Udemy Test 5 Flashcards

1
Q

This tool restores deleted emails and email attachments.

A

Data Recovery Pro

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Max has arrived on scene and sees that the computer is turned on. His first step should be to (choose the best answer):

A

Photograph the current computer state

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which Windows version can use UEFI-GPT or BIOS-MBR?

A

Win10

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The investigator has performed a bit-by-bit copy of a drive. Now the investigator wants to look for unusual network services. What command should be used?

A

net start

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

This type of password attack uses a combination of dictionary and brute force techniques.

A

Syllable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

This tool displays details about GPT partition tables in Mac OS.

A

Disk Utility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

jv16 can be used for:

A

registry

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

James enjoys this tool that offers thumbnails previews.

A

DiskDigger

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Jamie needs a tool that can recover files with their original file name.

A

StellarPhoenix

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

This tool can be used for dynamic malware analysis.

A

Install Watch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

David is looking for a tool that contains an ISO image, so he can burn a bootable CD. What tool is he looking for?

A

Active@ File Recovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

This extracts data contained from an internet traffic capture.

A

Xplico

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Samuel has completed static analysis of a new malware strain. He is now going to perform dynamic analysis. Which tool can he use to monitor for installations, while performing dynamic analysis?

A

SysAnalyzer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Paco needs to open an Android phone. He should use:

A

TowelRoot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Nasir is needing to recover lost data from RAID. He knows that this tool will be needed.

A

TotalRecall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Jennifer is an investigator with the FBI. She is performing dynamic analysis on malware and wants to know the dependencies. What tool should she use?

A

Dependency Walker

17
Q

This can recover documents, even if Windows is reinstalled.

A

UndeletePlus

18
Q

This tool recovers all file types from a HFS formatted drive.

A

Data Rescue 4

19
Q

This is an open source NFAT.

20
Q

CAN-SPAM requires senders to honor opt-out requests within:

A

10 Business Days

21
Q

PUB.EDB:

A

Stores public folder hierarchies and contents

22
Q

RAPID IMAGE 7020 X2 is designed to copy how many “Master” hard drives?

23
Q

This rule covers limited admissibility.

24
Q

This can recover files from newly formatted drives.

25
This tool can recover deleted files emptied from the Recycle Bin, or lost because of the formatting/corruption of a hard drive, virus or Trojan infection, and unexpected system shutdowns.
Recover my Files