This ISO standard defines file systems and protocols for exchanging...
The MD5 program is used to:
Which of the following tasks DOES NOT come under the investigation...
When monitoring for both intrusion and security events between...
Stephen is checking an image using Compare Files by The Wizard, and he...
What is one method of bypassing a system BIOS password?
Billy, a computer forensics expert, has recovered a large number of...
Daryl, a computer forensics investigator, has just arrived at the...
It...
You are a security analyst performing reconnaissance on a company you...
In a computer forensics investigation, what describes the route that...
When carrying out a forensics investigation, why should you never...
You have been asked to investigate after a user has reported a...
What method of copying should always be performed first before...
In conducting a computer abuse investigation you become aware that the...
When performing a forensics analysis, what device is used to prevent...
Which one do you like?
Which of the following protocols allows non-ASCII files, such as...
You are working as an independent computer forensics investigator and...
You have been asked to investigate the possibility of computer fraud...
Which of the following technique creates a replica of an evidence...
Which of the following Android libraries are used to render 2D (SGL)...
_______________ is simply the application of Computer Investigation...
Which of the following attack uses HTML tags like...
On an Active Directory network using NTLM authentication, where on the...
CAN-SPAM act requires that you:
What does the acronym POST mean as it relates to a PC?
To make sure the evidence you recover and analyze with computer...
You are running known exploits against your network to test for...
Which of the following should a computer forensics lab used for...
Andie, a network administrator, suspects unusual network services...
Which of the following is a database in which information about every...
Which one of the following is not a first response procedure?
What is the name of the Standard Linux Command that is also available...
What type of attack occurs when an attacker can force a router to stop...
Madison is on trial for allegedly breaking into her university...
Which of the following files stores information about local Dropbox...
Which code does the FAT file system use to mark the file as deleted?
What value of the "Boot Record Signature" is used to...
To preserve digital evidence, an investigator should .
Which one d
...
An expert witness is a _______________ who is normally...
Which of the following is NOT a graphics file?
Which of the following file system uses Master File Table (MFT)...
When marking evidence that has been collected with the...
What advantage does the tool Evidor have over the built-in Windows...
Jacob is a computer forensics investigator with over 10 years...
At what layer of the OSI model do routers function on?
Which of the following email headers specifies an address for...
Which of the following files DOES NOT use Object Linking and Embedding...
Shane, a forensic specialist, is investigating an ongoing attack on a...
The newer Macintosh Operating System is based on
When a file is deleted by Windows Explorer or through the MS-DOS...
The Recycle Bin exists as a metaphor for throwing files away, but it...
One way to identify the presence of hidden partitions on a...
Jason discovered a file named $RIIYG6VR.doc in the...
What is cold boot (hard boot)?
What must an investigator do before disconnecting an iPod from any...
What happens when a file is deleted by a Microsoft operating...
Your company uses Cisco routers exclusively throughout the network....
In handling computer-related incidents, which IT role should be...
Which of the following is a list of recently used programs or opened...
How many possible sequence number combinations are there in TCP/IP...
Diskcopy is:
A small law firm located in the Midwest has possibly been breached by...
When obtaining a warrant, it is important to:
When making the preliminary investigations in a sexual harassment...
On Linux/Unix based Web servers, what privilege should the daemon...
An International Mobile Equipment Identifier (IMEI) is a 15-digit...
What is the target host IP in the following command?
When investigating a computer forensics case where Microsoft Exchange...
When needing to search for a website that is no longer present on the...
Jim performed a vulnerability analysis on his network and found no...
What malware analysis operation can the investigator perform using the...
When conducting computer forensic analysis, you must guard...
What does the command "C:\>wevtutil gl <log name>" display?
Which of the following tool creates a bit-by-bit image of an evidence...
You just passed your ECSA exam and are about to start your first...
Which of the following techniques can be used to beat steganography?
Why are Linux/Unix based computers better to use than Windows...
Bill is the accounting manager for Grummon and Sons LLC in Chicago. On...
Paul is a computer forensics investigator working for Tyler &...
What will the following command produce on a website login page?...
If a PDA is seized in an investigation while the device is turned on,...
Ivanovich, a forensics investigator, is trying to extract complete...
What does 254 represent in ICCID 89254021520014515744?
Which of the following application password cracking tool can discover...
What feature of Decryption Collection allows an investigator to crack...
If the partition size is 4 GB, each cluster will be 32 K. Even if a...
Examination of a computer by a technically unauthorized person will...
Which of the following techniques delete the files permanently?
A picture file is recovered from a computer under investigation....
You are the network administrator for a small bank in Dallas, Texas....
What is the size value of a nibble?
Printing under a Windows Computer normally requires which one of the...
Email archiving is a systematic approach to save and protect the data...
Files stored in the Recycle Bin in its physical location are renamed...
Which tool can help the investigator if he wants to examine changes...
An investigator has extracted the device descriptor for a 1GB thumb...
In Microsoft file structures, sectors are grouped together to form
Before you are called to testify as an expert, what must an attorney...
If you see the files ZerO.tar.gz and copy.tar.gz on a Linux system...
Adam, a forensic investigator, is investigating an attack on Microsoft...
Which of the following commands shows you the names of all open shared...
If an attacker's computer sends an IPID of 31400 to a zombie...
Which of the following statements is incorrect when preserving digital...
John is working on his company policies and guidelines. The section he...
You are employed directly by an attorney to help investigate an...
Which of the following acts as a network intrusion detection system as...
Jessica works as systems administrator for a large electronics firm....
In what way do the procedures for dealing with evidence in a criminal...
What is the location of the binary files required for the functioning...
When setting up a wireless network with multiple access points, why is...
What is the framework used for application development for iOS-based...
Madison is on trial for allegedly breaking into her university's...
Which command line tool is used to determine active network...
The _________________ refers to handing over the...
John is using Firewalk to test the security of his Cisco PIX firewall....
Given the drive dimensions as follows and assuming a sector has 512...
A state department site was recently attacked and all the servers had...
When investigating a wireless attack, what information can be obtained...
When using Windows acquisitions tools to acquire digital evidence, it...
With Regard to using an Antivirus scanner during a computer forensics...
Which of the following is a record of the characteristics of a file...
When analyzing logs, it is important that the clocks of all the...
Where is the default location for Apache access logs on a Linux...
Richard is extracting volatile data from a system and uses the command...
What is a good security method to prevent unauthorized users from...
Office Documents (Word, Excel and PowerPoint) contain a code that...
When using an iPod and the host computer is running Windows, what file...
Identify the file system that uses SBitMap file to keep track of all...
What does the part of the log, "% SEC-6-IPACCESSLOGP", extracted...
What technique is used by JPEGs for compression?
After passing her CEH exam, Carol wants to ensure that her network is...
What stage of the incident handling process involves reporting events?
During an investigation, Noel found the following SIM card from the...
When a router receives an update for its routing table, what is the...
Which is a standard procedure to perform during all computer forensics...
With the standard Linux second extended file system (Ext2fs), a file...
A forensic examiner is examining a Windows system seized from a crime...
Brian needs to acquire data from RAID storage. Which of the following...
In which registry does the system store the Microsoft security IDs?
Which of the following setups should a tester choose to analyze...
You have been called in to help with an investigation of an alleged...
Harold is a security analyst who has just run the rdisk /s command to...
The given image displays information about date and time of...
Why should you note all cable connections for a computer you want to...
From the following spam mail header, identify the host IP that sent...
Harold wants to set up a firewall on his network but is not sure which...
Which one do you like?
When marking evidence that has been collected with the...
You have compromised a lower-level administrator account on an Active...
In the context of file deletion process, which of the following...
Which of the following standard represents a legal precedent set in...
Casey has acquired data from a hard disk in an open source acquisition...
What are the security risks of running a "repair"...
You have used a newly released forensic investigation tool, which...
What type of file is represented by a colon (:) with a name following...
What is the name of the first reserved sector in File allocation...
You are assisting a Department of Defense contract company to become...
After passively scanning the network of Department of Defense (DoD),...
The offset in a hexadecimal code is:
What type of equipment would a forensics investigator store in a...
What does ICMP Type 3/Code 13 mean?
Item 2lf you come across a sheepdip machine at your client site, what...
Mail logs contain which of the following information to help you in...
Which of the following tools is not a data acquisition hardware tool?
What is considered a grant of a property right given to an individual...
Sectors are pie-shaped regions on a hard disk that store data. Which...
Cylie is investigating a network breach at a state organization in...
Before performing a logical or physical search of a drive in Encase,...
Which of the following is a MAC-based File Recovery Tool?
Preparing an image drive to copy files to is the first step in Linux...
The surface of a hard disk consists of several concentric rings known...
Which of the following is a responsibility of the first responder?
At what layer does a cross site scripting attack occur on?
You are carrying out the last round of testing for your new website...
What will the following command accomplish in Linux? fdisk /dev/hda
Which Intrusion Detection System (IDS) usually produces the most false...
Which response organization tracks hoaxes as well as viruses?
A honey pot deployed with the IP 172.16.1.108 was compromised by an...
This type of testimony is presented by someone who does the actual...
Heather, a computer forensics investigator, is assisting a group of...
An attacker has compromised a cloud environment of a company and used...
You are working as an investigator for a corporation and you have just...
What do you call the process in which an attacker uses magnetic field...
Rusty, a computer forensics apprentice, uses the command nbtstat -c...
The objective of this act was to protect consumers' personal financial...
Pie folowing excerpt is taken from a honeypot log. Pie log captures...
Why would a company issue a dongle with the software they sell?
Which MySQL log file contains information on server start and stop?
A Linux system is undergoing investigation. In which directory should...
Which federal computer crime law specifically refers to fraud and...
Which of the Mowing commands shows you the username and IP address...
What does the superblock in Linux define?
In Linux, what is the smallest possible shellcode?
In a Linux-based system, what does the command "Last -F"...
Microsoft Security IDs are available in Windows Registry Editor. The...
Shane has started the static analysis of a malware and is using the...
When a user deletes a file, the system creates a $1 file to store its...