National Polytechnic Institute CHFI Practice Test

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Dale
D
Dale
Community Contributor
Quizzes Created: 6 | Total Attempts: 4,377
| Attempts: 917 | Questions: 150
Please wait...
Question 1 / 150
0 %
0/100
Score 0/100
1. Which command line tool is used to determine active network connections?

Explanation

Netstat is a command line tool that is used to determine active network connections. It displays a variety of information about active network connections, including the local and remote IP addresses, the protocol being used, and the state of the connection. By using netstat, users can monitor and troubleshoot network connections on their system, making it a valuable tool for network administrators and system administrators.

Submit
Please wait...
About This Quiz
National Polytechnic Institute CHFI Practice Test - Quiz

The National Polytechnic Institute CHFI Practice Test assesses knowledge in cybercrime forensic investigation. It covers tasks in investigation phases, tools like Wireshark, Linux commands for data copying, and... see moreAndroid graphics libraries. Ideal for enhancing forensic investigation skills relevant to cybersecurity professionals. see less

2. Which network attack is described by the following statement? ⟦"At least five Russian major banks came under a continuous hacker attack, although online client services were not disrupted. The attack came from a wide-scale botnet involving at least 24,000 computers, located in 30 countries."⟧

Explanation

The given statement describes a DDoS (Distributed Denial of Service) attack. In this type of attack, a large number of compromised computers, known as a botnet, are used to flood a target system or network with a high volume of traffic, overwhelming its resources and causing disruption. In this case, the Russian major banks experienced a continuous hacker attack from a botnet consisting of 24,000 computers located in 30 countries, but their online client services were not disrupted. This aligns with the characteristics of a DDoS attack.

Submit
3. Report writing is a crucial stage in the outcome of an investigation. Which information should NOT be included in the report section?

Explanation

In a report section, it is important to provide factual information based on evidence rather than speculation or personal opinions. Including speculation or opinions as to the cause of the incident can undermine the credibility and objectivity of the report. The purpose of the report, the author, and an incident summary are all relevant and necessary information to include in a report.

Submit
4. Which of the following is a part of a Solid-State Drive (SSD)?

Explanation

NAND-based flash memory is a type of non-volatile storage technology that is commonly used in Solid-State Drives (SSDs). Unlike traditional hard disk drives (HDDs) that use spinning disks, SSDs use NAND flash memory chips to store data. NAND flash memory is known for its fast read and write speeds, durability, and low power consumption, making it an ideal choice for SSDs. It allows for faster boot-up times, quicker data transfer rates, and improved overall performance compared to HDDs. Therefore, NAND-based flash memory is an essential component of a Solid-State Drive.

Submit
5. An expert witness is a ____________ who is normally appointed by a party to assist the formulation and preparation of a party's claim or defense.

Explanation

An expert witness is someone who is appointed by a party to assist in the formulation and preparation of their claim or defense. They provide specialized knowledge and expertise in a particular field relevant to the case. They are not a crime scene spectator or an ex-criminal, and while a government officer may sometimes serve as an expert witness, the term "expert advisor" more accurately describes the role and responsibilities of an expert witness.

Submit
6. Which of the following tool captures and allows you to interactively browse the traffic on a network?

Explanation

Wireshark is a tool that captures and allows users to interactively browse network traffic. It is a popular network protocol analyzer that can be used to monitor and analyze network packets in real-time. Wireshark provides detailed information about network protocols, packet headers, and data payload, allowing users to troubleshoot network issues, detect network attacks, and analyze network performance. It is widely used by network administrators and security professionals to gain insights into network traffic and identify potential security vulnerabilities.

Submit
7. Which of the following techniques delete the files permanently?

Explanation

Artifact wiping is a technique that permanently deletes files by overwriting them with random data, making the original data unrecoverable. This process ensures that the deleted files cannot be recovered using any data recovery methods or tools. Unlike other techniques mentioned, such as trail obfuscation, data hiding, and steganography, which aim to conceal or hide files, artifact wiping focuses on completely removing the files from the system, leaving no trace behind.

Submit
8. Sheila is a forensics trainee and is searching for hidden image files on a hard disk. She used a forensic investigation tool to view the media in hexadecimal code for simplifying the search process. Which of the following hex codes should she look for to identify image files?

Explanation

https://www.garykessler.net/library/file_sigs.html
PDF = [25 50 44 46]
jpeg = [ff d8 ff]
ZIP = [50 4B 03 04]
Object Linking and Embedding (OLE) Compound File (CF) = [d0 cf 11 e0]

Submit
9. Smith, a network administrator with a large MNC, was the first to arrive at a suspected crime scene involving criminal use of compromised computers. What should be his first response while maintaining the integrity of evidence?

Explanation

Smith's first response should be to record the system state by taking photographs of the physical system and the display. This is important for maintaining the integrity of the evidence as it captures the current state of the systems and provides a visual record of any potential tampering or changes that may occur during the investigation. It allows for a detailed analysis and comparison of the system's state before and after any potential actions are taken.

Submit
10. To which phase of the Computer Forensic Investigation Process does the Planning and Budgeting of a Forensics Lab belong?

Explanation

The Planning and Budgeting of a Forensics Lab belongs to the Pre-investigation Phase of the Computer Forensic Investigation Process. This phase involves preparing for the investigation by determining the scope, objectives, and resources required. Planning and budgeting are essential steps in this phase as they help in allocating the necessary resources, setting timelines, and ensuring that the investigation is conducted efficiently and effectively.

Submit
11. Which of the following techniques can be used to beat steganography?

Explanation

Steganalysis is the correct answer because it refers to the process of detecting and analyzing hidden information within digital media, such as images or audio files, that has been concealed using steganography techniques. Steganalysis techniques can help identify the presence of steganographic content, thereby "beating" steganography by revealing its hidden messages. Encryption, cryptanalysis, and decryption are not specifically related to steganography, although they may be used in combination with steganalysis to further analyze and understand the hidden information.

Submit
12. When a file or folder is deleted, the complete path, including the original file name, is stored in a special hidden file called "INFO2" in the Recycled folder. If the INFO2 file is deleted, it is re-created when you ________.

Explanation

When you restart Windows, the INFO2 file is re-created. This file is responsible for storing the complete path and original file name of deleted files or folders. Restarting Windows allows the system to recreate this hidden file, ensuring that the information of deleted files and folders can be stored properly in the Recycled folder.

Submit
13. Adam, a forensic analyst, is preparing VMs for analyzing malware. Which of the following is NOT a best practice?

Explanation

Enabling shared folders is not a best practice when preparing VMs for analyzing malware. This is because shared folders can potentially allow malware to spread from the VM to the host device or other VMs. It is important to isolate the host device and the VMs to prevent any contamination or unauthorized access. Installing malware analysis tools, using network simulation tools, and isolating the host device are all considered best practices for analyzing malware in VMs.

Submit
14. POP3 (Post Office Protocol 3) is a standard protocol for receiving an email that deletes mail on the server as soon as the user downloads it. When a message arrives, the POP3 server appends it to the bottom of the recipient's account file, which can be retrieved by the email client at any preferred time. Email client connects to the POP3 server at __________ by default to fetch emails.

Explanation

The correct answer is Port 110. POP3 uses Port 110 by default for the email client to connect to the POP3 server and fetch emails. This port allows the email client to establish a connection with the server and retrieve the emails from the recipient's account file.

Submit
15. Which of the following tools will help the investigator to analyze web server logs?

Explanation

Deep Log Analyzer is the correct answer because it is a tool specifically designed for analyzing web server logs. It provides detailed insights into website visitor behavior, traffic sources, and other important metrics. It helps investigators to identify potential security threats, track user activities, and analyze server performance. With its advanced features and intuitive interface, Deep Log Analyzer is a valuable tool for analyzing and understanding web server logs.

Submit
16. Which of the following is a precomputed table containing word lists like dictionary files and brute force lists and their hash values?

Explanation

A rainbow table is a precomputed table that contains word lists like dictionary files and brute force lists, along with their corresponding hash values. It is used in password cracking to quickly find the plaintext value of a given hash. By comparing the hash values in the table with the target hash, the corresponding plaintext value can be determined. This table saves time and computational resources by eliminating the need to compute hash values for each password attempt.

Submit
17. Which of the following is a command line packet sniffer that runs on Linux and UNIX systems?

Explanation

TCPDump is a command line packet sniffer that is specifically designed to run on Linux and UNIX systems. It allows users to capture and analyze network traffic in real-time, providing detailed information about the packets being transmitted over the network. TCPDump is widely used by network administrators and security professionals for troubleshooting network issues, monitoring network activity, and detecting potential security threats. It offers a wide range of powerful features and options, making it a popular choice for network analysis on Linux and UNIX platforms.

Submit
18. Which of the following acts as a network intrusion detection system as well as network intrusion prevention system?

Explanation

Acunetix: is an advanced web vulnerability scanner used to discover SQL injection and XSS black boxes. It automatically crawls your websites and performs black box AND grey box hacking techniques which finds dangerous vulnerabilities that can compromise your website and data. It also tests for SQL Injection, XSS, XXE, SSRF, Host Header Injection and over 4500 other web vulnerabilities. It has the most advanced scanning techniques generating the least false positives possible. Simplifies the web application security process through its inbuilt vulnerability management features that help you prioritize and manage vulnerability resolution.

Kismet: is a wireless network detector, sniffer, and intrusion detection system. Kismet works predominately with Wi-Fi networks; however, we can expand it via plug-ins to handle other network types.

Snort: is a network intrusion detection system and intrusion prevention system created in 1998 by Martin Roesch, former founder and CTO of Sourcefire. Snort is now developed by Cisco, which purchased Sourcefire in 2013, at which Roesch is a chief security architect.

Nikto: is a command-line vulnerability scanner that scans webservers for dangerous files/CGIs, outdated server software and other problems. It performs generic and server type specific checks. It also captures and prints any cookies received.

Submit
19. What is a cold boot (hard boot)?

Explanation

not-available-via-ai

Submit
20. If the partition size is 4 GB, each cluster will be 32 K. Even if a file needs only 10 K, the entire 32 K will be allocated, resulting in 22 K of ________.

Explanation

When a file is stored on a partition with a cluster size of 32 K, even if the file is smaller (10 K in this case), the entire cluster (32 K) will be allocated for it. This means that there will be unused space within the cluster, which is known as slack space. In this scenario, the 22 K of unused space within the allocated cluster is referred to as slack space.

Submit
21. Which of the following are small pieces of data sent from a website and stored on the user's computer by the user's web browser to track, validate, and maintain specific user information?

Explanation

Cookies are small pieces of data that are sent from a website and stored on the user's computer by the user's web browser. They are used to track, validate, and maintain specific user information. Cookies enable websites to remember user preferences, track user behavior, and provide personalized experiences. They are commonly used for authentication, session management, and storing user-specific settings.

Submit
22. Which of the following attack uses HTML tags like:


										

Explanation

Normal XSS script:
Hex encoded XSS script: %3cscript%3ealert(”XSS”)%3c/script%3e>

Submit
23. Stephen is checking an image using Compare Files by The Wizard, and he sees the file signature is shown as:
FF D8 FF E1
What is the file type of the image?

Explanation

GIF [Hex: 47 49 46]
JPEG [Hex: ff d8 ff]
PNG [Hex: 89 50 4e]
BMP [Hex: 42 4d]

Submit
24. What must an attorney do first before you are called to testify as an expert?

Explanation

Before you are called to testify as an expert, an attorney must first qualify you as an expert witness. This involves establishing your credentials, expertise, and experience in the relevant field to ensure that you possess the necessary knowledge and qualifications to provide expert testimony. This step is crucial in establishing your credibility and allowing the court to recognize you as an expert in order to give weight to your testimony.

Submit
25. An executive had leaked the company trade secrets through an external drive. What process should the investigation team take if they could retrieve his system?

Explanation

Postmortem analysis refers to the investigation and analysis of an incident after it has occurred. In this scenario, the investigation team should conduct a postmortem analysis of the executive's system to gather evidence and understand the extent of the trade secret leak. This process involves examining the system's logs, files, and any other relevant data to determine how the leak occurred, identify any vulnerabilities or security breaches, and develop strategies to prevent similar incidents in the future.

Submit
26. Smith, an employee of a reputed forensic investigation firm, has been hired by a private organization to investigate a laptop that is suspected to be involved in the hacking of the organization's DC server. Smith wants to find all the values typed into the Run box in the Start menu. Which of the following registry keys will Smith check to find the above information?

Explanation

Smith, as a forensic investigator, is looking for values typed into the Run box in the Start menu on a laptop suspected of being involved in hacking. To find this information, Smith will check the "RunMRU" key in the registry. The RunMRU key stores a list of the most recently used programs and commands that have been executed using the Run box. By examining this key, Smith can identify the values that have been typed into the Run box and gather evidence related to the hacking incident.

Submit
27. A state department site was recently attacked, and all the servers had their hard disks erased. The incident response team sealed the area and commenced an investigation. During evidence collection, they came across a USB flash drive that did not have the standard labeling on it. The incident team inserted the flash drive into an isolated system and found that the system disk was accidentally erased. They decided to call in the FBI for further investigation. Meanwhile, they shortlisted possible suspects including three summer interns. Where did the incident team go wrong?

Explanation

The incident team went wrong by tampering with the evidence by using the USB flash drive. By inserting the flash drive into an isolated system, they unintentionally erased the system disk, which could potentially compromise the integrity of the evidence. It is crucial to handle and preserve evidence carefully to ensure its admissibility and maintain the chain of custody.

Submit
28. Which of the following is an iOS Jailbreaking tool?

Explanation

RedSn0w allows the investigator to jailbreak into an iPhone, iPod Touch, or iPad by running a variety of firmware versions. Maintained and created by the Dev-Team, RedSn0w has become one of the most used jail-breaking tools to jailbreak iOS firmware.

Submit
29. Which of the following Android libraries are used to render 2D (SGL) or 3D (OpenGL/ES) graphics content to the screen?

Explanation

The correct answer is OpenGL/ES and SGL. These two Android libraries are used to render 2D or 3D graphics content to the screen. OpenGL/ES is a widely used graphics API that allows developers to create high-performance 2D and 3D graphics on Android devices. SGL (Software Graphics Library) is a software-based graphics library that provides a simplified interface for rendering 2D graphics. Both libraries are essential for creating visually appealing and interactive graphics applications on Android.

Submit
30. You are working as an independent computer forensics investigator and received a call from a systems administrator for a local school system requesting your assistance. One of the students at the local high school is suspected of downloading inappropriate images from the Internet to a PC in the Computer Lab. When you arrive at the school, the systems administrator hands you a hard drive and tells you that he made a "simple backup copy" of the hard drive in the PC and put it on this drive and requests that you examine the drive for evidence of the suspected images. You inform him that a "simple backup copy" will not provide deleted files or recover file fragments. What type of copy do you need to make to ensure that the evidence found is complete and admissible in future proceeding?

Explanation

A bit-stream copy is needed to ensure that the evidence found is complete and admissible in future proceedings. A bit-stream copy is an exact replica of the original hard drive, including all the data, files, and file fragments. It captures every bit of information from the source drive, including deleted files and file fragments, making it the most comprehensive and accurate copy for forensic analysis. Other types of copies, such as a simple backup copy or incremental backup copy, may not capture all the necessary information and may not be admissible in court.

Submit
31. Lynne receives the following email:
Dear [email protected]!
We are sorry to inform you that your ID has been temporarily frozen due
to incorrect or missing information saved at 2016/11/10 20:40:24 You
have 24 hours to fix this problem or risk to be closed permanently!

To proceed Please Connect >> My Apple ID
Thank You
The link to My Apple ID shows https://byggarbetsplatsen.se/backup/signon/ What type of attack is this?

Explanation

This is a phishing attack. Phishing is a type of cyber attack where the attacker impersonates a legitimate organization or individual in order to trick the recipient into revealing sensitive information, such as passwords or credit card numbers. In this case, the email claims to be from Apple and asks the recipient to click on a link to fix a problem with their account. However, the link leads to a suspicious website that is not associated with Apple, indicating that it is a phishing attempt.

Submit
32. What is the purpose of using an obfuscator in malware?

Explanation

An obfuscator is used in malware to avoid detection by security mechanisms. By obfuscating the code, the malware becomes more difficult to analyze and understand, making it harder for security systems to detect and block. This allows the malware to bypass security measures and carry out its malicious activities without being detected.

Submit
33. Which of the following built-in Linux commands can be used by forensic investigators to copy data from a disk drive?

Explanation

The correct answer is "dd and dcfldd". These are built-in Linux commands that can be used by forensic investigators to copy data from a disk drive. The "dd" command is commonly used for creating disk images or copying data from one location to another, while "dcfldd" is an enhanced version of "dd" with additional features for forensic purposes. These commands are essential tools for investigators to preserve and analyze data without altering the original source.

Submit
34. Which of the following files DOES NOT use Object Linking and Embedding (OLE) technology to embed and link to other objects?

Explanation

The Portable Document Format (PDF) does not use Object Linking and Embedding (OLE) technology to embed and link to other objects. While MS-office Word Document, MS-office Word PowerPoint, and MS-office Word OneNote all use OLE technology to embed and link to other objects, PDF files do not have this functionality. PDF files are designed to be platform-independent and retain their formatting regardless of the software or hardware used to view them, which is why they do not rely on OLE technology.

Submit
35. A suspect is accused of violating the acceptable use of computing resources as he has visited adult websites and downloaded images. The investigator wants to demonstrate that the suspect did indeed visit these sites. However, the suspect has cleared the search history and emptied the cookie cache. Moreover, he has removed any images he might have downloaded. What can the investigator do to prove the violation? (Choose the most feasible option)

Explanation

The most feasible option to prove the violation is to image the disk and try to recover deleted files. By creating a forensic image of the suspect's disk, the investigator can preserve the current state of the disk and prevent any further changes. This allows for the possibility of recovering deleted files, including any evidence of visiting adult websites and downloading images. This method provides a solid chance of finding the necessary evidence, even if the suspect has cleared search history and removed downloaded images.

Submit
36. Shane, a forensic specialist, is investigating an ongoing attack on a MySQL database server hosted on a Windows machine with SID "WIN-ABCDE12345F." Which of the following log files will help Shane in tracking all the client connections and activities performed on the database server?

Explanation

Status and log files stored in data directory include:
    1. Process ID file (HOSTNAME.pid), contains the process ID created when the server starts
    2. Error log (HOSTNAME.err), contains the information associated with the startup and shutdown events, and errors
    3. General query log (HOSTNAME.log), logs the client connections and activities
    4. Binary log (HOSTNAME-bin.nnnnnn), contains the events that describe the changes occurred in the database
    5. Binary log index (HOSTNAME-bin.index), contains the list of all the binary log files currently available in the data directory
    6. Relay log (HOSTNAMErelay-bin.n), contains the events that describe the changes occurred in the database
    7. Relay log index (HOSTNAMErelay-bin.index), contains the list of all the relay log files currently available in the data directory
    8. Master info file (master.info) created by a replication slave server, that contains the essential parameters used for
connecting to the master slave
    9. Relay log info file (relay-log.info) created by a replication slave server, that contains the status of relay log processing
    10. Slow query log (HOSTNAMEslow.log), a text file that contains statements which take longer processing time

Submit
37. The process of restarting a computer that is already turned on through the operating system is called?

Explanation

A warm boot refers to the process of restarting a computer that is already turned on through the operating system. This type of reboot allows the computer to restart without completely shutting down and starting up again. It is a quicker and more efficient way to resolve certain issues or apply changes to the system. Unlike a cold boot, which involves starting the computer from a powered-off state, a warm boot retains the current system state and allows for a seamless transition back into the operating system.

Submit
38.  A forensic examiner is examining a Windows system seized from a crime scene. During the examination of a suspect file, he discovered that the file is password protected. He tried guessing the password using the suspect's available information but without any success. Which of the following tool can help the investigator to solve this issue?

Explanation

Cain & Abel is a tool commonly used by forensic investigators to recover passwords. It can perform various password cracking techniques, such as dictionary attacks and brute-force attacks, to attempt to guess the password of a protected file. This tool would be helpful in this scenario as the forensic examiner can use it to try different password combinations and potentially gain access to the suspect file.

Submit
39. Which of the following network attacks refers to sending huge volumes of email to an address in an attempt to overflow the mailbox, or overwhelm the server where the email address is hosted, to cause a denial-of-service attack?

Explanation

Mail bombing refers to sending huge volumes of email to an address in an attempt to overflow the mailbox or overwhelm the server where the email address is hosted, causing a denial-of-service attack. This attack can disrupt the normal functioning of the email server, making it difficult for legitimate users to access their emails. It is a form of cyber attack that aims to disrupt the communication channels and cause inconvenience or damage to the targeted individual or organization.

Submit
40. Which of the following Windows-based tools displays who is logged onto a computer, either locally or remotely?

Explanation

PsLoggedOn is an applet that displays both the locally logged on users and users logged on via resources for either the local computer, or a remote one. If you specify a user name instead of a computer, PsLoggedOn searches the computers in the network neighborhood and tells you if the user is currently logged on.

Submit
41. Which of the following tool is used to locate IP addresses?

Explanation

SmartWhois is a tool that is used to locate IP addresses. It provides detailed information about IP addresses, domain names, and network providers. With SmartWhois, users can easily find the owner of a specific IP address, track the location of an IP address, and obtain information about the organization or individual associated with it. This tool is commonly used by network administrators, cybersecurity professionals, and website owners to gather information about IP addresses and ensure network security.

Submit
42. Which of the following attacks allows an attacker to access restricted directories, including application source code, configuration, and critical system files, and to execute commands outside of the web server's root directory?

Explanation

Directory traversal is an attack that allows an attacker to access restricted directories and execute commands outside of the web server's root directory. This attack takes advantage of vulnerabilities in the application's input validation and file path handling. By manipulating file paths, the attacker can bypass security measures and gain unauthorized access to sensitive files, such as application source code, configuration files, and critical system files. This can lead to further exploitation and compromise of the system's integrity and confidentiality.

Submit
43. Which of the following techniques creates a replica of an evidence media?

Explanation

Bit Stream Imaging is a technique that creates a replica of an evidence media. It involves creating a bit-by-bit copy of the entire storage device, including both allocated and unallocated space. This process ensures that all data, including deleted or hidden files, is preserved in its original form. By creating a replica, investigators can analyze the evidence without altering or damaging the original media, maintaining its integrity for legal purposes.

Submit
44. Richard is extracting volatile data from a system and uses the command:
doskey /history
What is he trying to extract?

Explanation

The investigator should use the doskey /history command, which shows the history of the commands typed into that prompt.

Submit
45. Which of the following files gives information about the client sync sessions in Google Drive on Windows?

Explanation

Installing the Google Drive Client version in windows10 OS, creates Sync_log.log file in a user_default folder of Drive. The log file contains the information about the client sync session.

Submit
46. Ron, a computer forensics expert, is investigating a case involving corporate espionage. He has recovered several mobile computing devices from the crime scene. One of the evidence that Ron possesses is a mobile phone from Nokia that was left in ON condition. Ron needs to recover the IMEI number of the device to establish the identity of the device owner.  Which of the following key combinations can he use to recover the IMEI number?

Explanation

Ron can use the key combination *#06# to recover the IMEI number of the Nokia mobile phone.

Submit
47. Which of the following statements is INCORRECT when preserving digital evidence?

Explanation

When preserving digital evidence, it is important not to turn on the computer or make any changes to the system. Extracting Windows event viewer log files should be done using a forensically sound method, such as creating a forensic image of the hard drive. Turning on the computer and extracting log files can potentially alter or destroy evidence, making it unreliable for investigation purposes.

Submit
48. Which of the following is NOT a part of the pre-investigation phase?

Explanation

Pre-investigation Phase
This phase involves all the tasks performed prior to the commencement of the actual investigation. It involves setting up a computer forensics lab, building a forensics workstation, investigation toolkit, the investigation team, getting approval from the relevant authority, etc.. This phase also includes steps such as planning the process, defining mission goals, and securing the case perimeter and devices involved.
1 Setting Up a Computer Forensics Lab
1.1 Planning and Budgeting
1.2 Physical Location and Structural Design Considerations
1.3 Work Area Considerations
1.4 Physical Security Recommendations
1.5 Fire-Suppression Systems
1.6 Evidence Locker Recommendations
1.7 Auditing the Security of a Forensics Lab
1.8 Human Resource Considerations
1.9 Building a Forensics Workstation
1.10 Basic Workstation Requirements in a Forensics Lab
1.11 Build a Computer Forensics Toolkit
1.12 Forensics Hardware
1.13 Forensics Software
2 Build the Investigation Team
2.1 Forensic Practitioner Certification and Licensing
3 Review Policies and Laws
3.1 Forensics Laws
4 Establish Quality Assurance Processes
4.1 Quality Assurance Practices in Digital Forensics
4.2 General Quality Assurance in the Digital Forensic Process
4.3 Quality Assurance Practices: Laboratory Software and Hardware
4.4 Laboratory Accreditation Programs
5 Data Destruction Industry Standards
6 Risk Assessment

Submit
49. Which among the following search warrants allows the first responder to search and seize the victim's computer components such as hardware, software, storage devices, and documentation?

Explanation

An Electronic Storage Device Search Warrant allows the first responder to search and seize the victim’s computer components such as:
• Hardware
• Software
• Storage devices
• Documentation

If the crime involves the Internet, the first responder needs information about the victim’s computer from the service provider end. A Service Provider Search Warrant allows first responders or investigators to consult the service provider and obtain the available victim’s computer information.
First responders can obtain the following information from the service provider:
• Service records
• Billing records
• Subscriber information

Submit
50. Event correlation is a procedure that is assigned with a new meaning for a set of events that occur in a predefined interval of time. Which type of correlation will you use if your organization wants to use different OS and network hardware platforms throughout the network?

Explanation

Cross-platform correlation would be the appropriate type of correlation to use if the organization wants to use different operating systems and network hardware platforms throughout the network. This type of correlation allows for the analysis and correlation of events across multiple platforms, enabling the organization to identify patterns and relationships between events occurring on different platforms. It helps in understanding the impact of events across the network and can assist in troubleshooting and resolving issues that may arise due to the use of different platforms.

Submit
51. Which of the following is NOT considered physical evidence?

Explanation

Physical evidence refers to tangible objects that can be touched, seen, or measured. Cables, removable media, and publications are all examples of physical evidence because they are physical objects that can be collected and analyzed in a criminal investigation. However, an image file on a hard disk is not considered physical evidence because it is a digital file stored on a computer. It cannot be directly touched or measured, making it a form of electronic or digital evidence instead.

Submit
52. A small law firm located in the Midwest has possibly been breached by a computer hacker who was looking to obtain information on their clientele. The law firm does not have any on-site IT employees but wants to search for evidence of the breach themselves to prevent any possible media attention. Why would this not be recommended?

Explanation

Searching can change date/time stamps because when a user accesses files or performs searches on a computer, it can modify the metadata associated with those files, including the date and time stamps. This can potentially tamper with the evidence and make it difficult to establish an accurate timeline of events during the breach. Therefore, it is not recommended for the law firm to search for evidence themselves as it could unintentionally alter crucial information that may be needed for a proper investigation.

Submit
53. Netstat is a tool for collecting information regarding network connections. It provides a simple view of TCP and UDP connections, and their state and network traffic statistics. Which of the following commands shows you the TCP and UDP network connections, listening ports, and the identifiers?

Explanation

Displays protocol statistics and current TCP/IP network connections.

NETSTAT [-a] [-b] [-e] [-f] [-n] [-o] [-p proto] [-r] [-s] [-x] [-t] [interval]

-a..............Displays all connections and listening ports.
-b..............Displays the executable involved in creating each connection or listening
.................port. In some cases well-known executables host multiple independent
.................components, and in these cases the sequence of components involved in
.................creating the connection or listening port is displayed. In this case the
.................executable name is in [ ] at the bottom, on top is the component it called,
.................and so forth until TCP/IP was reached. Note that this option can be time-
.................consuming and will fail unless you have sufficient permissions.
-e..............Displays Ethernet statistics. This may be combined with the -s option.
-f...............Displays Fully Qualified Domain Names (FQDN) for foreign addresses.
-n..............Displays addresses and port numbers in numerical form.
-o..............Displays the owning process ID associated with each connection.
-p proto....Shows connections for the protocol specified by proto; proto may be any
.................of: TCP, UDP, TCPv6, or UDPv6. If used with the -s option to display per-
.................protocol statistics, proto may be any of: IP, IPv6, ICMP, ICMPv6, TCP,
.................TCPv6, UDP, or UDPv6.
-q..............Displays all connections, listening ports, and bound non-listening TCP
.................ports. Bound non-listening ports may or may not be associated with an
.................active connection.
-r...............Displays the routing table.
-s..............Displays per-protocol statistics. By default, statistics are shown for IP,
.................IPv6, ICMP, ICMPv6, TCP, TCPv6, UDP, and UDPv6; the -p option may be
.................used to specify a subset of the default.
-t...............Displays the current connection offload state.
-x..............Displays NetworkDirect connections, listeners, and shared endpoints.
-y..............Displays the TCP connection template for all connections. Cannot be
.................combined with the other options.
interval....Redisplays selected statistics, pausing interval seconds between each
.................display. Press CTRL+C to stop redisplaying statistics. If omitted, netstat
.................will print the current configuration information once.

Submit
54. Which of the following email headers specifies an address for mailer-generated errors, like "no such user" bounce messages, to go to (instead of the sender's address)?

Explanation

The Errors-To header specifies an address for mailer-generated errors to be sent to, instead of the sender's address. This header is used to specify an alternate email address where error messages should be directed, allowing the sender to receive bounce messages or other error notifications at a different address.

Submit
55. Jacob is a computer forensics investigator with over 10 years of experience in investigations and has written over 50 articles on computer forensics. He has been called upon as a qualified witness to testify the accuracy and integrity of the technical log files gathered in an investigation into computer fraud. What is the term used for Jacob's testimony in this case?

Explanation

Jacob's testimony in this case is referred to as authentication. Authentication is the process of verifying the accuracy and integrity of evidence or information. In this scenario, Jacob's testimony is crucial in establishing the authenticity of the technical log files gathered in the investigation. As an experienced computer forensics investigator, his testimony serves to confirm the validity and reliability of the evidence, ensuring its admissibility in court.

Submit
56. Madison is on trial for allegedly breaking into her university's internal network. The police raided her dorm room and seized all of her computer equipment. Madison's lawyer is trying to convince the judge that the seizure was unfounded and baseless. Under which US Amendment is Madison's lawyer trying to prove the police violated?

Explanation

The 4th Amendment - bars the government from unreasonable search and seizure of an individual or their private property.

The 1st Amendment - provides several rights protections: to express ideas through speech and the press, to assemble or gather with a group to protest or for other reasons, and to ask the government to fix problems. It also protects the right to religious beliefs and practices. It prevents the government from creating or favoring a religion.

The 5th Amendment - provides several protections for people accused of crimes. It states that serious criminal charges must be started by a grand jury.  A person cannot be tried twice for the same offense (double jeopardy) or have property taken away without just compensation. People have the right against self-incrimination and cannot be imprisoned without due process of law (fair procedures and trials.)

The 10th Amendment - says that the Federal Government only has those powers delegated in the Constitution. If it isn’t listed, it belongs to the states or to the people.

Submit
57. Amber, a black hat hacker, has embedded malware into a small enticing advertisement and posted it on a popular ad-network that displays across various websites. What is she doing?

Explanation

Malvertising: Involves embedding malware-laden advertisements in authentic online advertising channels to spread malware onto the systems of unsuspecting users.

Compromised Legitimate Websites: Often, attackers use compromised websites to infect systems with malware. When an unsuspecting user visits the compromised website, the malware secretly installs itself on the user’s system and thereafter carries out malicious activities.

Social Engineered Click-jacking: Attackers inject malware into legitimate- looking websites to trick users into clicking them. When clicked, the malware embedded in the link executes without the knowledge or consent of the user.

Spearphishing Sites: The technique helps attacker in mimicking legitimate institutions, such as banks, in an attempt to steal passwords, credit card and bank account data, and other sensitive information.

Submit
58. What does the 63.78.199.4(161) denote in a Cisco router log?
Mar 14 22:57:53.425 EST: %SEC-6-IPACCESSLOGP: list internet-inbound denied udp 66.56.16.77(1029) -> 63.78.199.4(161), 1 packet

Explanation

The given Cisco router log entry shows that a packet was denied from the source IP address 66.56.16.77 on UDP port 1029 to the destination IP address 63.78.199.4 on port 161. Therefore, the 63.78.199.4(161) in the log denotes the destination IP address and port number.

Submit
59. Data is striped at a byte level across multiple drives, and parity information is distributed among all member drives. What RAID level is represented here?

Explanation

In RAID Level 5, data is striped at a byte level across multiple drives, and parity information is distributed among all member drives. This means that each drive in the RAID array contains a portion of the data and a portion of the parity information. This level of RAID offers both increased performance and fault tolerance, as it allows for data recovery in the event of a single drive failure.

Submit
60. First responder is a person who arrives first at the crime scene and accesses the victim's computer system after the incident. He or she is responsible for protecting, integrating, and preserving the evidence obtained from the crime scene. Which of the following is not a role of a first responder?

Explanation

The main responsibilities of first responders are:
-- Identifying the crime scene
-- Protecting the crime scene
-- Preserving temporary and fragile evidence
-- Collecting complete information about the incident
-- Documenting all findings
-- Packaging and transporting the electronic evidence
-- Gather preliminary information at the scene

Submit
61. Billy, a computer forensics expert, has recovered a large number of DBX files during the forensic investigation of a laptop. Which of the following email clients can he use to analyze the DBX files?

Explanation

Billy, the computer forensics expert, can use Microsoft Outlook Express to analyze the DBX files. Microsoft Outlook Express is an email client that supports the DBX file format, making it suitable for examining and extracting data from the recovered DBX files.

Submit
62. Smith, as a part of his forensic investigation assignment, seized a mobile device. He was asked to recover the Subscriber Identity Module (SIM card) data in the mobile device. Smith found that the SIM was protected by a Personal Identification Number (PIN) code, but he was also aware that people generally leave the PIN numbers to the defaults or use easily guessable numbers such as 1234. He made three unsuccessful attempts, which blocked the SIM card. What can Smith do in this scenario to reset the PIN and access SIM data?

Explanation

In this scenario, Smith has made three unsuccessful attempts to guess the PIN code, which has blocked the SIM card. To reset the PIN and gain access to the SIM data, he should ask the Network Operator for a Personal Unlock Number (PUK). The PUK is a unique code provided by the Network Operator that can be used to unlock the SIM card and reset the PIN. By contacting the Network Operator and providing the necessary information, Smith can obtain the PUK and regain access to the SIM data.

Submit
63. Which password cracking technique uses every possible combination of character sets?

Explanation

A brute force attack is a password cracking technique that uses every possible combination of character sets to guess the correct password. It systematically tries all possible combinations until it finds the correct one. This method is time-consuming and resource-intensive, but it is effective against weak passwords that lack complexity or length. Unlike other techniques like dictionary attacks or rule-based attacks, which rely on pre-existing databases or patterns, a brute force attack does not make any assumptions and tries all possibilities.

Submit
64. What does the part of the log, "%SEC-6-IPACCESSLOGP", extracted from a Cisco router represent?

Explanation

The part of the log "%SEC-6-IPACCESSLOGP" extracted from a Cisco router represents that a packet matching the log criteria for the given access list has been detected (TCP or UDP). This log entry indicates that the router has identified a packet that matches the specified criteria in the access list and has logged this event. It is important to monitor these logs to ensure that the network is secure and to troubleshoot any potential issues.

Submit
65. Sectors are pie-shaped regions on a hard disk that store data. Which of the following parts of a hard disk do not contribute to determining the addresses of data?

Explanation

The interface of a hard disk does not contribute to determining the addresses of data. The interface is responsible for connecting the hard disk to the computer and facilitating the transfer of data between the two. It does not have any role in organizing or storing the data on the hard disk. The addresses of data are determined by the combination of the heads, sectors, and cylinders, which are physical components of the hard disk that help locate and access specific data.

Submit
66. You have been asked to investigate the possibility of computer fraud in the finance department of a company. It is suspected that a staff member has been committing finance fraud by printing cheques that have not been authorized. You have exhaustively searched all data files on a bitmap image of the target computer but have found no evidence. You suspect the files may not have been saved. What should you examine next in this case?

Explanation

In order to investigate the possibility of computer fraud in the finance department, it would be advisable to examine the swap file next. The swap file is a temporary storage area on a computer's hard drive that is used to store data that is currently not being used in RAM. It is possible that the staff member involved in the finance fraud may have saved evidence or traces of their activities in the swap file. Therefore, analyzing the swap file could potentially provide valuable information and help in uncovering any unauthorized activities related to printing cheques.

Submit
67. NTFS has reduced slack space compared to FAT, thus having lesser potential to hide data in the slack space. This is because:

Explanation

Another approach to reduce the slack space is to use NTFS, which allows much smaller clusters on large partitions. 

Submit
68. Sniffers that place NICs in promiscuous mode work at what layer of the OSI model?

Explanation

Sniffers that place NICs in promiscuous mode work at the Physical layer of the OSI model. The Physical layer is responsible for the transmission and reception of raw bit streams over a physical medium. By operating at this layer, sniffers can capture all network traffic passing through the network interface card (NIC) without being restricted to specific protocols or ports. This allows them to monitor and analyze network packets regardless of the higher-layer protocols being used.

Submit
69. Data compression involves encoding the data to take up less storage space and less bandwidth for transmission. It helps in saving cost and high data manipulation in many business applications. Which data compression technique maintains data integrity?

Explanation

Lossless compression is the data compression technique that maintains data integrity. Unlike lossy compression, which sacrifices some data in order to achieve higher compression ratios, lossless compression retains all the original data when compressing it. This ensures that the data can be perfectly reconstructed when decompressed, without any loss or alteration. Lossless compression is commonly used in applications where data integrity is crucial, such as archiving, data backup, and transmission of sensitive information.

Submit
70. Which of the following is a list of recently used programs or opened files?

Explanation

The correct answer is Most Recently Used (MRU). MRU refers to a list of recently used programs or opened files. It is a feature commonly found in operating systems and software applications that allows users to quickly access their most recently accessed files or programs. This list is typically displayed in a menu or a sidebar for easy access and convenience. The MRU list is constantly updated as the user opens or accesses different files or programs, ensuring that the most recent items are always readily available.

Submit
71. Charles has accidentally deleted an important file while working on his Mac computer. He wants to recover the deleted file as it contains some of his crucial business secrets. Which of the following tool will help Charles?

Explanation

FileSalvage------------------------------------------------------------------------------------------------------------
FileSalvage recovery tool for Mac recovers the lost files, iTunes libraries, iPhoto
collections, and lost data. This tool can recover files from a normal Mac OS
hard drive, USB key, PC disk, Linux disk, FAT32 disk, FLASH card, scratched CD,
Digital Camera, iPod, and file system that are recognized in Mac OS X.
Capsa Network Analyzer---------------------------------------------------------------------------------------
Capsa Free is a network analyzer that allows monitoring of network traffic,
troubleshooting network issues, and analyzing packets. Features include
support for over 300 network protocols (including the ability to create and
customize protocols), MSN, and Yahoo Messenger filters, email monitor and
auto-save, and customizable reports and dashboards.
Features:
• Extended network security analysis
• Versatile traffic & bandwidth statistics
• Advanced network protocol analysis
• Multiple network behavior monitoring
• Automatic expert network diagnosis
Xplico-----------------------------------------------------------------------------------------------------------------
The goal of Xplico is to extract the applications data contained from an internet
traffic capture. For example, from a pcap file Xplico extracts each email (POP,
IMAP, and SMTP protocols), all HTTP contents, each VoIP call (SIP), FTP, TFTP, and
so on. Xplico is an open source Network Forensic Analysis Tool (NFAT).
DriveSpy---------------------------------------------------------------------------------------------------------------
DriveSpy allows forensic examiners to direct information from one sector range to
another. It creates direct disk-to-disk forensic duplicates, processes duplicate
drives of both physical drive geometry and sector translation, processes large hard
drives, hard drives without partitions, slack space, unallocated space etc.

Submit
72. Which of the following is NOT an anti-forensics technique?

Explanation

⦿ Data/File Deletion
⦿ Password Protection
⦿ Steganography
⦿ Steganalysis
⦿ Data Hiding in File System Structures
⦿ Trail Obfuscation
⦿ Artifact Wiping
⦿ Overwriting Data/Metadata
⦿ Encryption
⦿ Encrypted Network Protocols
⦿ Program Packers
⦿ Rootkits
⦿ Minimize Footprint
⦿ Exploiting Forensics Tools Bugs
⦿ Detecting Forensics Tool Activities

Submit
73. Raw data acquisition format creates _________ of a data set or suspect drive.

Explanation

Simple sequential flat files are created by the raw data acquisition format. These files store data in a sequential manner, where each record is stored one after the other. This format is simple and easy to understand, making it useful for analyzing and processing data sets or suspect drives. Unlike compressed or segmented files, simple sequential flat files do not involve any complex compression or segmentation techniques, making them a straightforward choice for raw data acquisition.

Submit
74. Which US law does the interstate or international transportation and receiving of child pornography fall under?

Explanation

18 U.S. Code § 1466A - Obscene visual representations of the sexual abuse of children
18 U.S. Code § 252
18 U.S. Code § 146A
18 U.S. Code § 2252 - Certain activities relating to material involving the sexual exploitation of minors

Submit
75. Who is responsible for the following tasks?
 • Secure the scene
 • Ensure that it is maintained in a secure state until the Forensic Team arrives
 • Make notes about the scene that will eventually be handed over to the Forensic Team

Explanation

Non-forensics staff are responsible for securing the scene, maintaining its security until the Forensic Team arrives, and making notes about the scene. This includes individuals who are not directly involved in forensic investigations such as system administrators, lawyers, and local managers. These tasks require basic knowledge and understanding of scene security protocols and the ability to document relevant information for the Forensic Team.

Submit
76. Which of the following tool enables a user to reset his/her lost admin password in a Windows system?

Explanation

Active@ Password Changer
Active@ Password Changer is designed for resetting local administrator and user passwords on Windows XP/Vista/2008/2003/2000, and Windows 7 systems in case an administrator’s password is forgotten or lost. Forgotten password recovery software has a simple user interface, supports multiple hard disk drives, detects several SAM databases (if multiple OS were installed on one volume), and provides the opportunity to pick the right SAM before starting the password recovery process. Active@ Password Changer displays a list of all local users. The software user simply chooses the local user from the list to reset the password. With Active@ Password Changer you can log in as a particular user with a blank password.

Submit
77. What is the default IIS log location?

Explanation

On Windows Server 2012, the log files are stored by default in the %SystemDrive%\inetpub\logs\LogFiles

Submit
78. Depending upon the jurisdictional areas, different laws apply to different incidents. Which of the following law is related to fraud and related activity in connection with computers?

Explanation

18 U.S. Code § 1030 is related to fraud and related activity in connection with computers. This law specifically deals with unauthorized access to computers and computer systems, as well as the theft, destruction, or alteration of information stored on computers. It also covers offenses such as computer fraud, identity theft, and the distribution of malicious software. This law is important in prosecuting cybercrimes and protecting computer systems from unauthorized access and misuse.

Submit
79. Where does the Windows 10 system store the metadata of the deleted files?

Explanation

In Windows versions newer than Vista and XP, the OS stores the complete path and file or folder name in a hidden file called INFO2. This file remains inside the Recycled or Recycler folder and stores information about the deleted file. It is a master database file and very crucial for the recovery of data. INFO2 contains various details of deleted files such as original file name, original file size, the date and time of deletion, unique identifying number, and the drive number that the file came from.

Submit
80. Rusty, a computer forensics apprentice, uses the command "nbtstat -c" while analyzing the network information in a suspect system. What information is he looking for?

Explanation

nbtstat -c: This option shows the contents of the NetBIOS name cache, which contains NetBIOS name-to-IP address mappings.

Submit
81. Which of the following reports are delivered under oath to a board of directors/managers/panel of the jury?

Explanation

A verbal formal report is delivered under oath to a board of directors/managers/panel of the jury. This type of report is presented orally and requires the presenter to swear an oath to tell the truth. It is typically used in legal or formal settings where the information presented needs to be accurate and credible. The oath adds an extra level of accountability and ensures that the information provided is reliable and trustworthy.

Submit
82. Graphics Interchange Format (GIF) is a ____ RGB bitmap image format for images with up to 256 distinct colors per frame.

Explanation

GIF is a bitmap image format that supports up to 256 distinct colors per frame. The term "8-bit" refers to the color depth of the image, indicating that each pixel in the GIF can be represented by 8 bits, allowing for a maximum of 256 different colors. This limitation in color range makes GIF suitable for simple graphics and animations, but not ideal for displaying complex images with a wide range of colors.

Submit
83. The Apache server saves diagnostic information and error messages that it encounters while processing requests. The default path of this file is "usr/local/apache/logs/error.log" in Linux. Identify the Apache error log from the following logs.

Explanation

The given answer is the Apache error log because it contains the specific error message "client denied by server configuration" indicating that a client was denied access to a specific file or directory. The log also includes the date, time, and client IP address, which are common details found in Apache error logs.

Submit
84. Which of the following examinations refers to the process of providing the opposing side in a trial the opportunity to question a witness?

Explanation

Cross-Examination refers to the process in a trial where the opposing side is given the opportunity to question a witness. During cross-examination, the opposing attorney aims to challenge the credibility, accuracy, or consistency of the witness's testimony. This is done by asking leading questions and attempting to elicit information that may undermine the witness's account or support the opposing party's case. The purpose of cross-examination is to test the witness's testimony and expose any weaknesses or inconsistencies in their statements.

Submit
85. Which among the following search warrants allows the first responder to get the victim's computer information such as service records, billing records, and subscriber information from the service provider?

Explanation

An Electronic Storage Device Search Warrant allows the first responder to search and seize the victim’s computer components such as:
• Hardware
• Software
• Storage devices
• Documentation

If the crime involves the Internet, the first responder needs information about the victim’s computer from the service provider end. A Service Provider Search Warrant allows first responders or investigators to consult the service provider and obtain the available victim’s computer information.
First responders can obtain the following information from the service provider:
• Service records
• Billing records
• Subscriber information

Submit
86. Microsoft Security IDs are available in Windows Registry Editor. The path to locate IDs in Windows 7 is:

Explanation

The correct answer is HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsNT\CurrentVersion\ProfileList. This is the correct path in the Windows Registry Editor to locate Microsoft Security IDs in Windows 7. The other paths mentioned in the question are not relevant to finding Microsoft Security IDs.

Submit
87. Jason discovered a file named "$RIYG6VR.doc" in the "C:\$Recycle.Bin\<USERSID>\" folder while analyzing a hard disk image for the deleted data. What inferences can he make from the file name?

Explanation

The file name "$RIYG6VR.doc" suggests that it is a deleted document file. The presence of the "$" symbol at the beginning of the file name is a common convention used by operating systems to indicate that a file has been deleted or is in the recycle bin. Additionally, the ".doc" extension indicates that it is a Microsoft Word document file. Therefore, the inference that can be made is that the file is a deleted document file.

Submit
88. Adam, a forensic investigator, is investigating an attack on Microsoft Exchange Server of a large organization. As the first step of the investigation, he examined the PRIV.EDB file and found the source from where the mail originated and the name of the file that disappeared upon execution. Now, he wants to examine the MIME stream content. Which of the following files is he going to examine?

Explanation

Adam, the forensic investigator, is investigating an attack on the Microsoft Exchange Server. After examining the PRIV.EDB file, he was able to determine the source of the email and the name of the file that disappeared upon execution. Now, he needs to examine the MIME stream content. To do this, he will examine the PRIV.STM file.

Submit
89. As part of extracting the system data, Jenifer has used the netstat command. What does this tool reveal?

Explanation

The netstat command is used to display information about network connections on a computer. It provides details such as active connections, listening ports, and the protocol used for each connection. By using this command, Jenifer can gather information about the network connections on the system, including the IP addresses, port numbers, and the state of each connection. This can be helpful in troubleshooting network issues, monitoring network activity, and identifying any suspicious connections.

Submit
90. Identify the file system that uses a $BitMap file to keep track of all used and unused clusters on a volume.

Explanation

The NTFS file system uses the $Bitmap file to track vacant vs. in use clusters. As a cluster is either in use or not, it is represented by a zero or a one. A single bit per cluster is enough to store this information. It is literally nothing more than a collection of ones and zeros or a ‘bit array’. Although invisible to the end user, NTFS treats the $Bitmap as ‘just another’ file.

Submit
91.  Ivanovich, a forensic investigator, is trying to extract the complete information about running processes from a system. Where should he look apart from the RAM and virtual memory?

Explanation

Swap space is an area of the hard drive that is used as virtual memory when the RAM is full. It is a part of the operating system's memory management system. By looking into the swap space, Ivanovich can find information about the running processes that are currently stored there. This can provide him with additional details and insights about the system's activity and resource usage, complementing the information he can gather from the RAM and virtual memory.

Submit
92. Tasklist command displays a list of applications and services with their Process ID (PID) for all tasks running on either a local or a remote computer. Which of the following tasklist commands provides information about the listed processes, including the image name, PID, name, and the number of the session for the process?

Explanation

The tasklist command with the /v option provides information about the listed processes, including the image name, PID, name, and the number of the session for the process. This option is used to display verbose information about each process, giving a more detailed view of the listed tasks.

Submit
93. Which code does the FAT file system use to mark the file as deleted?

Explanation

In the FAT file system, the OS replaces the first letter of a deleted file name with a hex byte code, E5h. E5h is a special tag that indicates the deleted file.

Submit
94. Bob has encountered a system crash and has lost vital data stored on the hard drive of his Windows computer. He has no cloud storage or backup hard drives. He wants to recover all the data, which includes his personal photos, music, documents, videos, official emails, etc. Which of the following tools shall resolve Bob's purpose?

Explanation

Recuva is the most suitable tool for Bob's purpose because it is a data recovery software specifically designed for Windows operating systems. It can scan the hard drive and recover deleted or lost files, including personal photos, music, documents, videos, and emails. Since Bob does not have any backup options, Recuva can help him retrieve the lost data from his crashed system. Cain & Abel, Xplico, and Colasoft's Capsa are not data recovery tools, but rather network analysis and password recovery tools, which are not relevant to Bob's situation.

Submit
95. What does 254 represent in ICCID 89254021520014515744?

Explanation

Breakdown of  the given ICCID number:
89 : 254 : 021520 : 014515744
89 – Industry Identifier Prefix (89 for telecommunications)
254 – Country code
021520 – Issuer Identifier Number
014515744 – Individual Account Identification Number

Integrated Circuit Card Identification (ICCID)
ICCID is the 19 or 20-digit serial number of the SIM card, which is identified internationally. It consists of an industry identifier prefix (89 for telecommunications), followed by a country code, an issuer identifier number, and an individual account identification number. This code helps identify the country and the network operator’s name.
These ICCIDs are printed and stored in the SIM card. If an ICCID does not exist on the SIM, get it by using a (U) SIM acquisition tool such as ForensicSIM Toolkit.

Submit
96. CAN-SPAM act requires that you:

Explanation

The CAN-SPAM act requires that you don't use deceptive subject lines. This means that when sending emails, you should not use subject lines that are misleading or false in order to trick recipients into opening the email. Deceptive subject lines can include false claims, misleading information, or exaggerations that misrepresent the content of the email. By prohibiting the use of deceptive subject lines, the CAN-SPAM act aims to ensure that recipients have accurate information about the content of the emails they receive.

Submit
97. Bob works as an Information Security Analyst for a big finance company. One day, the anomaly-based intrusion detection system alerted that a volumetric DDOS targeting the main IP of the main web server was occurring. What kind of attack is it?

Explanation

The correct answer is network attack because the anomaly-based intrusion detection system detected a volumetric DDOS (Distributed Denial of Service) attack targeting the main IP of the main web server. A network attack refers to any malicious activity that targets the network infrastructure or resources, such as DDOS attacks, which aim to overwhelm a network or server with a flood of traffic, rendering it inaccessible to legitimate users.

Submit
98. Which of the following files stores information about the local Dropbox installation and account, email IDs linked with the account, current version/build for the local application, the host_id, and local path information?

Explanation

The config.db file stores information about the local Dropbox installation and account, including email IDs linked with the account, current version/build for the local application, the host_id, and local path information. This file is essential for maintaining and managing the Dropbox installation and account settings on a local device.

Submit
99. Files stored in the physical location of the Recycle-Bin are renamed as Dxy.ext, where "x" represents the _________ .

Explanation

In Windows Vista and later versions renames the files stored in the Recycle Bin as $Ry.ext, whereas in older versions of Windows, it used be Dxy.ext. In this naming process, “x” represents the drive name, “y” a sequential number starting from 0, and “.ext” being the original file’s extension such as .doc, .docx, .pdf, etc.

Submit
100. During forensic investigations, investigators tend to collect the system time at first and compare it with UTC. What does the abbreviation UTC stand for?

Explanation

Coordinated Universal Time (abbreviated to UTC) is the primary time standard by which the world regulates clocks and time. It is within about 1 second of mean solar time at 0° longitude,[1] and is not adjusted for daylight saving time.

Submit
101. Which of the following Event Correlation Approach checks and compares all the fields systematically and intentionally for positive and negative correlation with each other to determine the correlation across one or multiple fields?

Explanation

Rule-Based Approach - The rule-based approach correlates events according to a specified set of rules (condition-action). Depending on each test result and the combination of the system events, the rule-processing engine analyzes the data until it reaches the final state.
Field-Based Approach - This is a basic approach that compares specific events with single or multiple fields in the normalized data.
Automated Field Correlation - This method checks and compares all the fields systematically and intentionally for positive and negative correlation with each other to determine the correlation across one or multiple fields.

Submit
102. A computer used in an alleged software piracy ring has been taken to a forensics lab for investigation. After searching for three days, the investigators have found no trace of illegal activity. As a last effort, the investigators decide to examine the slack space of the computer's hard drive. What information will this produce for the investigators?

Explanation

Examining the slack space of a computer's hard drive can provide information about recently deleted files. When files are deleted, they are not immediately erased from the hard drive but rather marked as available space. By examining the slack space, investigators may be able to recover fragments or remnants of these deleted files, which could potentially provide evidence of illegal activity in the alleged software piracy ring.

Submit
103. Which among the following is an act passed by the U.S. Congress in 2002 to protect investors from the possibility of fraudulent accounting activities by corporations?

Explanation

The correct answer is the Sarbanes-Oxley Act (SOX). This act was passed by the U.S. Congress in 2002 to protect investors from fraudulent accounting activities by corporations. It was enacted in response to a series of high-profile corporate scandals, such as Enron and WorldCom, which involved accounting fraud and deception. The Sarbanes-Oxley Act established stricter regulations and requirements for financial reporting and auditing, aiming to improve transparency, accountability, and integrity in corporate financial practices. It introduced measures such as the creation of the Public Company Accounting Oversight Board (PCAOB) and increased penalties for fraudulent activities.

Submit
104. What value of the "Boot Record Signature" is used to indicate that the bootloader exists?

Explanation

The value "AA55" is used as the "Boot Record Signature" to indicate the presence of the bootloader. This value acts as a unique identifier for the bootloader, allowing the system to recognize its existence during the booting process.

Submit
105. The investigator wants to examine changes made to the system's registry by the suspect program. Which of the following tool can help the investigator?

Explanation

Regshot is an open-source (LGPL) registry compare utility that allows you to take a snapshot of your registry quickly and then compare it with a second one - done after doing system changes or installing a new software product.

Submit
106. When marking evidence that has been collected with the "aaa/ddmmyy/nnnn/zz" format, what does the "nnnn" denote?

Explanation

Exhibit Numbering Exhibit numbering or exhibit labeling refers to the process of tagging evidence with sequential number, which includes case and evidence details. This will allow the investigator to easily identify the evidence and know its details. The investigators should mark all the evidence in a pre-agreed format, such as: aaa/ddmmyy/nnnn/zz. Where:
    • aaa are the initials of the forensic analyst or law enforcement officer seizing the equipment.
    • dd/mm/yy is the date of seizure.
    • nnnn is the sequential number of the exhibits seized by aaa, starting with 001 and going to nnnn.
    • zz is the sequence number for parts of the same exhibit (e.g., ‘A’ could be the CPU, ‘B’ the monitor, ‘C’ the keyboard, etc.)

Submit
107. Which MySQL log file contains information on server start and stop?

Explanation

Status and log files stored in data directory include:
1. Process ID file (HOSTNAME.pid), contains the process ID created when the
server starts
2. Error log (HOSTNAME.err), contains the information associated with the
startup and shutdown events, and errors
3. General query log (HOSTNAME.log), logs the client connections and activities
4. Binary log (HOSTNAME-bin.nnnnnn), contains the events that describe the
changes occurred in the database
5. Binary log index (HOSTNAME-bin.index), contains the list of all the binary log
files currently available in the data directory
6. Relay log (HOSTNAMErelay-bin.n), contains the events that describe the
changes occurred in the database
7. Relay log index (HOSTNAMErelay-bin.index), contains the list of all the relay
log files currently available in the data directory
8. Master info file (master.info) created by a replication slave server, that contains
the essential parameters used for
connecting to the master slave
9. Relay log info file (relay-log.info) created by a replication slave server, that
contains the status of relay log processing
10. Slow query log (HOSTNAMEslow.log), a text file that contains statements
which take longer processing time

Submit
108. Which of the following tasks DOES NOT come under the investigation phase of a cybercrime forensic investigation case?

Explanation

The following are the Computer Forensics Investigation Methodology:

First Response

Search and Seizure

Collect the Evidence

Secure the Evidence

Data Acquisition

Data Analysis

Evidence Assessment

Documentation and Reporting

Testify as an Expert Witness

Submit
109. Which rule requires an original recording to be provided to prove the content of a recording?

Explanation

Rule 1002: Requirement of Original To prove the content of a writing, recording, or photograph, the original writing , recording, or photograph is required, except as otherwise provided in these rules or by Act of Congress.

Submit
110. Buffer overflow vulnerabilities, of web applications, occurs when the application fails to guard its buffer properly and allows writing beyond its maximum size. Thus, it overwrites the _________. There are multiple forms of buffer overflow, including a Heap Buffer Overflow and a Format String Attack.

Explanation

Buffer overflow vulnerability of a web application occurs when it fails to guard its buffer properly and allows writing beyond its maximum size. Thus, it overwrites the adjacent memory locations. There are multiple forms of buffer overflow, including a Heap Buffer Overflow and a Format String Attack. The purpose of these attacks is to corrupt the execution stack of the web application.

Submit
111. Hard disk data addressing is a method of allotting addresses to each _______ of data on a hard disk.

Explanation

In hard disk data addressing, addresses are allotted to each physical block of data on a hard disk. This means that the data on the hard disk is divided into physical blocks, and each block is assigned a specific address. This allows the operating system to locate and access the data stored on the hard disk efficiently.

Submit
112. Which of the following Event Correlation Approaches is an advanced correlation method that assumes and predicts what an attacker can do next after the attack by studying the statistics and probability and uses only two variables?

Explanation

Bayesian Correlation: This approach is an advanced correlation method that assumes and predicts what a hacker can do next after the attack by studying statistics and probability.

Submit
113. Which of the following Registry components include offsets to other cells as well as the "LastWrite" time for the key?

Explanation

Registry Structure within a Hive File
It is essential for a forensic investigator to have a good understanding of the basic components of the registry. This will help them to glean extra information through keyword searches of other locations and sources that include the page file, physical memory, or even the unallocated spaces. By gaining more information about the registry structure, the forensic investigator can have a better understanding of what is possible and how to proceed further.
The registry component cells have a specific structure and hold specific types of information. The different types of cells are:
    • Key cell: It contains Registry key information and includes offsets to other cells as well as the LastWrite time for the key
    • Value cell: It holds a value and its data
    • Subkey list cell: It is made up of a series of indexes pointing to key cells, these all are sub keys to the parent key cell
    • Value list cell: It is made up of a series of indexes pointing to value cells, these all are values of a common key cell
    • Security descriptor cell: It contains security descriptor information for a key cell

Submit
114. Which of the following ISO standard defines file systems and protocols for exchanging data between optical disks?

Explanation

ISO 9660 is the correct answer because it is the ISO standard that specifically defines file systems and protocols for exchanging data between optical disks. This standard is widely used for CD-ROMs and DVD-ROMs, ensuring compatibility and interoperability between different optical disk systems. It specifies the file system structure, naming conventions, and file attributes for optical media, allowing for the organization and exchange of data in a standardized format.

Submit
115. Gary is checking for the devices connected to USB ports of a suspect system during an investigation. Select the appropriate tool that will help him document all the connected devices.

Explanation

Reg.exe𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗
You can edit the Windows Registry with the help of Console Registry Tool or reg.exe.
Reg.exe is a command-line utility with which you can perform almost all the task
which you otherwise can with regedit.exe. Reg.exe in Windows 10/8/7, can be useful
when you want to quickly make a change to the Windows Registry without opening
registry editor and moreover and has the additional facility of being directly usable in
scripts.
DriveSpy𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗
DriveSpy allows forensic examiners to direct information from one sector range to
another. It creates direct disk-to-disk forensic duplicates, processes duplicate
drives of both physical drive geometry and sector translation, processes large hard
drives, hard drives without partitions, slack space, unallocated space etc.
DevCon𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗
DevCon or Device Console, is a command-line tool that displays detailed
information about devices on computers running Windows operating system.
DevCon can be used to enable, disable, install, configure, and remove devices. It
also performs device management functions on local computers and remote
computers.
Features:
    • Display driver and device info
    • Search for devices
    • Change device settings
    • Restart the device or computer
Fsutil𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗𝄗
This command performs the tasks that are related to the file allocation table
(FAT) and NTFS file systems, such as managing reparse points, managing
sparse files, or dismounting a volume. If it is used without parameters, fsutil
displays a list of supported subcommands. The investigator must be logged on
as an administrator or a member of the "administrators" group in order to use
fsutil.

Submit
116. An International Mobile Equipment Identifier (IMEI) is a 15-digit number that indicates the manufacturer, model type, and country of approval for GSM devices. The first eight digits of an IMEI number that provide information about the model and origin of the mobile device is also known as:

Explanation

International Mobile Equipment Identifier (IMEI)
The International Mobile Equipment Identifier (IMEI) is a GSM-based unique number that identifies mobile equipment in 15 digits representing the manufacturer, model type, and country in which it is approved. It is different for every GSM, UMTS, and iDEN mobile phone and is usually printed and found on the battery of the mobile phone.
In the 15 digits of IMEI, the first eight digits are known as the Type Allocation Code (TAC), which gives information about the model and origin. For powered-on GSM and UMTS phones, the IMEI can be obtained by keying in *#06#. The IMEI number is used for valid reasons. It is used by GSM to identify the device and even to stop the access to the mobile phone if it has been stolen.

Submit
117. Which of the following is a database in which information about every file and directory on an NT File System (NTFS) volume is stored?

Explanation

The Master File Table is a database in which information about every file and directory on an NTFS volume is stored. It serves as the central index for the file system, containing metadata such as file names, sizes, permissions, and file locations. This table allows the operating system to quickly locate and access files on the NTFS volume. The Master File Table is a crucial component of the NTFS file system and is responsible for maintaining the organization and structure of files and directories.

Submit
118. Which of the following tool can the investigator use to analyze the network to detect Trojan activities?

Explanation

Capsa Network Analyzer
Capsa Free is a network analyzer that allows monitoring of network traffic, troubleshooting network issues, and analyzing packets. Features include support for over 300 network protocols (including the ability to create and customize protocols), MSN, and Yahoo Messenger filters, email monitor and auto-save, and customizable reports and dashboards.
Features:
• Extended network security analysis
• Versatile traffic & bandwidth statistics
• Advanced network protocol analysis
• Multiple network behavior monitoring
• Automatic expert network diagnosis

Submit
119. What is the size value of a nibble?

Explanation

8 bits = 2 nibbles = 1 byte
Understanding Bit, Nibble, and Byte
Bit - A bit, short for binary digit is the smallest unit of data or basic information unit in computing and digital communications.
It can contain only one of the two values represented as 0 or 1. They also represent logical values such as true/false,
yes/no, activation states (on/off), algebraic signs (+/−) or any other two-valued attribute.
Nibble - A nibble, also known as half-byte or tetrade is a collection of four bits or half of an octet in computing. Common
representation of a byte is two nibbles.
Byte - A byte, short for binary term is a digital information unit of data that consists of eight bits. The byte is representation
of the number of bits a system has used to encode one text character. Therefore, it is the smallest addressable memory
unit in many computer architectures. Two hexadecimal digits represent a full byte or octet.

Submit
120. Select the tool appropriate for finding the dynamically linked lists of an application or malware.

Explanation

Dependency Walker is a free utility that scans any 32-bit or 64-bit Windows module (exe, dll, ocx, sys, etc.) and builds a hierarchical tree diagram of all dependent modules. For each module found, it lists all the functions that are exported by that module, and which of those functions are actually being called by other modules. Another view displays the minimum set of required files, along with detailed information about each file including a full path to the file, base address, version numbers, machine type, debug information, and more.

Dependency Walker is also very useful for troubleshooting system errors related to loading and executing modules. Dependency Walker detects many common application problems such as missing modules, invalid modules, import/export mismatches, circular dependency errors, mismatched machine types of modules, and module initialization failures.

Submit
121. Which password cracking technique uses details such as length of a password, character sets used to construct the password, etc.?

Explanation

A rule-based attack is a password cracking technique that uses details such as the length of a password, character sets used to construct the password, etc. It involves creating a set of rules or patterns based on common password construction methods and applying them systematically to crack the password. By analyzing the characteristics of the password, such as the presence of uppercase letters, numbers, special characters, etc., a rule-based attack can efficiently generate potential password combinations to guess the correct password.

Submit
122. Which of the following standards represents a legal precedent regarding the admissibility of scientific examinations or experiments in legal cases?

Explanation

Frye Standard
The Frye Standard is a legal act related to the admissibility of scientific examinations or experiments in legal cases. According to this act, any kind of expert opinion based on scientific techniques is admissible, if the technique involved is acceptable by the relevant scientific community. It applies to procedures, principles, and analysis presented in the court cases. Under this act, the supporters of a particular scientific issue should provide a number of experts to speak about the issue in question.
In Daubert 509 US 579 (1993) the Supreme Court conveyed that this act under the Federal Rules of Evidence for accepting expert evidence in federal courts is old- fashioned. However, some states still adhere to the Frye Standard.

Submit
123. Which among the following U.S. laws requires financial institutions – companies that offer consumers financial products or services such as loans, financial or investment advice, or insurance – to protect their customers' information against security threats?

Explanation

The correct answer is GLBA. The Gramm-Leach-Bliley Act (GLBA) is a U.S. law that requires financial institutions to protect their customers' information against security threats. This law applies to companies that offer financial products or services such as loans, financial or investment advice, or insurance. GLBA mandates that these institutions implement safeguards to ensure the security and confidentiality of customer information, as well as protect against unauthorized access to or use of this information.

Submit
124. Which of the following standard represents a legal precedent set in 1993 by the Supreme Court of the United States regarding the admissibility of expert witnesses' testimony during federal legal proceedings?

Explanation

The Daubert Standard, a legal act established in 1993 by the Supreme Court of the United States, explains about the rule of evidence regarding the admissibility of the expert witnesses’ testimony during the federal legal proceedings. Under this act, the plaintiff or defendant can raise a motion to exclude the unqualified evidence at a jury trial.
In Daubert Standard Act, the Supreme Court passed a rule for federal trial judges to act as “gatekeepers” of scientific evidence. The trial judges should analyze the proffered expert witnesses to decide whether their testimony is both “relevant” and “reliable”. The relevance of a testimony decides whether the expert’s evidence applies to the facts of the case or not. The counsel can opt for Daubert motion before or during the trial to stop the presentation of ineffectual evidence to the jury. The expert’s testimony should be based on the evidence and facts of the case. An expert witness uses the scientific method of investigation to describe that the evidence is reliable and relevant to the case.

Submit
125. Which of the following is a record of the: characteristics of a file system, including its size, the block size, the empty and the filled blocks and their respective counts, the size and location of the inode tables, the disk block map, and usage information, and the size of the block groups?

Explanation

The superblock is a record that contains important information about a file system, including its size, block size, empty and filled blocks, inode table size and location, disk block map, usage information, and the size of block groups. It serves as a key data structure in a file system and is typically located at the beginning of the file system. The superblock provides essential metadata that allows the operating system to manage the file system effectively and efficiently.

Submit
126. Smith, a forensic examiner, was analyzing a hard disk image to find and acquire deleted sensitive files. He stumbled upon a $Recycle.Bin folder in the root directory of the disk. Identify the operating system in use?

Explanation

The presence of the $Recycle.Bin folder in the root directory of the disk indicates that the operating system in use is Windows. This folder is used by Windows operating systems to store deleted files before they are permanently removed. Since the question does not provide any specific details about the version of Windows, we can infer that the operating system is Windows 8.1 based on the available options.

Submit
127. Gary, a computer technician, is facing allegations of abusing children online by befriending them and sending them illicit adult images from his office computer. What type of investigation does this case require?

Explanation

This case requires a criminal investigation because it involves allegations of a serious crime, specifically child abuse and distribution of illicit adult images. A criminal investigation is conducted by law enforcement agencies to gather evidence, identify suspects, and potentially lead to criminal charges being filed. In contrast, a civil investigation typically involves resolving disputes between individuals or organizations and does not involve criminal offenses. An administrative investigation focuses on the internal conduct of an organization or its employees and may result in disciplinary actions or policy changes.

Submit
128. Which among the following files provide email header information in the Microsoft Exchange server?

Explanation

Follow these guidelines when dealing with Microsoft Exchange:
In an organization, various employees connect with each other through servers such as the Microsoft Exchange Server. Therefore, the investigators should not access an active Exchange server. The best way is to create a backup of the server, which will be available for users to connect to the Exchange server. Investigators must collect all the data files associated with the server, as there is more than one file associated with Exchange email. The archive file consists of the PRIV.EDB file, PUB.EDB file, and PRIV.STM file. The files available will vary according to the Exchange server you are dealing with.

    • PRIV.EDB: It is a rich text database file that contains message headers, message text, and standard attachments.
    • PUB.EDB: It is a database file to store public folder hierarchies and contents.
    • PRIV.STM: It is a streaming Internet content file containing video, audio, and other media that are streams of MIMEs.

Most of the backups are part of the forensic process, which is why it is important to be careful with backups and offline storage. An expert should be engaged to restore the server data in the case the investigators are not familiar with the restore process for Exchange servers.

Submit
129. Wireless access control attacks aim to penetrate a network by evading WLAN access control measures such as AP MAC filters and Wi-Fi port access controls. Which of the following wireless access control attacks allow the attacker to set up a rogue access point outside the corporate perimeter and then lure the employees of the organization to connect to it?

Explanation

Client mis-association is a wireless access control attack where the attacker sets up a rogue access point outside the corporate perimeter and tricks employees into connecting to it. This attack takes advantage of the fact that clients will automatically connect to a familiar network, even if it is a malicious one. By impersonating a legitimate network, the attacker can intercept sensitive information or launch further attacks on the connected devices. This attack bypasses WLAN access control measures such as AP MAC filters and Wi-Fi port access controls, allowing the attacker to gain unauthorized access to the network.

Submit
130. Which of the following files stores information about a local Google Drive installation such as User email ID, Local Sync Root Path, and Client version installed?

Explanation

Sync_config.db is a database file of Google Drive Client containing several records including the Google Drive version, the local sync root path, and the user’s email address. Investigators can read the database files using the DB Browser for SQLite tools to extract the required information and also use the file to recreate the databases and search them for the data.

Submit
131. Company ABC has employed a firewall, IDS, Antivirus, Domain Controller, and SIEM. The company's domain controller goes down. From which system would you begin your investigation?

Explanation

If the domain controller goes down, it is logical to begin the investigation from the domain controller itself. The domain controller is a critical component in managing and authenticating user accounts, permissions, and network resources within a Windows domain. Its failure can have a significant impact on the overall network functionality. By investigating the domain controller, one can identify the root cause of the issue and take appropriate actions to restore its functionality, ensuring the smooth operation of the network.

Submit
132. Which of the following tools enables data acquisition and duplication?

Explanation

DriveSpy allows forensic examiners to direct information from one sector range to another. It creates direct disk-to-disk forensic duplicates, processes duplicate drives of both physical drive geometry and sector translation, processes large hard drives, hard drives without partitions, slack space, unallocated space etc.

Submit
133. Which of the following examinations refers to the process of the witness being questioned by the attorney who called the latter to the stand?

Explanation

Direct examination refers to the process of the witness being questioned by the attorney who called them to the stand. During direct examination, the attorney asks open-ended questions to elicit testimony that supports their case. The purpose of direct examination is to present the witness's version of events and to establish the facts in a favorable light. This allows the attorney to control the narrative and present evidence that supports their client's position.

Submit
134. In Windows Security Event Log, what does an event id of 530 imply?

Explanation

530: Logon Failure - Account logon time restriction violation
The logon failed because the user attempted to log on outside the account's hour or day of week restrictions. To determine if the user was present at this computer or elsewhere on the network, see the Logon Types chart in event 528. 
Event 530 is logged on the workstation or server where the user failed to log on. Event 530 is logged on a domain controller only when a user fails to log on to the domain controller itself (such as at the console or through failure to connect to a shared folder). On workstations and servers, event 530 will be generated only by an attempt to log on with a domain account; local accounts do not offer time restrictions. 
To identify the source of network logon failures, check the Workstation Name and Source Network Address fields. 
Logon Process and Authentication Package will vary according to the type of logon and authentication protocol used.

Submit
135. BMP (Bitmap) is a standard file format for computers running the Windows operating system. BMP images can range from black and white (1 bit per pixel) up to 24-bit color (16.7 million colors). Each bitmap file contains a header, the RGBQUAD array, information header, and image data. Which of the following element specifies the dimensions, compression type, and color format for the bitmap?

Explanation

BMP File Structure:
Every bitmap file contains the following data structure:
-- File header: The first part of the header that includes the data about the type, size, and layout of a file.
-- Information header: A header component that contains the dimensions, compression type, and color format for the bitmap.
-- The RGBQUAD array: A color table that comprises the array of elements equal to the colors present in the bitmap; this color
table does not support bitmaps with 24 color bits, as each pixel is represented by24-bit RGB values in the actual bitmap.
-- Image data: The array of bytes that contains bitmap image data; image data comprises color and shading information for
each pixel. A bitmap file always has 42 4D as the first characters in a hexadecimal representation. These characters translate
to BM in the ASCII code.

Submit
136. Which of the following files contains the traces of the applications installed, run, or uninstalled from a system?

Explanation

Shortcut files contain traces of the applications installed, run, or uninstalled from a system. These files are created when a user creates a shortcut to an application on their desktop or in a folder. Shortcut files contain information about the target application's location, allowing users to quickly access and launch the application. By examining shortcut files, one can gather information about the applications that have been installed, run, or uninstalled on a system.

Submit
137. Which of the following stages in a Linux boot process involves the initialization of the system's hardware?

Explanation

The BIOS Stage
The first stage of the Linux boot process is the BIOS stage. It initializes the system hardware during the booting process. The BIOS retrieves the information, stored in the CMOS chip (Complementary Metal-Oxide Semiconductor) which is a battery operated memory chip on the motherboard that contains information about the system's hardware configuration.
During the boot process, the BIOS performs a Power-On Self-Test (POST) to make sure that all the hardware components of the system are working. Once BIOS confirms that everything is fine, it starts searching for the drive or disk which contains the operating system in a standard sequence. If the first listed device is not available or not working, then it checks for the next one and so on. A drive can be bootable only if it has the Master Boot Record in its first sector known as the boot sector. The system’s hard disk acts as the primary boot disk and the optical drive works as the secondary boot disk for booting the operating system from the removable disk if in case the main hard disk fails.

Submit
138. Which of the following commands shows you the names of all open shared files on a server and the number of file locks on each file?

Explanation

net file command
The net file command displays the names of all open shared files on a server and the number of file locks, if any, on each file. This command can also close individual shared files and remove file locks. When used without parameters, the tool will also display and help to control files shared on the network.
Syntax:
net file [ID [/close]]
    • ID: Specifies the identification number of the file.
    • /close: Closes an open file and releases locked records.
    • net help command: Displays help for the specified net command.

Submit
139. How will you categorize a cybercrime that took place within a CSP's cloud environment?

Explanation

Cloud Crime
Any criminal activity that involves a cloud environment may it be a subject, object or a tool, is a cloud crime.

Cloud as a subject
It refers to a crime in which the attackers try to compromise the security of a cloud environment to steal data or inject a malware.
Ex: Identity theft of cloud user’s accounts, unauthorized modification or deletion of data stored in the Cloud, installation of malware on the cloud, etc.

Cloud as an object
In a cloud crime, the cloud behaves like an object, when the attacker uses the cloud to commit a crime targeted towards the CSP. In this case, the main aim of the attacker is to impact cloud service provider than cloud environment.
Ex: DDoS attacks over the cloud that can bring the whole cloud down.

Cloud as a tool
In a cloud crime, the cloud becomes a tool when the attacker uses one compromised cloud account to attack other accounts. In such cases, both the source and target cloud can store the evidence data.

https://www.yaabot.com/29316/a-noobs-guide-to-digital-forensics/
1. Cloud as an object: when the target of the crime is either the CSP or the Cloud service subscriber and the cloud is attacked in parts or as a whole.
2. Cloud as a tool: When data related to the crime is saved on a cloud server and the cloud network is used to facilitate the illegal activities
3. Cloud as a subject: when the criminal activity is committed within an established cloud environment

Submit
140. Which tool does the investigator use to extract artifacts left by Google Drive on the system?

Explanation

RAM Capturer is the tool used by investigators to extract artifacts left by Google Drive on the system. RAM Capturer is a forensic tool that allows the investigator to capture the contents of a computer's RAM (Random Access Memory) in order to analyze and extract valuable information. By analyzing the captured RAM, investigators can potentially find evidence of Google Drive usage, such as file uploads, downloads, or other activities that may be relevant to the investigation.

Submit
141. Randy has extracted data from an old version of a Windows-based system and discovered info file "Dc5.txt" in the systems recycle bin. What does the file name denote?

Explanation

not-available-via-ai

Submit
142. Which of the following commands shows you all of the network services running on Windows-based servers?

Explanation

The "Net start" command shows all of the network services running on Windows-based servers. It displays a list of all the services that are currently running, including their names and statuses. This command is useful for troubleshooting and managing network services on a Windows server.

Submit
143. Which of the following registry hives contains the configuration information about which application was used to open various files on the system?

Explanation

HKEY_CLASSES_ROOT, abbreviated as HKCR, is a sub-key of HKEY_LOCAL_MACHINE\Software. It contains file extension association information and also programmatic identifier (ProgID), Class ID (CLSID), and Interface ID (IID) data. This hive stores the necessary information which makes sure that the correct program opens when the user opens a file through the windows explorer.

Submit
144. Linux operating system has two types of typical bootloaders namely LILO (Linux Loader) and GRUB (Grand Unified Bootloader). In which stage of the booting process do the bootloaders become active?

Explanation

The bootloaders become active in the Kernel Stage of the booting process. At this stage, the BIOS has already completed its tasks and handed over control to the bootloader. The bootloader's main function is to load the operating system kernel into memory and initialize it. It allows the user to choose which operating system to boot if there are multiple options available. Once the kernel is loaded, it takes over the control and continues the booting process.

Submit
145. Jacky encrypts her documents using a password. It is known that she uses her daughter's year of birth as part of the password. Which password cracking technique would be optimal to crack her password?

Explanation

A hybrid attack would be the optimal password cracking technique in this scenario because it combines different methods to increase the chances of success. Since it is known that Jacky uses her daughter's year of birth as part of the password, a hybrid attack can combine a dictionary attack with a brute force attack. It can first try common passwords based on dictionary words, including her daughter's year of birth, and then systematically try all possible combinations of characters if the dictionary attack fails. This approach maximizes the efficiency of the password cracking process.

Submit
146. The pagefile.sys is a virtual memory file used to expand the physical memory of a computer. Select the registry path for the page file:

Explanation

not-available-via-ai

Submit
147. You have been given the task to investigate web attacks on a Windows-based server. Which of the following commands will you use to look at the sessions the machine has opened with other systems?

Explanation

To review file shares to ensure their purpose:
• net view
To verify the users using open sessions:
• net session
Check if the sessions have been opened with other systems:
• net use
To analyze at NetBIOS over TCP/IP activity:
• nbtstat -S
To find if TCP and UDP ports have unusual listening:
• netstat –na
To find scheduled and unscheduled tasks on the local host:
• schtasks.exe
To check for creation of new accounts in administrator group
• lusrmgr.msc
To see if any unexpected processes are running in Task Manager:
• Start -> Run -> taskmgr -> OK
To look for unusual network services:
• net start
To check file space usage to look for a sudden decrease in free space:
• dir

Submit
148. Korey, a data mining specialist in the knowledge processing firm DataHub.com, reported to his Chief Information Security Officer (CISO) that he has lost certain sensitive data stored on his laptop. The CISO wants his forensic investigation team to find if the data loss was accidental or intentional. In which of the following category this case will fall?

Explanation

This case will fall under both Civil and Criminal Investigations because the loss of sensitive data can have legal implications. The civil investigation will focus on determining any potential negligence or breach of contract by Korey or the company, while the criminal investigation will aim to identify if the data loss was intentional and if any criminal activity, such as theft or unauthorized access, occurred. Both investigations are necessary to address the legal and security aspects of the incident.

Submit
149. In Steganalysis, which of the following describes a "Known-stego" attack?

Explanation

A "Known-stego" attack refers to a scenario where the hidden message and the corresponding stego-image are known. This means that the attacker is aware of both the secret message that has been concealed within the stego-image and the stego-image itself. In this type of attack, the focus is on analyzing the stego-image to understand the steganography algorithm used and potentially extract the hidden message. The availability of both the hidden message and the stego-image makes it easier for the attacker to analyze and exploit the steganography technique.

Submit
150. Shane has started the static analysis of some malware and is using the tool ResourcesExtract to find more details of the malicious program. What part of the analysis is he performing?

Explanation

ResourcesExtract is a small utility that scans dll/ocx/exe files and extract all resources (bitmaps, icons, cursors, AVI movies, HTML files, and more...) stored in them into the folder that you specify.
You can use ResourcesExtract in user interface mode, or alternatively, you can run ResourcesExtract in command-line mode without displaying any user interface.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 15, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 15, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • May 29, 2019
    Quiz Created by
    Dale
Cancel
  • All
    All (150)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Which command line tool is used to determine active network...
Which network attack is described by the following statement? ...
Report writing is a crucial stage in the outcome of an investigation....
Which of the following is a part of a Solid-State Drive (SSD)?
An expert witness is a ____________ who is normally appointed by a...
Which of the following tool captures and allows you to interactively...
Which of the following techniques delete the files permanently?
Sheila is a forensics trainee and is searching for hidden image files...
Smith, a network administrator with a large MNC, was the first to...
To which phase of the Computer Forensic Investigation Process does the...
Which of the following techniques can be used to beat steganography?
When a file or folder is deleted, the complete path, including the...
Adam, a forensic analyst, is preparing VMs for analyzing malware....
POP3 (Post Office Protocol 3) is a standard protocol for receiving an...
Which of the following tools will help the investigator to analyze web...
Which of the following is a precomputed table containing word lists...
Which of the following is a command line packet sniffer that runs on...
Which of the following acts as a network intrusion detection system as...
What is a cold boot (hard boot)?
If the partition size is 4 GB, each cluster will be 32 K. Even if a...
Which of the following are small pieces of data sent from a website...
Which of the following attack uses HTML tags like:
Stephen is checking an image using Compare Files by The Wizard, and he...
What must an attorney do first before you are called to testify as an...
An executive had leaked the company trade secrets through an external...
Smith, an employee of a reputed forensic investigation firm, has been...
A state department site was recently attacked, and all the servers had...
Which of the following is an iOS Jailbreaking tool?
Which of the following Android libraries are used to render 2D (SGL)...
You are working as an independent computer forensics investigator and...
Lynne receives the following email: ...
What is the purpose of using an obfuscator in malware?
Which of the following built-in Linux commands can be used by forensic...
Which of the following files DOES NOT use Object Linking and Embedding...
A suspect is accused of violating the acceptable use of computing...
Shane, a forensic specialist, is investigating an ongoing attack on a...
The process of restarting a computer that is already turned on through...
 A forensic examiner is examining a Windows system seized from a...
Which of the following network attacks refers to sending huge volumes...
Which of the following Windows-based tools displays who is logged onto...
Which of the following tool is used to locate IP addresses?
Which of the following attacks allows an attacker to access restricted...
Which of the following techniques creates a replica of an evidence...
Richard is extracting volatile data from a system and uses the...
Which of the following files gives information about the client sync...
Ron, a computer forensics expert, is investigating a case involving...
Which of the following statements is INCORRECT when preserving digital...
Which of the following is NOT a part of the pre-investigation phase?
Which among the following search warrants allows the first responder...
Event correlation is a procedure that is assigned with a new meaning...
Which of the following is NOT considered physical evidence?
A small law firm located in the Midwest has possibly been breached by...
Netstat is a tool for collecting information regarding network...
Which of the following email headers specifies an address for...
Jacob is a computer forensics investigator with over 10 years of...
Madison is on trial for allegedly breaking into her university's...
Amber, a black hat hacker, has embedded malware into a small enticing...
What does the 63.78.199.4(161) denote in a Cisco router log? ...
Data is striped at a byte level across multiple drives, and parity...
First responder is a person who arrives first at the crime scene and...
Billy, a computer forensics expert, has recovered a large number of...
Smith, as a part of his forensic investigation assignment, seized a...
Which password cracking technique uses every possible combination of...
What does the part of the log, "%SEC-6-IPACCESSLOGP", extracted from a...
Sectors are pie-shaped regions on a hard disk that store data. Which...
You have been asked to investigate the possibility of computer fraud...
NTFS has reduced slack space compared to FAT, thus having lesser...
Sniffers that place NICs in promiscuous mode work at what layer of the...
Data compression involves encoding the data to take up less storage...
Which of the following is a list of recently used programs or opened...
Charles has accidentally deleted an important file while working on...
Which of the following is NOT an anti-forensics technique?
Raw data acquisition format creates _________ of a data set or suspect...
Which US law does the interstate or international transportation and...
Who is responsible for the following tasks? ...
Which of the following tool enables a user to reset his/her lost admin...
What is the default IIS log location?
Depending upon the jurisdictional areas, different laws apply to...
Where does the Windows 10 system store the metadata of the deleted...
Rusty, a computer forensics apprentice, uses the command "nbtstat -c"...
Which of the following reports are delivered under oath to a board of...
Graphics Interchange Format (GIF) is a ____ RGB bitmap image format...
The Apache server saves diagnostic information and error messages that...
Which of the following examinations refers to the process of providing...
Which among the following search warrants allows the first responder...
Microsoft Security IDs are available in Windows Registry Editor. The...
Jason discovered a file named "$RIYG6VR.doc" in the...
Adam, a forensic investigator, is investigating an attack on Microsoft...
As part of extracting the system data, Jenifer has used the netstat...
Identify the file system that uses a $BitMap file to keep track of all...
 Ivanovich, a forensic investigator, is trying to extract the...
Tasklist command displays a list of applications and services with...
Which code does the FAT file system use to mark the file as deleted?
Bob has encountered a system crash and has lost vital data stored on...
What does 254 represent in ICCID 89254021520014515744?
CAN-SPAM act requires that you:
Bob works as an Information Security Analyst for a big finance...
Which of the following files stores information about the local...
Files stored in the physical location of the Recycle-Bin are renamed...
During forensic investigations, investigators tend to collect the...
Which of the following Event Correlation Approach checks and compares...
A computer used in an alleged software piracy ring has been taken to a...
Which among the following is an act passed by the U.S. Congress in...
What value of the "Boot Record Signature" is used to...
The investigator wants to examine changes made to the system's...
When marking evidence that has been collected with the...
Which MySQL log file contains information on server start and stop?
Which of the following tasks DOES NOT come under the investigation...
Which rule requires an original recording to be provided to prove the...
Buffer overflow vulnerabilities, of web applications, occurs when the...
Hard disk data addressing is a method of allotting addresses to each...
Which of the following Event Correlation Approaches is an advanced...
Which of the following Registry components include offsets to other...
Which of the following ISO standard defines file systems and protocols...
Gary is checking for the devices connected to USB ports of a suspect...
An International Mobile Equipment Identifier (IMEI) is a 15-digit...
Which of the following is a database in which information about every...
Which of the following tool can the investigator use to analyze the...
What is the size value of a nibble?
Select the tool appropriate for finding the dynamically linked lists...
Which password cracking technique uses details such as length of a...
Which of the following standards represents a legal precedent...
Which among the following U.S. laws requires financial institutions...
Which of the following standard represents a legal precedent set in...
Which of the following is a record of the: characteristics of a file...
Smith, a forensic examiner, was analyzing a hard disk image to find...
Gary, a computer technician, is facing allegations of abusing children...
Which among the following files provide email header information in...
Wireless access control attacks aim to penetrate a network by evading...
Which of the following files stores information about a local Google...
Company ABC has employed a firewall, IDS, Antivirus, Domain...
Which of the following tools enables data acquisition and duplication?
Which of the following examinations refers to the process of the...
In Windows Security Event Log, what does an event id of 530 imply?
BMP (Bitmap) is a standard file format for computers running the...
Which of the following files contains the traces of the applications...
Which of the following stages in a Linux boot process involves the...
Which of the following commands shows you the names of all open shared...
How will you categorize a cybercrime that took place within a CSP's...
Which tool does the investigator use to extract artifacts left by...
Randy has extracted data from an old version of a Windows-based system...
Which of the following commands shows you all of the network services...
Which of the following registry hives contains the configuration...
Linux operating system has two types of typical bootloaders namely...
Jacky encrypts her documents using a password. It is known that she...
The pagefile.sys is a virtual memory file used to expand the physical...
You have been given the task to investigate web attacks on a...
Korey, a data mining specialist in the knowledge processing firm...
In Steganalysis, which of the following describes a "Known-stego"...
Shane has started the static analysis of some malware and is using the...
Alert!

Advertisement