Certified Hacking Forensic Investigator Flashcards
QUESTION NO: 1
What is the First Step required in preparing a computer for forensics investigation?
A. Do not turn the computer off or on, run any programs, or attempt to access data on a computer
B. Secure any relevant media
C. Suspend automated document destruction and recycling policies that may pertain to any relevant media or users at Issue
D. Identify the type of data you are seeking, the Information you are looking for, and the urgency level of the examination
A. Do not turn the computer off or on, run any programs, or attempt to access data on a computer
QUESTION NO: 2
Network forensics can be defined as the sniffing, recording, acquisition and analysis of the network traffic and event logs in order to investigate a network security incident.
A. True
B. False
A. True
QUESTION NO: 3
Which of the following commands shows you the names of all open shared files on a server and number of file locks on each file?
A. Net sessions
B. Net file
C. Netconfig
D. Net share
B. Net file
QUESTION NO: 4
The Recycle Bin exists as a metaphor for throwing files away, but it also allows user to retrieve and restore files. Once the file is moved to the recycle bin, a record is added to the log file that exists in the Recycle Bin. Which of the following files contains records that correspond to each deleted file in the Recycle Bin?
A. INFO2 file
B. INFO1 file
C. LOGINFO2 file
D. LOGINFO1 file
A. INFO2 file
QUESTION NO: 5
Email archiving is a systematic approach to save and protect the data contained in emails so that it can be accessed fast at a later date. There are two main archive types, namely Local Archive and Server Storage Archive. Which of the following statements is correct while dealing with local archives?
A. It is difficult to deal with the webmail as there is no offline archive in most cases. So consult your counsel on the case as to the best way to approach and gain access to the required data on servers
B. Local archives do not have evidentiary value as the email client may alter the message data
C. Local archives should be stored together with the server storage archives in order to be admissible in a court of law
D. Server storage archives are the server information and settings stored on a local system whereas the local archives are the local email client information stored on the mail server
A. It is difficult to deal with the webmail as there is no offline archive in most cases. So consult your counsel on the case as to the best way to approach and gain access to the required data on servers
QUESTION NO: 6
Which of the following email headers specifies an address for mailer-generated errors, like “no such user” bounce messages, to go to (instead of the sender’s address)?
A. Errors-To header
B. Content-Transfer-Encoding header
C. Mime-Version header
D. Content-Type header
A. Errors-To header
QUESTION NO: 7
Which of the following commands shows you all of the network services running on Windowsbased servers?
A. Net start
B. Net use
C. Net Session
D. Net share
A. Net start
QUESTION NO: 8
Email archiving is a systematic approach to save and protect the data contained in emails so that it can tie easily accessed at a later date.
A. True
B. False
A. True
QUESTION NO: 9 Which of the following commands shows you the NetBIOS name table each?
A. nbtstst
QUESTION NO: 10 Windows Security Accounts Manager (SAM) is a registry file which stores passwords in a hashed format. SAM file in Windows is located at: A. C:\windows\system32\config\SAM B. C:\windows\system32\con\SAM C. C:\windows\system32\Boot\SAM D. C:\windows\system32\drivers\SAM
A. C:\windows\system32\config\SAM
QUESTION NO: 11 FAT32 is a 32-bit version of FAT file system using smaller clusters and results in efficient storage capacity. What is the maximum drive size supported? A. 1 terabytes B. 2 terabytes C. 3 terabytes D. 4 terabytes
B. 2 terabytes
QUESTION NO: 12 In which step of the computer forensics investigation methodology would you run MD5 checksum on the evidence? A. Obtain search warrant B. Evaluate and secure the scene C. Collect the evidence D. Acquire the data
D. Acquire the data
QUESTION NO: 13 Network forensics allows Investigators 10 inspect network traffic and logs to identify and locate the attack system Network forensics can reveal: (Select three answers) A. Source of security incidents’ and network attacks B. Path of the attack C. Intrusion techniques used by attackers D. Hardware configuration of the attacker’s system
A. Source of security incidents’ and network attacks B. Path of the attack C. Intrusion techniques used by attackers
QUESTION NO: 14 Determine the message length from following hex viewer record: A. 6E2F B. 13 C. 27 D. 810D
D. 810D
QUESTION NO: 15 TCP/IP (Transmission Control Protocol/Internet Protocol) is a communication protocol used to connect different hosts in the Internet. It contains four layers, namely the network interface layer. Internet layer, transport layer, and application layer. Which of the following protocols works under the transport layer of TCP/IP? A. UDP B. HTTP C. FTP D. SNMP
A. UDP
QUESTION NO: 16 Which of the following statements does not support the case assessment? A. Review the case investigator’s request for service B. Identify the legal authority for the forensic examination request C. Do not document the chain of custody D. Discuss whether other forensic processes need to be performed on the evidence
C. Do not document the chain of custody
QUESTION NO: 17 Wireless access control attacks aim to penetrate a network by evading WLAN access control measures, such as AP MAC filters and Wi-Fi port access controls. Which of the following wireless access control attacks allows the attacker to set up a rogue access point outside the corporate perimeter, and then lure the employees of the organization to connect to it? A. War driving B. Rogue access points C. MAC spoofing D. Client mis-association
D. Client mis-association
QUESTION NO: 18 File deletion is a way of removing a file from a computer’s file system. What happens when a file is deleted in windows7? A. The last letter of a file name is replaced by a hex byte code E5h B. The operating system marks the file’s name in the MFT with a special character that indicates that the file has been deleted C. Corresponding clusters in FAT are marked as used D. The computer looks at the clusters occupied by that file and does not avails space to store a new file
B. The operating system marks the file’s name in the MFT with a special character that indicates that the file has been deleted
QUESTION NO: 19 What is cold boot (hard boot)? A. It is the process of starting a computer from a powered-down or off state B. It is the process of restarting a computer that is already turned on through the operating system C. It is the process of shutting down a computer from a powered-on or on state D. It is the process of restarting a computer that is already in sleep mode
A. It is the process of starting a computer from a powered-down or off state
QUESTION NO: 20 When a file or folder is deleted, the complete path, including the original file name, is stored in a special hidden file called “INF02” in the Recycled folder. If the INF02 file is deleted, it is re-created when you _______. A. Restart Windows B. Kill the running processes in Windows task manager C. Run the antivirus tool on the system D. Run the anti-spyware tool on the system
A. Restart Windows
QUESTION NO: 21 WPA2 provides enterprise and Wi-Fi users with stronger data protection and network access control which of the following encryption algorithm is used DVWPA2? A. RC4-CCMP B. RC4-TKIP C. AES-CCMP D. AES-TKIP
C. AES-CCMP
QUESTION NO: 22 The disk in the disk drive rotates at high speed, and heads in the disk drive are used only to read data. A. True B. False
B. False
QUESTION NO: 23 What is a bit-stream copy? A. Bit-Stream Copy is a bit-by-bit copy of the original storage medium and exact copy of the original disk B. A bit-stream image is the file that contains the NTFS files and folders of all the data on a disk or partition C. A bit-stream image is the file that contains the FAT32 files and folders of all the data on a disk or partition D. Creating a bit-stream image transfers only non-deleted files from the original disk to the image disk
A. Bit-Stream Copy is a bit-by-bit copy of the original storage medium and exact copy of the original disk
QUESTION NO: 24 System software password cracking is defined as cracking the operating system and all other utilities that enable a computer to function A. True B. False
A. True
QUESTION NO: 25 Which of the following Steganography techniques allows you to encode information that ensures creation of cover for secret communication? A. Substitution techniques B. Transform domain techniques C. Cover generation techniques D. Spread spectrum techniques
C. Cover generation techniques
QUESTION NO: 26 Ron. a computer forensics expert, Is Investigating a case involving corporate espionage. He has recovered several mobile computing devices from the crime scene. One of the evidence that Ron possesses is a mobile phone from Nokia that was left in on condition. Ron needs to recover the IMEI number of the device to establish the identity of the device owner. Which of the following key combinations he can use to recover the IMEI number? A. #*06*# B. *#06# C. #06r D. *1MEI#
B. *#06#
QUESTION NO: 27 Who is responsible for the following tasks? Secure the scene and ensure that it is maintained In a secure state until the Forensic Team advises. Make notes about the scene that will eventually be handed over to the Forensic Team A. Non-Laboratory Staff B. System administrators C. Local managers or other non-forensic staff D. Lawyers
A. Non-Laboratory Staff
QUESTION NO: 28 A system with a simple logging mechanism has not been given much attention during development, this system is now being targeted by attackers, if the attacker wants to perform a new line injection attack, what will he/she inject into the log file? A. Plaintext B. Single pipe character C. Multiple pipe characters D. HTML tags
A. Plaintext
QUESTION NO: 29 During the seizure of digital evidence, the suspect can be allowed touch the computer system. A. True B. False
B. False
QUESTION NO: 30 Which of the following password cracking techniques works like a dictionary attack, but adds some numbers and symbols to the words from the dictionary and tries to crack the password? A. Brute forcing attack B. Hybrid attack C. Syllable attack D. Rule-based attack
B. Hybrid attack
QUESTION NO: 31 Consistency in the investigative report is more important than the exact format in the report to eliminate uncertainty and confusion. A. True B. False
A. True
QUESTION NO: 32 When dealing with the powered-off computers at the crime scene, if the computer is switched off, turn it on A. True B. False
B. False
QUESTION NO: 33 MAC filtering is a security access control methodology, where a ___________ is assigned to each network card to determine access to the network A. 16-bit address B. 24-bit address C. 32-bit address D. 48-bit address
D. 48-bit address
QUESTION NO: 34 The ARP table of a router comes in handy for investigating network attacks, as the table contains IP addresses associated with the respective MAC addresses. The ARP table can be accessed using the __________command in Windows 7.
A. c:\arp
QUESTION NO: 35 You can interact with the Registry through intermediate programs. Graphical user interface (GUI) Registry editors such as Regedit.exe or Regedt32 exe are commonly used as intermediate programs in Windows 7. Which of the following is a root folder of the registry editor? A. HKEY_USERS B. HKEY_LOCAL_ADMIN C. HKEY_CLASSES_ADMIN D. HKEY_CLASSES_SYSTEM
A. HKEY_USERS
QUESTION NO: 36 You have been given the task to investigate web attacks on a Windows-based server. Which of the following commands will you use to look at which sessions the machine has opened with other systems? A. Net sessions B. Net use C. Net config D. Net share
B. Net use
QUESTION NO: 37 What is a SCSI (Small Computer System Interface)? A. A set of ANSI standard electronic interfaces that allow personal computers to communicate with peripheral hardware such as disk drives, tape drives. CD-ROM drives, printers, and scanners B. A standard electronic interface used between a computer motherboard’s data paths or bus and the computer’s disk storage devices C. A “plug-and-play” interface, which allows a device to be added without an adapter card and without rebooting the computer D. A point-to-point serial bi-directional interface for transmitting data between computer devices at data rates of up to 4 Gbps
A. A set of ANSI standard electronic interfaces that allow personal computers to communicate with peripheral hardware such as disk drives, tape drives. CD-ROM drives, printers, and scanners
QUESTION NO: 38 The status of the network interface cards (NICs) connected to a system gives information about whether the system is connected to a wireless access point and what IP address is being used. Which command displays the network configuration of the NICs on the system? A. ipconfig /all B. netstat C. net session D. tasklist
A. ipconfig /all
QUESTION NO: 39 Which Is a Linux journaling file system? A. Ext3 B. HFS C. FAT D. BFS
A. Ext3
QUESTION NO: 40 Which of the following steganography types hides the secret message in a specifically designed pattern on the document that is unclear to the average reader? A. Open code steganography B. Visual semagrams steganography C. Text semagrams steganography D. Technical steganography
A. Open code steganography
QUESTION NO: 41 Web applications provide an Interface between end users and web servers through a set of webpages that are generated at the server-end or contain script code to be executed dynamically within the client Web browser. A. True B. False
A. True
QUESTION NO: 42 Jason, a renowned forensic investigator, is investigating a network attack that resulted in the compromise of several systems in a reputed multinational’s network. He started Wireshark to capture the network traffic. Upon investigation, he found that the DNS packets travelling across the network belonged to a non-company configured IP. Which of the following attack Jason can infer from his findings? A. DNS Poisoning B. Cookie Poisoning Attack C. DNS Redirection D. Session poisoning
A. DNS Poisoning
QUESTION NO: 43 Which table is used to convert huge word lists (i .e. dictionary files and brute-force lists) into password hashes? A. Rainbow tables B. Hash tables C. Master file tables D. Database tables
A. Rainbow tables
QUESTION NO: 44 Data acquisition system is a combination of tools or processes used to gather, analyze and record Information about some phenomenon. Different data acquisition system are used depends on the location, speed, cost. etc. Serial communication data acquisition system is used when the actual location of the data is at some distance from the computer. Which of the following communication standard is used in serial communication data acquisition system? A. RS422 B. RS423 C. RS232 D. RS231
C. RS232
QUESTION NO: 45 Which of the following statements is incorrect when preserving digital evidence? A. Document the actions and changes that you observe in the monitor, computer, printer, or in other peripherals B. Verily if the monitor is in on, off, or in sleep mode C. Remove the power cable depending on the power state of the computer i.e., in on. off, or in sleep mode D. Turn on the computer and extract Windows event viewer log files
D. Turn on the computer and extract Windows event viewer log files
QUESTION NO: 46 Which of the following would you consider an aspect of organizational security, especially focusing on IT security? A. Biometric information security B. Security from frauds C. Application security D. Information copyright security
C. Application security
QUESTION NO: 47 Which of the following approaches checks and compares all the fields systematically and intentionally for positive and negative correlation with each other to determine the correlation across one or multiple fields? A. Graph-based approach B. Neural network-based approach C. Rule-based approach D. Automated field correlation approach
D. Automated field correlation approach
QUESTION NO: 48 Log management includes all the processes and techniques used to collect, aggregate, and analyze computer-generated log messages. It consists of the hardware, software, network and media used to generate, transmit, store, analyze, and dispose of log data. A. True B. False
A. True
QUESTION NO: 49 Data files from original evidence should be used for forensics analysis A. True B. False
B. False
QUESTION NO: 50 Attackers can manipulate variables that reference files with “dot-dot-slash (./)” sequences and their variations such as http://www.juggyDoy.corn/GET/process.php./././././././././etc/passwd. Identify the attack referred. A. Directory traversal B. SQL Injection C. XSS attack D. File injection
A. Directory traversal
QUESTION NO: 51 Subscriber Identity Module (SIM) is a removable component that contains essential information about the subscriber. Its main function entails authenticating the user of the cell phone to the network to gain access to subscribed services. SIM contains a 20-digit long Integrated Circuit Card identification (ICCID) number, identify the issuer identifier Number from the ICCID below. A. 89 B. 44 C. 245252 D. 001451548
C. 245252
QUESTION NO: 52 The Electronic Serial Number (ESN) is a unique __________ recorded on a secure chip in a mobile phone by the manufacturer. A. 16-bit identifier B. 24-bit identifier C. 32-bit identifier D. 64-bit identifier
C. 32-bit identifier
QUESTION NO: 53 First response to an incident may involve three different groups of people, and each will have differing skills and need to carry out differing tasks based on the incident. Who is responsible for collecting, preserving, and packaging electronic evidence? A. System administrators B. Local managers or other non-forensic staff C. Forensic laboratory staff D. Lawyers
C. Forensic laboratory staff
QUESTION NO: 54 Task list command displays a list of applications and services with their Process ID (PID) for all tasks running on either a local or a remote computer. Which of the following task list commands provides information about the listed processes, including the image name, PID, name, and number of the session for the process? A. tasklist/s B. tasklist/u C. tasklist/p D. tasklist/v
D. tasklist/v
QUESTION NO: 55 An expert witness is a witness, who by virtue of education, profession, or experience, is believed to have special knowledge of his/her subject beyond that of the average person, sufficient that others legally depend upon his/her opinion. A. True B. False
A. True
QUESTION NO: 56 P0P3 (Post Office Protocol 3) is a standard protocol for receiving email that deletes mail on the server as soon as the user downloads it. When a message arrives, the POP3 server appends it to the bottom of the recipient’s account file, which can be retrieved by the email client at any preferred time. Email client connects to the POP3 server at _______________by default to fetch emails. A. Port 109 B. Port 110 C. Port 115 D. Port 123
B. Port 110
QUESTION NO: 57 Windows Security Event Log contains records of login/logout activity or other security-related events specified by the system’s audit policy. What does event ID 531 in Windows Security Event Log indicates? A. A user successfully logged on to a computer B. The logon attempt was made with an unknown user name or a known user name with a bad password C. An attempt was made to log on with the user account outside of the allowed time D. A logon attempt was made using a disabled account
D. A logon attempt was made using a disabled account
QUESTION NO: 58 When collecting evidence from the RAM, where do you look for data? A. Swap file B. SAM file C. Data file D. Log file
A. Swap file
QUESTION NO: 59 A rogue/unauthorized access point is one that Is not authorized for operation by a particular firm or network A. True B. False
A. True
QUESTION NO: 60 Computer security logs contain information about the events occurring within an organization’s systems and networks. Application and Web server log files are useful in detecting web attacks. The source, nature, and time of the attack can be determined by _________of the compromised system. A. Analyzing log files B. Analyzing SAM file C. Analyzing rainbow tables D. Analyzing hard disk boot records
A. Analyzing log files
QUESTION NO: 61 Deposition enables opposing counsel to preview an expert witness’s testimony at trial. Which of the following deposition is not a standard practice? A. Both attorneys are present B. Only one attorneys is present C. No jury or judge D. Opposing counsel asks questions
B. Only one attorneys is present
QUESTION NO: 62 If a file (readme.txt) on a hard disk has a size of 2600 bytes, how many sectors are normally allocated to this file? A. 4 Sectors B. 5 Sectors C. 6 Sectors D. 7 Sectors
C. 6 Sectors
QUESTION NO: 63 Recovery of the deleted partition is the process by which the investigator evaluates and extracts the deleted partitions. A. True B. False
A. True
QUESTION NO: 64 During first responder procedure you should follow all laws while collecting the evidence, and contact a computer forensic examiner as soon as possible. A. True B. False
A. True
QUESTION NO: 65 Which one of the following is not a consideration in a forensic readiness planning checklist? A. Define the business states that need digital evidence B. Identify the potential evidence available C. Decide the procedure for securely collecting the evidence that meets the requirement in a forensically sound manner D. Take permission from all employees of the organization
D. Take permission from all employees of the organization
QUESTION NO: 66 When collecting electronic evidence at the crime scene, the collection should proceed from the most volatile to the least volatile A. True B. False
A. True
QUESTION NO: 67 What is a chain of custody? A. A legal document that demonstrates the progression of evidence as it travels from the original evidence location to the forensic laboratory B. It is a search warrant that is required for seizing evidence at a crime scene C. It Is a document that lists chain of windows process events D. Chain of custody refers to obtaining preemptive court order to restrict further damage of evidence in electronic seizures
A. A legal document that demonstrates the progression of evidence as it travels from the original evidence location to the forensic laboratory
QUESTION NO: 68 Data is striped at a byte level across multiple drives and parity information is distributed among all member drives. What RAID level is represented here? A. RAID Level0 B. RAID Level 1 C. RAID Level 3 D. RAID Level 5
D. RAID Level 5
QUESTION NO: 69 Computer forensics report provides detailed information on complete computer forensics investigation process. It should explain how the incident occurred, provide technical details of the incident and should be clear to understand. Which of the following attributes of a forensics report can render it inadmissible in a court of law? A. It includes metadata about the incident B. It includes relevant extracts referred to In the report that support analysis or conclusions C. It is based on logical assumptions about the incident timeline D. It maintains a single document style throughout the text
C. It is based on logical assumptions about the incident timeline
QUESTION NO: 70 Email spoofing refers to: A. The forgery of an email header so that the message appears to have originated from someone or somewhere other than the actual source B. The criminal act of sending an illegitimate email, falsely claiming to be from a legitimate site in an attempt to acquire the user’s personal or account information C. Sending huge volumes of email to an address in an attempt to overflow the mailbox or overwhelm the server where the email address Is hosted to cause a denial-of-service attack D. A sudden spike of “Reply All” messages on an email distribution list, caused by one misdirected message
A. The forgery of an email header so that the message appears to have originated from someone or somewhere other than the actual source
QUESTION NO: 71 Volatile information can be easily modified or lost when the system is shut down or rebooted. It helps to determine a logical timeline of the security incident and the users who would be responsible. A. True B. False
A. True
QUESTION NO: 72 A steganographic file system is a method to store the files in a way that encrypts and hides the data without the knowledge of others A. True B. False
A. True