explanation

NTFS File System uses Master File Table (MFT) database to store information about every file and directory on a volume. MFT is a special file that contains metadata for all files and directories, including their names, size, attributes, and location on the disk. This allows for efficient and organized storage and retrieval of file system information.

Submit
45. When marking evidence that has been collected with the aa/ddmmyy/nnnn/zz format, what does the nnn denote?

Explanation

The nnn in the aa/ddmmyy/nnnn/zz format denotes the sequential number of the exhibits seized. This number is used to differentiate between different pieces of evidence that have been collected as part of the same exhibit.

Submit
46. What advantage does the tool Evidor have over the built-in Windows search?

Explanation

Evidor has an advantage over the built-in Windows search because it can search slack space. Slack space is the unused space between the end of a file and the end of the cluster it occupies on a hard drive. Evidor is able to search and retrieve data from this slack space, which can be useful in forensic investigations or recovering deleted or hidden files. The built-in Windows search does not have this capability.

Submit
47. Jacob is a computer forensics investigator with over 10 years experience in investigations and has written over 50 articles on computer forensics. He has been called upon as a qualified witness to testify the accuracy and integrity of the technical log files gathered in an investigation into computer fraud. What is the term used for Jacob testimony in this case?

Explanation

The term used for Jacob's testimony in this case is "authentication." This is because Jacob is testifying to the accuracy and integrity of the technical log files gathered in the investigation, which is a process of verifying the authenticity of evidence.

Submit
48. At what layer of the OSI model do routers function on?

Explanation

Routers function at the network layer (layer 3) of the OSI model. The network layer is responsible for logical addressing and routing of data packets between different networks. Routers use IP addresses to determine the best path for forwarding packets to their destination across multiple networks. They make decisions based on network layer information such as IP addresses and routing tables.

Submit
49. Which of the following email headers specifies an address for mailer-generated errors, like "no such user" bounce messages, to go to (instead of the sender's address)?

Explanation

The Errors-To header specifies an address for mailer-generated errors to be sent to, instead of the sender's address. This header is used to direct bounce messages, such as "no such user" errors, to a specific email address.

Submit
50. Which of the following files DOES NOT use Object Linking and Embedding (OLE) technology to embed and link to other objects?

Explanation

The Portable Document Format (PDF) does not use Object Linking and Embedding (OLE) technology to embed and link to other objects. OLE is a technology that allows objects from different applications to be linked and embedded within a document. However, PDF is a file format that is independent of any specific software or application and does not support OLE. Therefore, it does not use OLE technology to embed and link to other objects.

Submit
51. Shane, a forensic specialist, is investigating an ongoing attack on a MySQL database server hosted on a Windows machine with SID "WIN- ABCDE12345F." Which of the following log file will help Shane in tracking all the client connections and activities performed on the database server?

Explanation

The log file with the name "WIN-ABCDE12345F.log" will help Shane in tracking all the client connections and activities performed on the database server.

Submit
52. The newer Macintosh Operating System is based on

Explanation

The newer Macintosh Operating System is based on BSD Unix. BSD Unix is a Unix-like operating system that was developed at the University of California, Berkeley. It is known for its stability, security, and scalability. Apple adopted BSD Unix as the foundation for their Macintosh Operating System, incorporating its features and functionalities into their own operating system. This decision has allowed Mac OS to benefit from the robustness and reliability of BSD Unix, making it a popular choice among users.

Submit
53. When a file is deleted by Windows Explorer or through the MS-DOS delete command, the operating system inserts    ____________  in the first letter position of the filename in the FAT database.

Explanation

When a file is deleted by Windows Explorer or through the MS-DOS delete command, the operating system inserts the lowercase Greek Letter Sigma (s) in the first letter position of the filename in the FAT database.

Submit
54. The Recycle Bin exists as a metaphor for throwing files away, but it also allows a user to retrieve and restore files. Once the file is moved to the recycle bin, a record is added to the log file that exists in the Recycle Bin. Which of the following files contains records that correspond to each deleted file in the Recycle Bin?

Explanation

The correct answer is INFO2 because the question states that a record is added to the log file in the Recycle Bin when a file is moved there. Therefore, the log file that contains the records corresponding to each deleted file in the Recycle Bin would be INFO2.

Submit
55. One way to identify the presence of hidden partitions on a suspect's hard drive is to:

Explanation

To identify the presence of hidden partitions on a suspect's hard drive, one can add up the total size of all known partitions and compare it to the total size of the hard drive. If the total size of the known partitions is significantly smaller than the total size of the hard drive, it suggests the existence of hidden partitions. This is because hidden partitions are not visible or accounted for in the known partition sizes. Therefore, comparing the two sizes can help in detecting the presence of hidden partitions.

Submit
56. Jason discovered a file named $RIIYG6VR.doc in the C:\$Recycle.Bin\<USER SID>\ while analyzing a hard disk image for the deleted data. What inferences can he make from the file name?

Explanation

From the file name "$RIIYG6VR.doc" found in the recycle bin directory, Jason can infer that it is a deleted doc file.

Submit
57. What is cold boot (hard boot)?

Explanation

A cold boot, also known as a hard boot, refers to the process of starting a computer from a powered-down or off state. This means that the computer is completely shut down and then powered on again. It is different from restarting a computer that is already turned on through the operating system or restarting a computer that is in sleep mode. In a cold boot, the computer goes through the full startup process, including loading the operating system and initializing all hardware components.

Submit
58. What must an investigator do before disconnecting an iPod from any type of computer?

Explanation

Before disconnecting an iPod from any type of computer, an investigator must unmount the iPod. This is necessary to ensure that all data transfers and processes are completed and that the iPod is safely disconnected from the computer without causing any data loss or damage to the device.

Submit
59.  What happens when a file is deleted by a Microsoft operating system using the FAT file system?           

Explanation

When a file is deleted by a Microsoft operating system using the FAT file system, only the reference to the file is removed from the FAT. This means that the file is not completely erased from the storage device, but the operating system no longer recognizes it as an active file. However, the actual data of the file may still be present on the storage device and can potentially be recovered using specialized software or techniques.

Submit
60. Your company uses Cisco routers exclusively throughout the network. After securing the routers to the best of your knowledge, an outside security firm is brought in to assess the network security. Although they found very few issues, they were able to enumerate the model, OS version, and capabilities for all your Cisco routers with very little effort. Which feature will you disable to eliminate the ability to enumerate this information on your Cisco routers?

Explanation

The Cisco Discovery Protocol (CDP) is a proprietary protocol developed by Cisco that enables devices to discover and learn about each other on a local network. By disabling CDP, the outside security firm will no longer be able to easily enumerate the model, OS version, and capabilities of the Cisco routers. This helps to enhance network security by limiting the amount of information that can be gathered about the routers.

Submit
61. In handling computer-related incidents, which IT role should be responsible for recovery, containment, and prevention to constituents?

Explanation

The network administrator should be responsible for recovery, containment, and prevention to constituents in handling computer-related incidents. The network administrator is responsible for managing and maintaining the network infrastructure, including security measures. They have the technical expertise to identify and resolve network-related issues, implement security measures to prevent incidents, and contain and recover from any incidents that may occur. The security administrator may also play a role in incident response, but the network administrator is primarily responsible for these tasks.

Submit
62. Which of the following is a list of recently used programs or opened files?

Explanation

The correct answer is Most Recently Used (MRU). This is a list of recently used programs or opened files. It is a feature commonly found in operating systems and software applications that allows users to quickly access their most recently accessed files or programs without having to search for them manually. The MRU list is usually displayed in a menu or a sidebar, making it convenient for users to access their recently used items with just a few clicks.

Submit
63. How many possible sequence number combinations are there in TCP/IP protocol?

Explanation

The TCP/IP protocol uses a 32-bit sequence number field, which means there are 2^32 (4 billion) possible combinations. This allows for a large number of unique sequence numbers to be used in TCP/IP communication, ensuring reliable and ordered data transmission.

Submit
64. Diskcopy is:

Explanation

Diskcopy is a standard MS-DOS command. MS-DOS is an operating system developed by Microsoft for IBM-compatible personal computers. The diskcopy command is used to make a copy of an entire floppy disk onto another floppy disk. It is a built-in utility in MS-DOS and does not require any additional software or tools.

Submit
65. A small law firm located in the Midwest has possibly been breached by a computer hacker looking to obtain information on their clientele. The law firm does not have any on-site IT employees, but wants to search for evidence of the breach themselves to prevent any possible media attention. Why would this not be recommended?

Explanation

Searching can change date/time stamps. When searching for evidence of a breach, it is important to preserve the integrity of the data. Searching can potentially alter the date/time stamps associated with the files and make it difficult to establish a timeline of events. This can hinder the investigation and make it harder to determine the extent of the breach and the actions taken by the hacker. It is recommended to involve professionals with expertise in digital forensics to ensure that the investigation is conducted properly and the evidence is preserved accurately.

Submit
66. When obtaining a warrant, it is important to:

Explanation

When obtaining a warrant, it is important to particularly describe the place to be searched and particularly describe the items to be seized. This requirement ensures that the warrant is specific and does not give the authorities unlimited power to search any location or seize any item. By specifically describing the place and items, it provides a clear limit to the search and seizure, protecting individuals' rights and preventing potential abuse of power.

Submit
67. When making the preliminary investigations in a sexual harassment case, how many investigators are you recommended having?

Explanation

In a sexual harassment case, it is recommended to have two investigators during the preliminary investigations. This is because having two investigators allows for a more objective and unbiased investigation. It also ensures that multiple perspectives are considered and helps to prevent any potential conflicts of interest. Having two investigators can also help to ensure that all aspects of the case are thoroughly examined and that no important details are overlooked.

Submit
68. On Linux/Unix based Web servers, what privilege should the daemon service be run under?

Explanation

The daemon service on Linux/Unix based Web servers should be run under a privilege other than root. Running the daemon service as root can pose a security risk as it grants extensive permissions and control over the system. By running the daemon service under a different privilege, the potential damage that can be caused by any vulnerabilities or malicious actions is limited. This helps to ensure the overall security and stability of the server.

Submit
69. An International Mobile Equipment Identifier (IMEI) is a 15-digit number that indicates the manufacturer, model type, and country of approval for GSM devices. The first eight digits of an I MEI number that provide information about the model and origin of the mobile device is also known as:

Explanation

The first eight digits of an IMEI number that provide information about the model and origin of the mobile device is known as the Type Allocation Code (TAC). This code indicates the manufacturer, model type, and country of approval for GSM devices.

Submit
70. What is the target host IP in the following command?

Explanation

The target host IP in the given command is 172.16.28.95.

Submit
71. When investigating a computer forensics case where Microsoft Exchange and Blackberry Enterprise server are used, where would investigator need to search to find email sent from a Blackberry device?

Explanation

In a computer forensics case involving the use of Microsoft Exchange and Blackberry Enterprise server, the investigator would need to search the Microsoft Exchange server to find email sent from a Blackberry device. The Microsoft Exchange server is responsible for handling and storing email messages, including those sent from Blackberry devices. The Blackberry Enterprise server, on the other hand, is primarily responsible for managing and delivering email to Blackberry devices, rather than storing them. Therefore, the Microsoft Exchange server would be the appropriate place to search for these emails.

Submit
72. When needing to search for a website that is no longer present on the Internet today but was online few years back, what site can be used to view the website collection of pages?

Explanation

Archive.org is a website that can be used to view the website collection of pages that are no longer present on the Internet today but were online a few years back. It is known for its Wayback Machine feature, which allows users to access archived versions of websites from the past. This makes it a valuable resource for researching and retrieving information from websites that may have been taken down or changed over time.

Submit
73. Jim performed a vulnerability analysis on his network and found no potential problems. He runs another utility that executes exploits against his system to verify the results of the vulnerability test. The second utility executes five known exploits against his network in which the vulnerability analysis said were not exploitable. What kind of results did Jim receive from his vulnerability analysis?

Explanation

Jim received false negatives from his vulnerability analysis. This means that the analysis incorrectly identified the vulnerabilities as not exploitable when in fact they were exploitable. The second utility, by successfully executing the known exploits, revealed the presence of these vulnerabilities that were missed by the initial analysis.

Submit
74. What malware analysis operation can the investigator perform using the jv16 tool?

Explanation

The jv16 tool is used for registry analysis and monitoring. It allows investigators to analyze and monitor the Windows registry, which is a crucial component of the operating system. By using this tool, investigators can analyze registry entries, track changes made to the registry, and monitor any suspicious activities related to the registry. This helps in identifying and understanding the behavior of malware that may have made changes to the registry, allowing investigators to gather valuable information for further analysis and investigation.

Submit
75. When conducting computer forensic analysis, you must guard against  __________      So that you remain focused on the primary job and insure that the level of work does not increase beyond what was originally expected.

Explanation

When conducting computer forensic analysis, it is important to guard against scope creep. Scope creep refers to the gradual expansion of the project's goals and deliverables beyond the original scope. By being vigilant and preventing scope creep, you can ensure that you remain focused on the primary job and prevent the level of work from increasing beyond what was originally expected. This helps maintain efficiency and prevents unnecessary delays or distractions.

Submit
76. What does the command "C:\>wevtutil gl <log name>" display?

Explanation

The command "C:\>wevtutil gl " displays the configuration information of a specific Event Log.

Submit
77. Which of the following tool creates a bit-by-bit image of an evidence media?

Explanation

AccessData FTK Imager is the correct answer because it is a tool specifically designed for creating a bit-by-bit image of an evidence media. FTK Imager is widely used in digital forensics to create a forensic image of a storage device, ensuring that every bit of data is copied and preserved for analysis. This tool is trusted by professionals in the field for its reliability and accuracy in creating forensic images.

Submit
78. You just passed your ECSA exam and are about to start your first consulting job running security audits for a financial institution in Los Angeles, The IT manager of the company you will be working for tries to see if you remember your ECSA class. He asks about the methodology you will be using to test the company's network. How would you answer?

Explanation

The correct answer is LPT Methodology. LPT stands for Licensed Penetration Tester, which is a certification offered by EC-Council. The LPT Methodology is a comprehensive and structured approach to conducting penetration testing and security audits. It includes various phases such as reconnaissance, scanning, exploitation, and post-exploitation. This methodology ensures that the testing is conducted in a systematic and controlled manner, allowing for accurate identification of vulnerabilities and potential risks in the company's network.

Submit
79. Which of the following techniques can be used to beat steganography?

Explanation

Steganalysis is the correct answer because it is the process of detecting and analyzing hidden messages within steganography. Steganography is a technique used to hide information within other files or mediums, and steganalysis is the countermeasure to uncover and detect these hidden messages. Encryption, decryption, and cryptanalysis are not specifically designed to beat steganography, but rather to secure and analyze encrypted messages.

Submit
80. Why are Linux/Unix based computers better to use than Windows computers for idle scanning?

Explanation

Windows computers are constantly talking, meaning that they are more active and generate more network traffic compared to Linux/Unix computers. This makes it easier to detect and scan Windows computers while they are idle. On the other hand, Linux/Unix computers are generally less talkative, making it more difficult to detect their presence and scan them while they are idle. Therefore, Linux/Unix based computers are considered better to use for idle scanning compared to Windows computers.

Submit
81. Bill is the accounting manager for Grummon and Sons LLC in Chicago. On a regular basis, he needs to send PDF documents containing sensitive information through E-mail to his customers. Bill protects the PDF documents with a password and sends them to their intended recipients. Why PDF passwords do not offer maximum protection?

Explanation

PDF passwords do not offer maximum protection because they can easily be cracked by software brute force tools. These tools systematically try all possible combinations of characters until the correct password is found. This means that even a strong password can be cracked given enough time. Therefore, relying solely on a PDF password to protect sensitive information is not sufficient and additional security measures should be implemented.

Submit
82. Paul is a computer forensics investigator working for Tyler & Company Consultants. Paul has been called upon to help investigate a computer hacking ring broken up by the local police. Paul begins to inventory the PCs found in the hackers hideout. Paul then comes across a PDA left by them that is attached to a number of different peripheral devices. What is the first step that Paul must take with the PDA to ensure the integrity of the investigation?

Explanation

The first step that Paul must take with the PDA to ensure the integrity of the investigation is to photograph and document the peripheral devices. This is important because it allows Paul to create a record of the devices and their connections to the PDA, which can be used as evidence in the investigation. By documenting the peripheral devices, Paul can ensure that any changes or tampering with the devices can be detected and investigated further. This step also helps in maintaining the chain of custody and preserving the integrity of the evidence.

Submit
83. What will the following command produce on a website login page? SELECT email, passwd, login_id, full_name FROM members WHERE email = 'someonecgsomehwere com'; DROP TABLE members;

Explanation

The given command is a SQL injection attack that attempts to delete the entire members table. It uses a combination of a valid SELECT statement to retrieve data and a DROP TABLE statement to delete the table. The WHERE clause specifies a condition that is always false, so the SELECT statement does not retrieve any data. However, the DROP TABLE statement is still executed, resulting in the deletion of the members table.

Submit
84. If a PDA is seized in an investigation while the device is turned on, what would be the proper procedure?

Explanation

Keeping the device powered on is the proper procedure when a PDA is seized in an investigation while it is turned on. This is because turning off the device immediately or removing the battery could potentially result in the loss or destruction of valuable evidence. By keeping the device powered on, investigators can preserve the current state of the device and potentially extract important information or data that may be relevant to the investigation. Removing any memory cards immediately may also result in the loss of potential evidence, so it is best to leave them in place until further analysis can be conducted.

Submit
85. Ivanovich, a forensics investigator, is trying to extract complete information about running processes from a system. Where should he look apart from the RAM and virtual memory?

Explanation

Ivanovich should look in the swap space apart from the RAM and virtual memory to extract complete information about running processes. Swap space is a part of the hard disk that is used by the operating system as an extension of the RAM. When the RAM becomes full, the operating system moves some of the inactive data from RAM to the swap space. Therefore, by examining the swap space, Ivanovich can gather additional information about the running processes on the system.

Submit
86. What does 254 represent in ICCID 89254021520014515744?

Explanation

The number 254 in the ICCID 89254021520014515744 represents the country code. ICCID stands for Integrated Circuit Card Identifier, and it is a unique number assigned to SIM cards. The country code is a specific number assigned to each country, and it helps identify the country of origin for the SIM card. In this case, the country code 254 indicates that the SIM card is from Kenya.

Submit
87. Which of the following application password cracking tool can discover all password-protected items on a computer and decrypts them?

Explanation

Passware Kit Forensic is the correct answer because it is an application password cracking tool that can discover all password-protected items on a computer and decrypt them. This tool is specifically designed for forensic professionals and can be used to recover passwords for various types of files, including encrypted archives, databases, and email accounts. It utilizes advanced algorithms and techniques to crack passwords and provides a comprehensive solution for password recovery.

Submit
88. What feature of Decryption Collection allows an investigator to crack a password as quickly as possible?

Explanation

The feature of Decryption Collection that allows an investigator to crack a password as quickly as possible is the ability to distribute processing over 16 or fewer computers. By distributing the processing power across multiple computers, the workload is divided, allowing for faster password cracking. This feature takes advantage of parallel processing, which can significantly speed up the decryption process compared to using a single computer.

Submit
89. If the partition size is 4 GB, each cluster will be 32 K. Even if a file needs only 10 K, the entire 32 K will be allocated, resulting in 22 K of

Explanation

When a partition size is set to 4 GB and each cluster size is 32 K, it means that each cluster will occupy 32 K of space. So, if a file only needs 10 K of space, the entire 32 K cluster will be allocated to it, resulting in 22 K of unused space within that cluster. This unused space is known as slack space.

Submit
90. Examination of a computer by a technically unauthorized person will almost always result in

Explanation

Examination of a computer by a technically unauthorized person will almost always result in rendering any evidence found inadmissible in a court of law. This is because unauthorized access to a computer and its data violates the rules of evidence and can be considered an illegal search. In order for evidence to be admissible in court, it must be obtained legally and follow proper procedures, including being examined by authorized individuals. Therefore, any evidence found by an unauthorized person would likely be excluded from being presented in court.

Submit
91. Which of the following techniques delete the files permanently?

Explanation

Artifact wiping is a technique that permanently deletes files by overwriting them with random data multiple times. This ensures that the original data cannot be recovered through any means. Steganography, data hiding, and trail obfuscation are techniques used for hiding or obfuscating data, but they do not permanently delete files.

Submit
92. A picture file is recovered from a computer under investigation. During the investigation process, the file is enlarged 500% to get a better view of its contents. The picture quality is not degraded at all from this process. What kind of picture is this file. What kind of picture is this file?

Explanation

A vector image is made up of mathematical formulas that define the shapes and colors of the image. When a vector image is enlarged, it does not lose any quality because the mathematical formulas can be recalculated to fit the new size. This is different from a raster image, which is made up of pixels and can lose quality when enlarged. Therefore, since the picture quality is not degraded when enlarged, it suggests that the file is a vector image.

Submit
93. You are the network administrator for a small bank in Dallas, Texas. To ensure network security, you enact a security policy that requires all users to have 14 character passwords. After giving your users 2 weeks notice, you change the Group Policy to force 14 character passwords. A week later you dump the SAM database from the standalone server and run a password-cracking tool against it. Over 99% of the passwords are broken within an hour. Why were these passwords cracked so Quickly?

Explanation

Passwords of 14 characters or less are broken up into two 7-character hashes. This means that even though the passwords are 14 characters long, they are actually stored as two separate 7-character hashes in the SAM database. The password-cracking tool is able to break these hashes much faster than if the passwords were stored as a single hash. Therefore, the passwords were cracked quickly because the tool was able to break the shorter hashes within a short amount of time.

Submit
94. What is the size value of a nibble?

Explanation

A nibble is a unit of digital information that consists of 4 bits. Since a byte is equal to 8 bits, a nibble is half the size of a byte. Therefore, the size value of a nibble is 0.5 byte.

Submit
95. Printing under a Windows Computer normally requires which one of the following files types to be created?

Explanation

EMF stands for Enhanced Metafile, which is a file format commonly used for printing under a Windows computer. It contains a collection of records that describe graphical objects, such as lines, curves, and fonts. These records can be interpreted by the printer to accurately reproduce the image on paper. Therefore, in order to print under a Windows computer, the file type that needs to be created is EMF.

Submit
96. Email archiving is a systematic approach to save and protect the data contained in emails so that it can be accessed fast at a later date. There are two main archive types, namely Local Archive and Server Storage Archive. Which of the following statements is correct while dealing with local archives?

Explanation

The correct answer suggests that dealing with webmail can be challenging because there is usually no offline archive available. Therefore, it advises consulting with a legal counsel to determine the best approach for accessing the required data on servers. This answer acknowledges the limitations of webmail in terms of archiving and emphasizes the importance of seeking professional guidance in such situations.

Submit
97. Files stored in the Recycle Bin in its physical location are renamed as Dxy.ext, where "x" represents the             .

Explanation

When files are stored in the Recycle Bin in its physical location, they are renamed as Dxy.ext, where "x" represents the drive name. This means that the original drive name is used as a placeholder in the new file name.

Submit
98. Which tool can help the investigator if he wants to examine changes made to the system's registry by the suspect program?

Explanation

Regshot is a tool that can help the investigator examine changes made to the system's registry by the suspect program. It takes snapshots of the registry before and after the program is executed and then compares the two snapshots to identify any changes. This allows the investigator to analyze and understand the modifications made by the program, which can be crucial in determining its behavior and potential impact on the system.

Submit
99. An investigator has extracted the device descriptor for a 1GB thumb drive that looks like: Disk&Ven_Best_Buy&Prod_Geek_Squad_U3&Rev_6.15. What does the "Geek_Squad" part represent?

Explanation

The "Geek_Squad" part in the device descriptor represents the product description. This part of the descriptor provides information about the specific product or model of the thumb drive, in this case, the thumb drive is associated with the Geek Squad brand.

Submit
100. In Microsoft file structures, sectors are grouped together to form

Explanation

In Microsoft file structures, sectors are grouped together to form clusters. Clusters are the basic units of allocation for files on a disk. They are made up of one or more sectors and are used to efficiently store and retrieve data. By grouping sectors together into clusters, it allows for more efficient disk utilization and reduces the overhead of managing individual sectors.

Submit
101. Before you are called to testify as an expert, what must an attorney do first?

Explanation

Before an attorney calls someone to testify as an expert, they must first qualify that person as an expert witness. This involves establishing the person's credentials, expertise, and experience in the relevant field. The attorney needs to demonstrate to the court that the witness has the necessary knowledge and qualifications to provide expert opinions and testimony. This is an important step to ensure that the witness's testimony is given proper weight and credibility by the court.

Submit
102. If you see the files ZerO.tar.gz and copy.tar.gz on a Linux system while doing an investigation, what can you conclude?

Explanation

The presence of the files ZerO.tar.gz and copy.tar.gz on a Linux system does not provide enough information to draw any conclusions. These files could be operational files used by the system, and their presence alone does not indicate any suspicious activity or compromise. Further investigation and analysis would be necessary to determine their purpose and if they pose any security risks.

Submit
103. Adam, a forensic investigator, is investigating an attack on Microsoft Exchange Server of a large organization. As the first step  of  the  investigation,  he examined the PRIV.EDB file and found the source from where the mail originated and the name of the file that  disappeared  upon execution. Now, he wants to examine the MIME stream content. Which of the following files is he going to examine?

Explanation

Adam is investigating an attack on the Microsoft Exchange Server and has already examined the PRIV.EDB file to gather information. The PRIV.EDB file revealed the source of the email and the name of the file that disappeared upon execution. Now, Adam wants to examine the MIME stream content, which is stored in the PRIV.STM file. Therefore, he will examine the PRIV.STM file to further investigate the attack.

Submit
104. Which of the following commands shows you the names of all open shared files on a server and the number of file locks on each file?

Explanation

The correct answer is "Net file" because this command displays the names of all open shared files on a server and also provides information about the number of file locks on each file. This command is useful for monitoring file sharing and identifying any potential issues or conflicts with file access.

Submit
105. If an attacker's computer sends an IPID of 31400 to a zombie computer on an open port in IDLE scanning, what will be the response?

Explanation

In IDLE scanning, the attacker's computer sends a series of SYN packets to the zombie computer on an open port. If the IPID of the attacker's computer is 31400, the zombie computer will respond with a SYN/ACK packet and increment the IPID by 1. Therefore, the response from the zombie computer will have an IPID of 31401.

Submit
106. Which of the following statements is incorrect when preserving digital evidence?

Explanation

The correct answer is "Turn on the computer and extract Windows event viewer log files." This statement is incorrect when preserving digital evidence because turning on the computer and extracting log files can potentially alter or overwrite the existing evidence. It is important to preserve the original state of the computer and its files to maintain the integrity of the evidence.

Submit
107. John is working on his company policies and guidelines. The section he is currently working on covers company documents; how they should      be handled, stored, and eventually destroyed. John is concerned about the process whereby outdated documents are destroyed. What type         of shredder should John write in the guidelines to be used when destroying documents?

Explanation

John should write in the guidelines to use a cross-cut shredder when destroying documents. A cross-cut shredder cuts the paper into small, confetti-like pieces, making it more difficult for anyone to piece the shredded documents back together. This ensures that sensitive information is properly destroyed and reduces the risk of unauthorized access to confidential data.

Submit
108. You are employed directly by an attorney to help investigate an alleged sexual harassment case at a large pharmaceutical manufacture. While at the corporate office of the company, the CEO demands to know the status of the investigation. What prevents you from discussing the case with the CEO?

Explanation

The attorney-work-product rule prevents discussing the case with the CEO. This rule protects the confidentiality of information and communications between an attorney and their client. It ensures that the attorney's work and strategy remain confidential in order to promote effective legal representation. Therefore, discussing the case with the CEO would violate this rule and compromise the integrity of the investigation.

Submit
109. Which of the following acts as a network intrusion detection system as well as network intrusion prevention system?

Explanation

Snort is a network intrusion detection and prevention system. It is an open-source tool that monitors network traffic and analyzes it for suspicious activity or potential security threats. Snort can detect and prevent various types of attacks, such as port scans, malware infections, and denial-of-service attacks. It uses a combination of signature-based and anomaly-based detection methods to identify and respond to potential intrusions in real-time. Snort is widely used by network administrators and security professionals to enhance the security of their networks.

Submit
110. Jessica works as systems administrator for a large electronics firm. She wants to scan her network quickly to detect live hosts by using ICMP ECHO Requests. What type of scan is Jessica going to perform?

Explanation

Jessica is going to perform an ICMP ping sweep. This involves sending ICMP ECHO Requests to all the IP addresses in her network to detect live hosts. The purpose of this scan is to quickly identify which hosts are active and responsive. Tracert, Smurf scan, and Ping trace are not relevant to this scenario.

Submit
111. In what way do the procedures for dealing with evidence in a criminal case differ from the procedures for dealing with evidence in a civil case?

Explanation

In a criminal case, the evidence must be secured more tightly compared to a civil case. This is because the outcome of a criminal case can result in the loss of liberty for the accused, making it crucial to ensure that the evidence is handled and preserved properly to maintain its integrity. On the other hand, in a civil case, the consequences are typically limited to financial compensation or other non-criminal penalties, so the procedures for handling evidence may not be as strict.

Submit
112. What is the location of the binary files required for the functioning of the OS in a Linux system?

Explanation

In a Linux system, the location of the binary files required for the functioning of the OS is typically found in the /bin directory. This directory contains essential executable files that are necessary for the system to boot and perform basic operations. These binaries include essential system utilities and commands that are accessible to all users of the system.

Submit
113. When setting up a wireless network with multiple access points, why is it important to set each access point on a different channel?

Explanation

When setting up a wireless network with multiple access points, it is important to set each access point on a different channel to avoid cross talk. Cross talk occurs when multiple access points on the same channel interfere with each other's signals, leading to decreased performance and potential connectivity issues. By assigning different channels to each access point, the risk of cross talk is minimized, allowing for better signal quality and overall network performance.

Submit
114. What is the framework used for application development for iOS-based mobile devices?

Explanation

Cocoa Touch is the framework used for application development for iOS-based mobile devices. It provides a set of tools and libraries that allow developers to create user interfaces, handle user input, access device hardware, and perform other essential tasks for iOS applications. Cocoa Touch is specifically designed for developing applications for iPhone, iPad, and iPod touch devices, making it the correct answer for this question.

Submit
115. Madison is on trial for allegedly breaking into her university's internal network. The police raided her dorm room and seized all of her computer equipment. Madison's lawyer is trying to convince the judge that the seizure was unfounded and baseless. Under which US Amendment is Madison's lawyer trying to prove the police violated?

Explanation

Madison's lawyer is trying to prove that the police violated the 4th Amendment. The 4th Amendment protects against unreasonable searches and seizures, and requires that law enforcement have a warrant or probable cause before conducting a search. The lawyer is arguing that the seizure of Madison's computer equipment was unfounded and baseless, meaning that the police did not have proper justification or legal authority to seize her belongings.

Submit
116. Which command line tool is used to determine active network connections?

Explanation

Netstat is a command line tool used to determine active network connections. It displays information about active network connections, listening ports, routing tables, and other network statistics. It provides useful information for troubleshooting network issues and monitoring network activity.

Submit
117. The   _________________ refers to handing over the results of private investigations to the authorities because of indications of criminal activity.

Explanation

The Silver-Platter Doctrine refers to handing over the results of private investigations to the authorities because of indications of criminal activity. This doctrine allows private investigators to provide evidence to law enforcement agencies without violating the Fourth Amendment rights of the individuals involved. It originated from a Supreme Court case in 1960 and has since been used as a legal framework for cooperation between private investigators and law enforcement agencies.

Submit
118. John is using Firewalk to test the security of his Cisco PIX firewall. He is also utilizing a sniffer located on a subnet that resides deep inside his network. After analyzing the sniffer log files, he does not see any of the traffic produced by Firewalk. Why is that?

Explanation

Firewalk sets all packets with a TTL of one. This means that the packets sent by Firewalk have a Time-to-Live (TTL) value of one, which causes them to expire immediately after being sent. As a result, these packets do not reach the subnet where the sniffer is located, and therefore, they do not appear in the sniffer log files.

Submit
119. Given the drive dimensions as follows and assuming a sector has 512 bytes, what is the capacity of the described hard drive?   22,164 cylinders/disk 80 heads/cylinder 63 sectors/track

Explanation

The capacity of the described hard drive can be calculated by multiplying the number of cylinders, heads, and sectors per track, and then multiplying it by the sector size (512 bytes).

Capacity = (Number of cylinders) x (Number of heads) x (Number of sectors per track) x (Sector size)

Capacity = 22,164 x 80 x 63 x 512 bytes

Converting bytes to gigabytes:

Capacity = (22,164 x 80 x 63 x 512) / (1024^3)

Capacity ≈ 53.26 GB

Submit
120. A state department site was recently attacked and all the servers had their disks erased. The incident response team sealed the area and commenced investigation. During evidence collection they came across a zip disks that did not have the standard labeling on it. The incident team ran the disk on an isolated system and found that the system disk was accidentally erased. They decided to call in the FBI for further investigation. Meanwhile, they short listed possible suspects including three summer interns. Where did the incident team go wrong?

Explanation

The incident team went wrong by tampering with the evidence by using it. Running the unknown zip disk on an isolated system caused the accidental erasure of the system disk, which can be considered tampering with the evidence. This action compromised the integrity of the evidence and could potentially hinder the investigation process.

Submit
121. When investigating a wireless attack, what information can be obtained from the DHCP logs?

Explanation

From the DHCP logs, the MAC address of the attacker can be obtained. DHCP (Dynamic Host Configuration Protocol) is responsible for assigning IP addresses to devices on a network. When a device connects to a network, it sends a DHCP request, and the DHCP server responds with an IP address. The DHCP logs record these transactions, including the MAC address of the device making the request. Therefore, by analyzing the DHCP logs, the MAC address of the attacker can be identified.

Submit
122. When using Windows acquisitions tools to acquire digital evidence, it is important to use a well-tested hardware write-blocking device to:

Explanation

When using Windows acquisition tools to acquire digital evidence, it is important to use a well-tested hardware write-blocking device to prevent contamination to the evidence drive. This is crucial because write-blocking devices ensure that no data can be written to the evidence drive during the acquisition process, guaranteeing the integrity and authenticity of the collected evidence. By using a write-blocking device, any accidental or intentional modifications to the evidence drive are prevented, preserving the evidentiary value of the acquired data.

Submit
123. With Regard to using an Antivirus scanner during a computer forensics investigation, You should:

Explanation

It is important to scan the forensics workstation before beginning an investigation to ensure that it is free from any malware or viruses that could potentially compromise the integrity of the investigation. Running a scan on the suspect hard drive before starting the investigation may also be necessary, but it is not mentioned in the answer options. Scanning the forensics workstation at intervals of no more than once every five minutes during an investigation is not necessary and could potentially disrupt the investigation process.

Submit
124. Which of the following is a record of the characteristics of a file system, including its size, the block size, the empty and the filled blocks and their respective counts, the size and location of the inode tables, the disk block map and usage information, and the size of the block groups?

Explanation

The superblock is a record of the characteristics of a file system, including its size, the block size, the empty and filled blocks and their respective counts, the size and location of the inode tables, the disk block map and usage information, and the size of the block groups. It contains essential information about the file system and is usually located at the beginning of the disk partition. The superblock is crucial for the proper functioning and management of the file system.

Submit
125. When analyzing logs, it is important that the clocks of all the network devices are synchronized. Which protocol will help in synchronizing these clocks?

Explanation

NTP (Network Time Protocol) is a protocol used to synchronize the clocks of network devices. It allows devices to accurately maintain the same time by receiving time updates from a reliable time source. NTP ensures that all devices in a network are synchronized, which is crucial when analyzing logs as it helps in correlating events accurately. UTC (Coordinated Universal Time) is a time standard, PTP (Precision Time Protocol) is another protocol used for clock synchronization, and Time Protocol is an outdated protocol not commonly used for clock synchronization.

Submit
126. Where is the default location for Apache access logs on a Linux computer?

Explanation

The default location for Apache access logs on a Linux computer is in the "usr/local/apache/logs" directory.

Submit
127. Richard is extracting volatile data from a system and uses the command doskey/history. What is he trying to extract?

Explanation

Richard is using the command doskey/history to extract previously typed commands from the system. This command allows him to view a history of the commands that have been entered into the system, which can be useful for troubleshooting or repeating past actions. It does not extract events history, history of the browser, or passwords used across the system.

Submit
128. What is a good security method to prevent unauthorized users from "tailgating"?

Explanation

A man trap is a good security method to prevent unauthorized users from "tailgating" because it is a physical access control system that consists of two interlocking doors. Only one door can be open at a time, ensuring that only one person can enter or exit the restricted area at a time. This prevents unauthorized individuals from following closely behind an authorized person to gain access without proper authorization.

Submit
129. Office Documents (Word, Excel and PowerPoint) contain a code that allows tracking the MAC or unique identifier of the machine that created the document. What is that code called?

Explanation

Office Documents contain a code called a Globally unique ID that allows tracking the MAC or unique identifier of the machine that created the document. This code serves as a unique identifier for the document and helps in tracking its origin.

Submit
130. When using an iPod and the host computer is running Windows, what file system will be used?

Explanation

When using an iPod with a Windows host computer, the file system that will be used is FAT32. This is because FAT32 is compatible with both Windows and iPod devices, allowing for easy transfer and compatibility of files between the two.

Submit
131. Identify the file system that uses SBitMap file to keep track of all used and unused clusters on a volume.

Explanation

NTFS is the correct answer because it uses a SBitMap file to keep track of all used and unused clusters on a volume. The SBitMap file contains a bit for each cluster on the volume, where a value of 1 indicates that the cluster is in use and a value of 0 indicates that the cluster is free. This allows the file system to efficiently manage and allocate space on the volume. FAT, EXT, and FAT32 do not use a SBitMap file for this purpose.

Submit
132. What does the part of the log, "% SEC-6-IPACCESSLOGP", extracted from a Cisco router represent?

Explanation

The part of the log, "% SEC-6-IPACCESSLOGP", extracted from a Cisco router represents that a packet matching the log criteria for the given access list has been detected (TCP or UDP). This log entry indicates that the router has identified a packet that meets the conditions specified in the access list and has logged this event for further analysis or monitoring purposes.

Submit
133. What technique is used by JPEGs for compression?

Explanation

JPEGs use the Discrete Cosine Transform (DCT) technique for compression. DCT is a mathematical algorithm that converts spatial data into frequency data by decomposing an image into a set of cosine functions of different frequencies. This allows for the removal of high-frequency components that are less noticeable to the human eye, resulting in a smaller file size without significant loss of image quality.

Submit
134. After passing her CEH exam, Carol wants to ensure that her network is completely  secure.  She implements  a DMZ, stateful firewall, NAT,  IPSEC,  and a packet filtering firewall. Since all security measures were taken,  none of the hosts  on her network can reach the Internet. Why  is that?

Explanation

NAT (Network Address Translation) and IPSEC (Internet Protocol Security) are two different technologies that serve different purposes. NAT is used to translate private IP addresses to public IP addresses, allowing multiple devices on a private network to share a single public IP address. IPSEC, on the other hand, is a protocol suite that provides secure communication over an IP network. In this scenario, it is likely that the implementation of NAT and IPSEC is conflicting, causing the hosts on Carol's network to be unable to reach the Internet.

Submit
135. What stage of the incident handling process involves reporting events?

Explanation

The stage of the incident handling process that involves reporting events is the "Identification" stage. This is the initial step where the incident is detected and recognized as an actual security event. Reporting events involves documenting and notifying the appropriate individuals or teams about the incident, providing them with the necessary information to begin the incident response process.

Submit
136. During an investigation, Noel found the following SIM card from the suspect's mobile. What does the code 89 44 represent?

Explanation

The code 89 44 represents the Industry Identifier and Country code. The Industry Identifier is a number that identifies the industry or type of organization that issued the SIM card. The Country code represents the country where the SIM card was issued. Therefore, the code 89 44 indicates that the SIM card was issued by an organization in a specific industry and in a particular country.

Submit
137. When a router receives an update for its routing table, what is the metric value change to that path7

Explanation

When a router receives an update for its routing table, the metric value for that path is increased by 1.

Submit
138. Which is a standard procedure to perform during all computer forensics investigations?

Explanation

During computer forensics investigations, it is a standard procedure to check the date and time in the system's CMOS with the hard drive removed from the suspect PC. This is because the CMOS (Complementary Metal-Oxide-Semiconductor) stores the system's BIOS settings, including the date and time. By examining this information, investigators can establish a timeline of events and ensure the accuracy of timestamps associated with potential evidence. Checking the date and time in the File Allocation Table, system's RAM, or with the hard drive in the suspect PC may not provide accurate or reliable information for forensic analysis.

Submit
139. With the standard Linux second extended file system (Ext2fs), a file is deleted when the inode internal link count reaches           .

Explanation

In the standard Linux second extended file system (Ext2fs), a file is deleted when the inode internal link count reaches 0. The inode internal link count represents the number of hard links pointing to a particular file. When the link count reaches 0, it means that there are no more hard links pointing to the file, indicating that the file is no longer in use and can be safely deleted.

Submit
140. A forensic examiner is examining a Windows system seized from a crime scene. During the examination of a suspect file, he discovered that the file is password protected. He tried guessing the password using the suspect's available information but without any success. Which of the following tool can help the investigator to solve this issue?

Explanation

Cain & Abel is a password recovery tool that can help the forensic examiner in solving the issue of a password-protected file. This tool is specifically designed for recovering various types of passwords, including network passwords and password-protected files. It uses different methods such as brute-force attacks and dictionary attacks to crack the password. By using Cain & Abel, the forensic examiner can increase the chances of successfully unlocking the suspect file and gaining access to its contents for further investigation.

Submit
141. Brian needs to acquire data from RAID storage. Which of the following acquisition methods is recommended to retrieve only the data relevant to the investigation?

Explanation

Sparse or Logical Acquisition is recommended to retrieve only the data relevant to the investigation. This method allows the investigator to select and acquire specific files or folders from the RAID storage, rather than acquiring the entire disk or volume. It helps to minimize the amount of data that needs to be processed and analyzed, saving time and resources.

Submit
142. In which registry does the system store the Microsoft security IDs?

Explanation

The system stores the Microsoft security IDs in the HKEY_LOCAL_MACHINE (HKLM) registry. This registry hive contains configuration information for the entire system, including hardware settings, software settings, and security information. Storing the security IDs in this registry allows the system to access and manage them efficiently.

Submit
143. Which of the following setups should a tester choose to analyze malware behavior?

Explanation

A tester should choose a virtual system with network simulation for internet connection to analyze malware behavior. This setup allows the tester to safely analyze the malware without risking infection or compromising the security of their own system. The virtual system provides an isolated environment for testing, while the network simulation allows the tester to observe the malware's behavior in a controlled environment.

Submit
144. You have been called in to help with an investigation of an alleged network intrusion. After questioning the members of the company IT department, you search through the server log files to find any trace of the intrusion. After that you decide to telnet into one of the company routers to see if there is any evidence to be found. While connected to the router, you see some unusual activity and believe that the attackers are currently connected to that router. You start up an ethereal session to begin capturing traffic on the router that could be used in the investigation. At what layer of the OSI model are you monitoring while watching traffic to and from the router?

Explanation

While watching traffic to and from the router, you are monitoring at the Network layer of the OSI model. The Network layer is responsible for routing and forwarding data packets between different networks. By monitoring at this layer, you can analyze the network addresses, routing protocols, and other network-related information to gather evidence for the investigation of the alleged network intrusion.

Submit
145. Harold is a security analyst who has just run the rdisk /s command to grab the backup SAM files on a computer. Where should Harold navigate on the computer to find the file?

Explanation

Harold should navigate to the %systemroot%\repair directory on the computer to find the backup SAM files.

Submit
146. The given image displays information about date and time of installation of the OS along with service packs, patches, and sub-directories. What command or tool did the investigator use to view this output?     SI Administrator Command Prompt   -           □          X  
03/10/2016 03:30 AH <DIR> migration
03/10/2016 03:32 AH 352,136 FNTCACHE.DAT
03/25/2016 08:09 PH 140,098 perfc009.dat
03/25/2016 08:09 PH 746,532 perfh009.dat
03/25/2016 08:09 PH 883,572 PerfStringBackup. Illi
04/06/2016 04:54 PH <DIR> Driverstore
04/13/2016 11:27 AH <DIR> catroot2
04/13/2016 12:33 PH 135,176,864 HRT.exe
04/13/2016 12:33 PH <DIR> HRT
04/14/2016 09:36 AH <DIR> config
04/14/2016 03:06 PH <OIR> drivers
04/14/2016 04:02 PH <OIR>
04/14/2016 04:02 PH <DIR>
04/14/2016 04:02 PH 324 pid.dump
04/14/2016 05:51 PH <OIR> sru
3866 File(s) 1,727,891,022 bytes ■
116 Dir(s) 63,601,328,128 bytes free ■
C:\WINOOWS\system32>_
____________ ___________________
 

Explanation

The investigator used the "dir/o:d" command to view this output. This command is used to list the files and directories in a directory in chronological order based on their date of installation.

Submit
147. Why should you note all cable connections for a computer you want to seize as evidence?

Explanation

When seizing a computer as evidence, it is important to note all cable connections in order to determine what outside connections existed. This information can be crucial for understanding the potential sources of data transfer or communication, such as external storage devices or network connections. It can also help identify any additional devices that may have been connected to the computer, providing a more comprehensive picture of the digital environment and potential evidence sources.

Submit
148. From the following spam mail header, identify the host IP that sent this spam? From [email protected] [email protected] Tue Nov 27 17:27:11 2001 Received: from viruswall.ie.cuhk.edu.hk (viruswall [137.189.96.52]) by eng.ie.cuhk.edu.hk (8.11.6/8.11.6) with ESMTP id fAR9RAP23061 for; Tue, 27 Nov 2001 17:27:10 +0800 (HKT) Received: from mydomain.com (pcd249020.netvigator.com [203.218.39.20]) by viruswall.ie.cuhk.edu.hk (8.12.1/8.12.1) with SMTP id fAR9QXwZ018431 for ; Tue, 27 Nov 2001 17:26:36 +0800 (HKT) Message-Id: >200111270926.fAR9QXwZ018431 @viruswall.ie.cuhk.edu.hk From: "china hotel web" To: "Shlam" Subject: SHANGHAI (HILTON HOTEL) PACKAGE Date: Tue, 27 Nov 2001 17:25:58 +0800 MIME-Version: 1.0 Priority: 3 X-MSMail- Priority: Normal Reply-To: ' china hotel web"

Explanation

The spam mail header shows that the email was received from viruswall.ie.cuhk.edu.hk (137.189.96.52), which then received it from pcd249020.netvigator.com (203.218.39.20). Therefore, the host IP that sent this spam is 203.218.39.20.

Submit
149. Harold wants to set up a firewall on his network but is not sure which one would be the most appropriate. He knows he needs to allow FTP traffic to one of the servers on his network, but he wants to only allow FTP-PUT. Which firewall would be most appropriate for Harold? needs?

Explanation

An application-level proxy firewall would be the most appropriate for Harold because it operates at the application layer of the network stack. This means that it can inspect the content of the FTP traffic and only allow FTP-PUT requests while blocking other types of FTP traffic. Circuit-level proxy firewalls, packet filtering firewalls, and data link layer firewalls do not have the ability to inspect the content of the traffic at the application layer, making them less suitable for Harold's needs.

Submit
150. Which one do you like?

Explanation

An electronic storage device search warrant is likely the correct answer because it is specifically focused on searching electronic devices for evidence. This type of warrant would be used when law enforcement suspects that electronic devices, such as computers or smartphones, may contain information relevant to an investigation. It allows them to legally search and seize these devices in order to gather evidence. The other options, such as John Doe Search Warrant or Citizen Informant Search Warrant, do not provide any specific information about the nature of the search or the type of evidence being sought. The Service Provider Search Warrant may be relevant in cases where law enforcement needs to access information stored by a service provider, but it does not necessarily involve searching electronic devices.

Submit
151. When marking evidence that has been collected with the "aaa/ddmmyy/nnnn/zz" format, what does the "nnnn" denote?

Explanation

The "nnnn" in the "aaa/ddmmyy/nnnn/zz" format denotes the sequential number of the exhibits seized by the analyst. This number is used to keep track of the order in which the exhibits were collected, allowing for easy reference and organization of the evidence.

Submit
152. You have compromised a lower-level administrator account on an Active Directory network of a small company in Dallas, Texas. You discover Domain Controllers through enumeration. You connect to one of the Domain Controllers on port 389 using ldp.exe. What are you trying to accomplish here?

Explanation

By connecting to the Domain Controller on port 389 using ldp.exe, the attacker is attempting to enumerate domain user accounts and built-in groups. This allows them to gather information about the users and groups present in the Active Directory network, which can be used for further exploitation or privilege escalation. The other options, such as poisoning DNS records or establishing a remote connection, are not relevant to the given scenario and do not align with the attacker's objectives.

Submit
153. In the context of file deletion process, which of the following statement holds true?

Explanation

The correct answer is "While booting, the machine may create temporary files that can delete evidence." This statement is true because during the booting process, the machine may generate temporary files that can unintentionally delete evidence or overwrite existing data. This can occur if the temporary files are stored in the same location as the files that need to be preserved. Therefore, it is important to be cautious during the booting process to prevent the loss of important data.

Submit
154. Which of the following standard represents a legal precedent set in 1993 by the Supreme Court of the United States regarding the admissibility of expert witnesses' testimony during federal legal proceedings?

Explanation

Daubert is the correct answer because it refers to a legal standard established by the Supreme Court in 1993 regarding the admissibility of expert witnesses' testimony in federal legal proceedings. The Daubert standard replaced the previous Frye standard and set new criteria for the scientific validity and relevance of expert testimony. This standard requires that expert testimony be based on reliable scientific methods and principles and be relevant to the case at hand.

Submit
155. Casey has acquired data from a hard disk in an open source acquisition format that allows her to generate compressed or uncompressed image files. What format did she use?

Explanation

Casey used the Advanced Forensics Format (AFF) to acquire the data from the hard disk. This format is an open source acquisition format that allows for the generation of compressed or uncompressed image files.

Submit
156. What are the security risks of running a "repair" installation for Windows XP?

Explanation

Pressing Shift+F10 gives the user administrative rights when running a "repair" installation for Windows XP. This poses a security risk because it allows the user to access and modify system files and settings, potentially compromising the integrity and security of the operating system.

Submit
157. You have used a newly released forensic investigation tool, which doesn't meet the Daubert Test, during a case. The case has ended-up in court. What argument could the defense make to weaken your case?

Explanation

The defense could argue that the forensic investigation tool used in the case has not been reviewed and accepted by the expert's peers. This suggests that the tool may not be reliable or accurate, as it has not undergone the scrutiny and validation of other professionals in the field. This weakens the credibility of the evidence and raises doubts about the accuracy of the findings presented by the expert.

Submit
158. What type of file is represented by a colon (:) with a name following it in the Master File Table of NTFS disk?

Explanation

In the Master File Table of NTFS disk, a colon (:) with a name following it represents a data stream file. NTFS supports the concept of data streams, which allows multiple sets of data to be associated with a single file. Each data stream is identified by a name, and the colon (:) is used to separate the name from the file. Therefore, the correct answer is a data stream file.

Submit
159. What is the name of the first reserved sector in File allocation table?

Explanation

The Master Boot Record (MBR) is the first sector of a storage device and contains the partition table and boot code. The MBR is responsible for locating the active partition and loading the initial bootloader. It is also where the File Allocation Table (FAT) is located, which is used to keep track of the allocation of files on the storage device. Therefore, the first reserved sector in the File Allocation Table is the Master Boot Record.

Submit
160. You are assisting a Department of Defense contract company to become compliant with the stringent security policies set by the DoD. One such strict rule is that firewalls must only allow incoming connections that were first initiated by internal computers. What type of firewall must you implement to abide by this policy?

Explanation

A stateful firewall must be implemented to abide by the policy of only allowing incoming connections that were first initiated by internal computers. A stateful firewall keeps track of the state of network connections and can distinguish between legitimate incoming connections and unauthorized ones. It maintains a state table that records information about each connection, such as the source and destination IP addresses, ports, and connection status. This allows the firewall to enforce the rule of only allowing incoming connections that were first initiated by internal computers.

Submit
161. After passively scanning the network of Department of Defense (DoD), you switch over to active scanning to identify live hosts on their network. DoD is a large organization and should respond to any number of scans. You start an ICMP ping sweep by sending an IP packet to the broadcast address. Only five hosts respond to your ICMP pings; definitely not the number of hosts you were expecting. Why did this ping sweep only produce a few responses?

Explanation

The reason why this ping sweep only produced a few responses is because only Unix and Unix-like systems will reply to this scan. The ICMP ping sweep was performed by sending an IP packet to the broadcast address, but not all systems on the network will respond to this type of scan. Unix and Unix-like systems are designed to respond to ICMP ping requests, while other systems such as IBM AS/400 and Windows may not. Therefore, only a few hosts that are Unix or Unix-like systems responded to the ping sweep.

Submit
162. The offset in a hexadecimal code is:

Explanation

The "Ox" at the beginning of the code refers to the hexadecimal prefix used to indicate that the following characters represent a hexadecimal value. In a hexadecimal code, the offset refers to the position or location of a specific byte within the code. Therefore, the "Ox" at the beginning of the code signifies the start of the hexadecimal value and is not part of the offset itself.

Submit
163. What type of equipment would a forensics investigator store in a StrongHold bag?

Explanation

A forensics investigator would store wireless cards in a StrongHold bag. This is because wireless cards are a crucial piece of equipment used in forensic investigations, as they allow investigators to analyze and capture wireless network traffic. Storing them in a StrongHold bag ensures that the cards are protected from physical damage and electromagnetic interference, which could potentially compromise the integrity of the evidence being collected.

Submit
164. What does ICMP Type 3/Code 13 mean?

Explanation

ICMP Type 3/Code 13, "Administratively Blocked," refers to a situation where a network administrator has intentionally blocked communication to a specific host or network. This can be done for various reasons, such as security concerns or policy enforcement. When this ICMP message is received, it indicates that the destination host or network is unreachable due to administrative restrictions.

Submit
165. Item 2lf you come across a sheepdip machine at your client site, what would you infer?

Explanation

A sheepdip computer is used only for virus-checking. This can be inferred from the term "sheepdip," which refers to a computer that is used to scan and check for viruses. It is a security measure where a computer is isolated from the network and used solely for the purpose of scanning files and detecting any potential viruses or malware. This helps to ensure the safety and security of the client's network and systems.

Submit
166. Mail logs contain which of the following information to help you in your investigation? (Choose four.)

Explanation

Mail logs contain information such as the user account that was used to send the email, the unique message identifier, the contents of the email message, and the date and time the message was sent. These pieces of information are crucial in an investigation as they can help identify the sender, track the message, analyze the content, and establish a timeline of events.

Submit
167. Which of the following tools is not a data acquisition hardware tool?

Explanation

F-Response Imager is not a data acquisition hardware tool because it is a software tool used for remote forensic imaging and analysis. It allows investigators to acquire data from remote computers over a network connection, rather than physically connecting to the hardware. The other options, UltraKit, Atola Insight Forensic, and Triage-Responder, are all examples of data acquisition hardware tools that are used to physically connect to and acquire data from target devices.

Submit
168. What is considered a grant of a property right given to an individual who discovers or invents a new machine, process, useful composition of matter or manufacture?

Explanation

A utility patent is considered a grant of a property right given to an individual who discovers or invents a new machine, process, useful composition of matter, or manufacture. This type of patent protects the functional aspects of an invention, granting the inventor exclusive rights to use, make, and sell the invention for a limited period of time. Unlike copyright, which protects original works of authorship, or trademarks, which protect brand names and logos, a utility patent specifically covers new and useful inventions. A design patent, on the other hand, protects the ornamental design of a functional item rather than its functionality.

Submit
169. Sectors are pie-shaped regions on a hard disk that store data. Which of the following parts of a hard disk do not contribute in determining the addresses of data?

Explanation

The interface of a hard disk is responsible for connecting the hard disk to the computer system and facilitating communication between them. It does not play a role in determining the addresses of data stored on the hard disk. The addresses of data are determined by the combination of sectors, cylinders, and heads, which define the physical location of the data on the disk.

Submit
170. Cylie is investigating a network breach at a state organization in Florida. She discovers that the intruders were able to gain access into the company firewalls by overloading them with IP packets. Cylie then discovers through her investigation that the intruders hacked into the company phone system and used the hard drives on their PBX system to store shared music files. What would this attack on the company PBX system be called?

Explanation

The attack on the company PBX system, where the intruders used the hard drives to store shared music files, would be called "Phreaking." Phreaking refers to the unauthorized access and manipulation of telecommunications systems, often done for malicious purposes. In this case, the intruders hacked into the phone system to exploit its resources for their own use, which aligns with the concept of phreaking.

Submit
171. Before performing a logical or physical search of a drive in Encase, what must be added to the program?

Explanation

In order to perform a logical or physical search of a drive in Encase, keywords must be added to the program. Keywords are specific terms or phrases that are used to search for relevant information within the drive. By adding keywords, Encase can effectively search for and retrieve files or data that match the specified search criteria.

Submit
172. Which of the following is a MAC-based File Recovery Tool?

Explanation

Cisdem DataRecovery 3 is a MAC-based File Recovery Tool.

Submit
173. Preparing an image drive to copy files to is the first step in Linux forensics. For this purpose, what would the following command accomplish? dcfldd if=/dev/zero of=/dev/hda bs=4096 conv=noerror, sync

Explanation

The command "dcfldd if=/dev/zero of=/dev/hda bs=4096 conv=noerror, sync" would fill the disk with zeros. This is achieved by using the input file "/dev/zero" which contains null bytes and writing it to the output file "/dev/hda" which represents the disk. The option "bs=4096" specifies the block size of 4096 bytes, and "conv=noerror, sync" ensures that any errors encountered during the process are ignored and the data is synchronized.

Submit
174. The surface of a hard disk consists of several concentric rings known as tracks; each of these tracks has smaller partitions called disk blocks. What is the size of each block?

Explanation

The size of each block on a hard disk is 512 bytes. This means that each partition within a track on the surface of the hard disk is divided into blocks, with each block being 512 bytes in size.

Submit
175. Which of the following is a responsibility of the first responder?

Explanation

The responsibility of the first responder is to collect as much information about the incident as possible. This is important because it allows the first responder to assess the situation accurately and make informed decisions about the appropriate course of action. By gathering information, the first responder can determine the severity of the incident, identify potential risks or hazards, and provide accurate and timely information to other responders or authorities. Additionally, collecting information helps in documenting the findings for future reference or analysis.

Submit
176. At what layer does a cross site scripting attack occur on?

Explanation

A cross site scripting attack occurs at the application layer. This is because cross site scripting involves injecting malicious code into a website or web application, which is then executed by the user's browser. The application layer is responsible for processing and managing user requests, making it the most vulnerable layer to these types of attacks.

Submit
177. You are carrying out the last round of testing for your new website before it goes live. The website has many dynamic pages and connects to a SQL backend that accesses your product inventory in a database. You come across a web security site that recommends inputting the following code into a search field on web pages to check for vulnerabilities: When you type this and click on search, you receive a pop-up window that says: "This is a test." What is the result of this test?

Explanation

The result of this test is that the website is vulnerable to CSS. This is indicated by the fact that when the input code is entered into the search field, a pop-up window appears with the message "This is a test." This suggests that the website is not properly securing its input fields, allowing CSS code to be executed and potentially leading to security vulnerabilities.

Submit
178. What will the following command accomplish in Linux? fdisk /dev/hda

Explanation

The command "fdisk /dev/hda" in Linux will partition the hard drive. Fdisk is a command-line utility used for disk partitioning, and "/dev/hda" refers to the first IDE hard drive in the system. By executing this command, the user can create, modify, and delete partitions on the hard drive, allowing for better organization and utilization of storage space.

Submit
179. Which Intrusion Detection System (IDS) usually produces the most false alarms due to the unpredictable behaviors of users and networks?

Explanation

Host-based IDS systems (HIDS) usually produce the most false alarms due to the unpredictable behaviors of users and networks. HIDS operates on individual hosts and monitors the activities and events occurring on that specific host. Since users and networks can exhibit unpredictable behaviors, it becomes challenging for HIDS to accurately distinguish between normal and malicious activities, leading to a higher number of false alarms. On the other hand, network-based IDS systems (NIDS) monitor network traffic, making it easier to detect and identify anomalies or suspicious activities. Anomaly detection and signature recognition are techniques used by IDS systems to identify and classify malicious activities but are not specifically prone to producing false alarms due to unpredictable behaviors.

Submit
180. Which response organization tracks hoaxes as well as viruses?

Explanation

The correct answer is CIAC because CIAC, which stands for Computer Incident Advisory Capability, is an organization that tracks hoaxes as well as viruses. They provide information and assistance to users, system administrators, and security officers regarding computer security incidents.

Submit
181. A honey pot deployed with the IP 172.16.1.108 was compromised by an attacker. Given below is an excerpt from a Snort binary capture of the attack. Decipher the activity carried out by the attacker by study the log. Please note that you are required to infer only what is explicit in the excerpt. (Note: The student is being tested on concepts learnt during passive OS fingerprinting, basic TCP/IP connection concepts and the ability to read packet signatures from a sniff dump.) 03/15-20:21:24.107053 211.185.125.124:3500 -> 172.16.1.108:111 TCP TTL:43 TOS:0x0 ID:29726 lpLen:20 DgmLen:52 DF Seq: 0x9B6338C5 Ack: 0x5820ADD0 Win: 0x7D78 TcpLen: 32 TCP Options (3) => NOP NOP TS: 23678634 2878772     03/15-20:21:24.452051 211.185.125.124:789 -> 172.16.1.103:111 UDP TTL:43 TOS:0x0 ID:29733 lpLen:20 DgmLen:84 Len: 64 01 0A 8A 0A 00 00 00 00 00 00 00 02 00 01 86 A0....................... 00 00 00 02 00 00 00 03 00 00 00 00 00 00 00 00 ....................... 00 00 00 00 00 00 00 00 00 01 86 B8 00 00 00 01 ....................... 00 00 00 11 00 00 00 00 ...........   03/15-20:21:24.730436 211.185.125.124:790 -> 172.16.1.103:32773 UDP TTL:43 TOS:0x0 ID:29781 lpLen:20 DgmLen:1104 Len: 1084 47 F7 9F 63 00 00 00 00 00 00 00 02 00 01 86 B8

Explanation

The given excerpt from the Snort binary capture shows a TCP connection from IP address 211.185.125.124 to IP address 172.16.1.108 on port 111. This indicates that the attacker is conducting a network sweep on port 111. The TCP packet also provides information about the TCP TTL, TOS, ID, lpLen, DgmLen, Seq, Ack, Win, TcpLen, and TCP options, but these details do not provide any evidence of scanning, exploitation, or backdoor installation. Therefore, the correct explanation is that the attacker has conducted a network sweep on port 111.

Submit
182. This type of testimony is presented by someone who does the actual fieldwork and does not offer a view in court,

Explanation

Technical testimony is the correct answer because it refers to testimony given by someone who does the actual fieldwork and does not offer a view in court. This type of testimony is typically provided by experts in a specific technical field, such as engineers or scientists, who provide factual information and analysis based on their expertise. Unlike expert testimony, which offers an opinion or interpretation of the evidence, technical testimony focuses on presenting objective data and findings. Victim advocate testimony, on the other hand, involves providing support and assistance to victims of crime, while civil litigation testimony refers to testimony given in civil legal proceedings.

Submit
183. Heather, a computer forensics investigator, is assisting a group of investigators working on a large computer fraud case involving over 20 people. These 20 people, working in different offices, allegedly siphoned off money from many different client accounts. Heather responsibility is to find out how the accused people communicated between each other. She has searched their email and their computers and has not found any useful evidence. Heather then finds some possibly useful evidence under the desk of one of the accused. In an envelope she finds a piece of plastic with numerous holes cut out of it. Heather then finds the same exact piece of plastic with holes at many of the other accused peoples desks. Heather believes that the 20 people involved in the case were using a cipher to send secret messages in between each other. What type of cipher was used by the accused in this case?

Explanation

Based on the information provided, Heather found a piece of plastic with holes cut out of it under the desk of one of the accused individuals. She also found the same piece of plastic with holes at many of the other accused people's desks. This suggests that the accused individuals were using a grill cipher to send secret messages to each other. A grill cipher is a type of transposition cipher where a piece of paper or plastic with holes is placed over a written message, and only the letters visible through the holes are used to form the encoded message.

Submit
184. An attacker has compromised a cloud environment of a company and used the employee information to perform an identity theft attack Which type of attack is this?

Explanation

This is because the question states that the attacker has compromised the cloud environment of a company. In this scenario, the cloud is being used as the subject, meaning that it is the entity that is taking action (in this case, being compromised by the attacker). The other options (cloud as a tool, cloud as an object, and cloud as a service) do not accurately describe the situation where the cloud itself is being compromised.

Submit
185. You are working as an investigator for a corporation and you have just received instructions from your manager to assist in the collection of 15 hard drives that are part of an ongoing investigation. Your job is to complete the required evidence custody forms to properly document each piece of evidence as it is collected by other members of your team. Your manager instructs you to complete one multi-evidence form for the entire case and a single-evidence form for each hard drive. How will these forms be stored to help preserve the chain of custody of the case?

Explanation

To preserve the chain of custody of the case, the multi-evidence form should be placed in the report file, while the single-evidence forms should be kept with each hard drive in an approved secure container. This ensures that all forms are properly documented and stored, making it easier to track and maintain the integrity of the evidence throughout the investigation process.

Submit
186. What do you call the process in which an attacker uses magnetic field over the digital media device to delete any previously stored data?

Explanation

Disk degaussing is the process in which an attacker uses a magnetic field over the digital media device to delete any previously stored data. This process involves applying a strong magnetic field to the disk, which neutralizes the magnetic charge of the data, effectively erasing it. Disk deletion, disk cleaning, and disk magnetization are not accurate terms to describe this specific process.

Submit
187. Rusty, a computer forensics apprentice, uses the command nbtstat -c while analyzing the network information in a suspect system. What information is he looking for?

Explanation

Rusty is using the command "nbtstat -c" which is used to display the contents of the NetBIOS name cache. The NetBIOS name cache stores the NetBIOS names and their corresponding IP addresses of remote systems that the suspect system has recently communicated with. By analyzing this information, Rusty can gain insights into the network activity of the suspect system and potentially identify any suspicious or unauthorized connections.

Submit
188. The objective of this act was to protect consumers' personal financial information held by financial institutions and their service providers.

Explanation

The Gramm-Leach-Bliley Act was enacted to protect consumers' personal financial information held by financial institutions and their service providers. This act requires financial institutions to have safeguards in place to protect customer information from unauthorized access or use. It also requires institutions to provide customers with privacy notices that explain their information-sharing practices. The act aims to ensure the privacy and security of consumers' personal financial information and promote consumer confidence in the financial system.

Submit
189. Pie folowing excerpt is taken from a honeypot log. Pie log captures activities across three days Piere are several intrusion attempts; however, a few are successful (Note: Pie objective of this question is to test whether the student can read basic information from log entries and interpret the nature of attack.)   Apr 24 14 46 46 [4663]: sppjMrtscan: portscan detected from 194.222.156 169 Apr 24 14 46 46 [46631 IDS27/FIN Scan 194 222 156 169:56693 -> 172 16 1 107 482 Apr24 1801:05 [4663] IDS/DNS-version-query: 212 244.97 121 3485-> 172 16.1.107 53 Apr 24 19 04 01 [4663] IDS213/ftp-passwd-rstriev3l 194 222 156 169:1425 -> 172 16 1 107 21 Apr 25 08 02 41 [5875]. sppjMrtscan. PORTSCAN DETECTED from 24 9 255.53 Apr 25 02:08:07 [5875]: IDS277/DNS-version-query: 63.226 81.13:4499 -> 172.16.1.107:53 Apr 25 02 08:07 [5875]: IDS277/DNS-version-query: 63.226 81 13:4630 -> 172.16.1.101 53 Apr 25 02 38 17 [5875] IDS/RPC-rpcinfo-query 212 251 1 94:642 -> 172 16 1 107 111 Apr 25 19 37:32 [5875] IDS230/web-cgi-space-wildcard 198.173 35.164 4221 -> 172.16 1 107:80 Apr 26 05 45 12 [6283] IDS212/dns-zone-transfer: 38 31 107 87:2291 -> 172 16 1 101 53 Apr 26 06 43 05 [6283]. IDS181/nops x86. 63.226.81.13 1351 ■> 172.16 1 107:53 Apr 26 06:44:25 victim7 PAM_pwdb[12509]: (login) session opened for user simple by (uid=O)  Apr 26 06:44 36 victim7 PAN_pwdbjl252lj: (su) session opened for user Simon by simple(uid=506) Apr 26 06 45 34 [6283] IDS175/socks-probe 24 112 167 35 20 -> 172 16 1 107 1080 Apr 26 06:52:10 [6283]: IDS127/telnet-login-incorrect: 172.16.1.107:23-> 213 28.22.189 4558   From the options given below choose the one which best interprets the following entry. Apr 26 06:43:05 [6283]: IDS181/nops-x86: 63.226.81.13:1351 -> 172.16.1.107:53

Explanation

The given log entry indicates that there is an IDS evasion technique being used. This can be inferred from the fact that the entry mentions "IDS181/nops-x86", which suggests that the attacker is attempting to use a technique called "nops" to bypass or evade the intrusion detection system (IDS). This technique involves inserting a series of "no operation" instructions in the code to confuse or bypass the IDS. Therefore, the correct interpretation of the log entry is that it represents an IDS evasion technique.

Submit
190. Why would a company issue a dongle with the software they sell?

Explanation

A company may issue a dongle with the software they sell to provide copyright protection. The dongle acts as a physical key that needs to be inserted into the computer in order for the software to function properly. This prevents unauthorized duplication or distribution of the software, as the dongle is required to unlock its full functionality. By using a dongle, the company can ensure that only legitimate users who have purchased the software can access and use it, thus protecting their copyright.

Submit
191. Which MySQL log file contains information on server start and stop?

Explanation

The error log file in MySQL contains information on server start and stop. It records any errors or warnings that occur during the server's operation, including information about the server's startup and shutdown processes. This log file is useful for troubleshooting and diagnosing issues with the MySQL server.

Submit
192. A Linux system is undergoing investigation. In which directory should the investigators look for its current state data if the system is in powered on state?

Explanation

In a Linux system, the /proc directory is a virtual file system that provides information about the current state of the system. It contains a variety of files and directories that represent different aspects of the system, such as processes, hardware, and network connections. Therefore, if the system is in a powered on state, the investigators should look for its current state data in the /proc directory.

Submit
193. Which federal computer crime law specifically refers to fraud and related activity in connection with access devices like routers?

Explanation

18 U.S.C. 1029 specifically refers to fraud and related activity in connection with access devices like routers. This federal computer crime law addresses the illegal use of access devices, such as credit cards or passwords, and covers offenses related to unauthorized access, trafficking, and possession of such devices. It aims to prevent and prosecute fraudulent activities involving access devices and protect individuals and businesses from financial losses and identity theft.

Submit
194. Which of the Mowing commands shows you the username and IP address used to access 1he system via a remote login session and the type of client from which they are accessing the system?

Explanation

The "Net sessions" command shows the username and IP address used to access the system via a remote login session and also provides information about the type of client from which they are accessing the system. This command is used to display information about all active sessions on a server, including the user name, client name, client type, and the number of files opened by the session.

Submit
195. What does the superblock in Linux define?

Explanation

The superblock in Linux defines the location of the first inode. The inode is a data structure that contains information about a file or directory, such as its permissions, size, and location on the disk. The superblock is a crucial part of the file system as it helps in locating the first inode, which is the starting point for accessing and managing files and directories in the file system.

Submit
196. In Linux, what is the smallest possible shellcode?

Explanation

The smallest possible shellcode in Linux is 24 bytes. Shellcode is a small piece of code that is used to exploit vulnerabilities and execute arbitrary commands. In Linux, shellcode is typically written in assembly language and injected into a program to gain unauthorized access or perform malicious actions. The size of shellcode is important because it needs to fit within the memory space allocated for the exploit. The smaller the shellcode, the more likely it is to succeed in exploiting a vulnerability without being detected. Therefore, the smallest possible shellcode is preferred for stealthy attacks.

Submit
197. In a Linux-based system, what does the command "Last -F" display?

Explanation

The command "Last -F" in a Linux-based system displays the login and logout times and dates of the system. It provides information about when users have logged in and logged out of the system, allowing administrators to track user activity and monitor system usage.

Submit
198. Microsoft Security IDs are available in Windows Registry Editor. The path to locate IDs in Windows 7 is

Explanation

The correct answer is HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList. This is the correct path to locate Microsoft Security IDs in Windows 7 Registry Editor. The other options provided in the question are incorrect paths and do not lead to the desired location.

Submit
199. Shane has started the static analysis of a malware and is using the tool ResourcesExtract to find more details of the malicious program What part of the analysis is he performing?

Explanation

Shane is using the tool ResourcesExtract to find more details of the malicious program. This tool is specifically designed to extract strings from binary files, which can provide valuable information about the malware. Therefore, Shane is performing a strings search as part of the static analysis to uncover important details about the malicious program.

Submit
200. When a user deletes a file, the system creates a $1 file to store its details. What detail does the $1 file not contain?

Explanation

When a user deletes a file, the system creates a $1 file to store its details. However, the $1 file does not contain information about the file's origin and modification. It may contain details such as the file size, time and date of deletion, and the file name, but it does not store information about where the file came from or any modifications made to it.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 23, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 23, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Nov 07, 2019
    Quiz Created by
    Tui
Cancel
  • All
    All (200)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
This ISO standard defines file systems and protocols for exchanging...
The MD5 program is used to:
Which of the following tasks DOES NOT come under the investigation...
When monitoring for both intrusion and security events between...
Stephen is checking an image using Compare Files by The Wizard, and he...
What is one method of bypassing a system BIOS password?
Billy, a computer forensics expert, has recovered a large number of...
Daryl, a computer forensics investigator, has just arrived at the...
It...
You are a security analyst performing reconnaissance on a company you...
In a computer forensics investigation, what describes the route that...
When carrying out a forensics investigation, why should you never...
You have been asked to investigate after a user has reported a...
What method of copying should always be performed first before...
In conducting a computer abuse investigation you become aware that the...
When performing a forensics analysis, what device is used to prevent...
Which one do you like?
Which of the following protocols allows non-ASCII files, such as...
You are working as an independent computer forensics investigator and...
You have been asked to investigate the possibility of computer fraud...
Which of the following technique creates a replica of an evidence...
Which of the following Android libraries are used to render 2D (SGL)...
_______________ is simply the application of Computer Investigation...
Which of the following attack uses HTML tags like...
On an Active Directory network using NTLM authentication, where on the...
CAN-SPAM act requires that you:
What does the acronym POST mean as it relates to a PC?
To make sure the evidence you recover and analyze with computer...
You are running known exploits against your network to test for...
Which of the following should a computer forensics lab used for...
Andie, a network administrator, suspects unusual network services...
Which of the following is a database in which information about every...
Which one of the following is not a first response procedure?
What is the name of the Standard Linux Command that is also available...
What type of attack occurs when an attacker can force a router to stop...
Madison is on trial for allegedly breaking into her university...
Which of the following files stores information about local Dropbox...
Which code does the FAT file system use to mark the file as deleted?
What value of the "Boot Record Signature" is used to...
To preserve digital evidence, an investigator should .
Which one d ...
An expert witness is a    _______________ who is normally...
Which of the following is NOT a graphics file?
Which of the following file system uses Master File Table (MFT)...
When marking evidence that has been collected with the...
What advantage does the tool Evidor have over the built-in Windows...
Jacob is a computer forensics investigator with over 10 years...
At what layer of the OSI model do routers function on?
Which of the following email headers specifies an address for...
Which of the following files DOES NOT use Object Linking and Embedding...
Shane, a forensic specialist, is investigating an ongoing attack on a...
The newer Macintosh Operating System is based on
When a file is deleted by Windows Explorer or through the MS-DOS...
The Recycle Bin exists as a metaphor for throwing files away, but it...
One way to identify the presence of hidden partitions on a...
Jason discovered a file named $RIIYG6VR.doc in the...
What is cold boot (hard boot)?
What must an investigator do before disconnecting an iPod from any...
 What happens when a file is deleted by a Microsoft operating...
Your company uses Cisco routers exclusively throughout the network....
In handling computer-related incidents, which IT role should be...
Which of the following is a list of recently used programs or opened...
How many possible sequence number combinations are there in TCP/IP...
Diskcopy is:
A small law firm located in the Midwest has possibly been breached by...
When obtaining a warrant, it is important to:
When making the preliminary investigations in a sexual harassment...
On Linux/Unix based Web servers, what privilege should the daemon...
An International Mobile Equipment Identifier (IMEI) is a 15-digit...
What is the target host IP in the following command?
When investigating a computer forensics case where Microsoft Exchange...
When needing to search for a website that is no longer present on the...
Jim performed a vulnerability analysis on his network and found no...
What malware analysis operation can the investigator perform using the...
When conducting computer forensic analysis, you must guard...
What does the command "C:\>wevtutil gl <log name>" display?
Which of the following tool creates a bit-by-bit image of an evidence...
You just passed your ECSA exam and are about to start your first...
Which of the following techniques can be used to beat steganography?
Why are Linux/Unix based computers better to use than Windows...
Bill is the accounting manager for Grummon and Sons LLC in Chicago. On...
Paul is a computer forensics investigator working for Tyler &...
What will the following command produce on a website login page?...
If a PDA is seized in an investigation while the device is turned on,...
Ivanovich, a forensics investigator, is trying to extract complete...
What does 254 represent in ICCID 89254021520014515744?
Which of the following application password cracking tool can discover...
What feature of Decryption Collection allows an investigator to crack...
If the partition size is 4 GB, each cluster will be 32 K. Even if a...
Examination of a computer by a technically unauthorized person will...
Which of the following techniques delete the files permanently?
A picture file is recovered from a computer under investigation....
You are the network administrator for a small bank in Dallas, Texas....
What is the size value of a nibble?
Printing under a Windows Computer normally requires which one of the...
Email archiving is a systematic approach to save and protect the data...
Files stored in the Recycle Bin in its physical location are renamed...
Which tool can help the investigator if he wants to examine changes...
An investigator has extracted the device descriptor for a 1GB thumb...
In Microsoft file structures, sectors are grouped together to form
Before you are called to testify as an expert, what must an attorney...
If you see the files ZerO.tar.gz and copy.tar.gz on a Linux system...
Adam, a forensic investigator, is investigating an attack on Microsoft...
Which of the following commands shows you the names of all open shared...
If an attacker's computer sends an IPID of 31400 to a zombie...
Which of the following statements is incorrect when preserving digital...
John is working on his company policies and guidelines. The section he...
You are employed directly by an attorney to help investigate an...
Which of the following acts as a network intrusion detection system as...
Jessica works as systems administrator for a large electronics firm....
In what way do the procedures for dealing with evidence in a criminal...
What is the location of the binary files required for the functioning...
When setting up a wireless network with multiple access points, why is...
What is the framework used for application development for iOS-based...
Madison is on trial for allegedly breaking into her university's...
Which command line tool is used to determine active network...
The   _________________ refers to handing over the...
John is using Firewalk to test the security of his Cisco PIX firewall....
Given the drive dimensions as follows and assuming a sector has 512...
A state department site was recently attacked and all the servers had...
When investigating a wireless attack, what information can be obtained...
When using Windows acquisitions tools to acquire digital evidence, it...
With Regard to using an Antivirus scanner during a computer forensics...
Which of the following is a record of the characteristics of a file...
When analyzing logs, it is important that the clocks of all the...
Where is the default location for Apache access logs on a Linux...
Richard is extracting volatile data from a system and uses the command...
What is a good security method to prevent unauthorized users from...
Office Documents (Word, Excel and PowerPoint) contain a code that...
When using an iPod and the host computer is running Windows, what file...
Identify the file system that uses SBitMap file to keep track of all...
What does the part of the log, "% SEC-6-IPACCESSLOGP", extracted...
What technique is used by JPEGs for compression?
After passing her CEH exam, Carol wants to ensure that her network is...
What stage of the incident handling process involves reporting events?
During an investigation, Noel found the following SIM card from the...
When a router receives an update for its routing table, what is the...
Which is a standard procedure to perform during all computer forensics...
With the standard Linux second extended file system (Ext2fs), a file...
A forensic examiner is examining a Windows system seized from a crime...
Brian needs to acquire data from RAID storage. Which of the following...
In which registry does the system store the Microsoft security IDs?
Which of the following setups should a tester choose to analyze...
You have been called in to help with an investigation of an alleged...
Harold is a security analyst who has just run the rdisk /s command to...
The given image displays information about date and time of...
Why should you note all cable connections for a computer you want to...
From the following spam mail header, identify the host IP that sent...
Harold wants to set up a firewall on his network but is not sure which...
Which one do you like?
When marking evidence that has been collected with the...
You have compromised a lower-level administrator account on an Active...
In the context of file deletion process, which of the following...
Which of the following standard represents a legal precedent set in...
Casey has acquired data from a hard disk in an open source acquisition...
What are the security risks of running a "repair"...
You have used a newly released forensic investigation tool, which...
What type of file is represented by a colon (:) with a name following...
What is the name of the first reserved sector in File allocation...
You are assisting a Department of Defense contract company to become...
After passively scanning the network of Department of Defense (DoD),...
The offset in a hexadecimal code is:
What type of equipment would a forensics investigator store in a...
What does ICMP Type 3/Code 13 mean?
Item 2lf you come across a sheepdip machine at your client site, what...
Mail logs contain which of the following information to help you in...
Which of the following tools is not a data acquisition hardware tool?
What is considered a grant of a property right given to an individual...
Sectors are pie-shaped regions on a hard disk that store data. Which...
Cylie is investigating a network breach at a state organization in...
Before performing a logical or physical search of a drive in Encase,...
Which of the following is a MAC-based File Recovery Tool?
Preparing an image drive to copy files to is the first step in Linux...
The surface of a hard disk consists of several concentric rings known...
Which of the following is a responsibility of the first responder?
At what layer does a cross site scripting attack occur on?
You are carrying out the last round of testing for your new website...
What will the following command accomplish in Linux? fdisk /dev/hda
Which Intrusion Detection System (IDS) usually produces the most false...
Which response organization tracks hoaxes as well as viruses?
A honey pot deployed with the IP 172.16.1.108 was compromised by an...
This type of testimony is presented by someone who does the actual...
Heather, a computer forensics investigator, is assisting a group of...
An attacker has compromised a cloud environment of a company and used...
You are working as an investigator for a corporation and you have just...
What do you call the process in which an attacker uses magnetic field...
Rusty, a computer forensics apprentice, uses the command nbtstat -c...
The objective of this act was to protect consumers' personal financial...
Pie folowing excerpt is taken from a honeypot log. Pie log captures...
Why would a company issue a dongle with the software they sell?
Which MySQL log file contains information on server start and stop?
A Linux system is undergoing investigation. In which directory should...
Which federal computer crime law specifically refers to fraud and...
Which of the Mowing commands shows you the username and IP address...
What does the superblock in Linux define?
In Linux, what is the smallest possible shellcode?
In a Linux-based system, what does the command "Last -F"...
Microsoft Security IDs are available in Windows Registry Editor. The...
Shane has started the static analysis of a malware and is using the...
When a user deletes a file, the system creates a $1 file to store its...
Alert!

Advertisement