Udemy Test 6 Flashcards

1
Q

This is the default folder path for used for syncing files in Dropbox.

A

C:\Users\Dropbox

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

This is a type of anti-forensic technique with malware.

A

packing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

This is an IDS:

A

Snort

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

You can detect Trojans with which of the following?

A

Capsa

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

You can use this to see the last access time change for Windows 10.

A

fsutil

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

These store information of files synced to the cloud using Dropbox.

A

filechache.dbx and config.dbx

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A small law firm suspects an incident, where there was potential criminal action, and wants to investigate themselves. Why should they avoid doing so? (choose the best answer)

A

They may alter the timestamp

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What file type is this? FF D8 FF E1

A

JPEG

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

These files are located within an instance (n) of Dropbox folder in AppData of the user’s profile.

A

Configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Google Drive Configuration files are stored at this path:

A

C:\Users\AppData\Local\Google Drive\User

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Google Drive Configuration files are stored at this path:

A

C:\Users\AppData\Local\Google\Drive\User_default

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Dropbox Client path:

A

C:\Program Files(x86)\Dropbox\Client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The investigator is looking to detect something after the incident has ended

A

Post-mortam Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

When a FAT file is deleted, what is placed at the front?

A

E5H

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

This has journaling:

A

NTFS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

This contains the manufacturer’s information (choose the best answer).

A

ICCID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

This contains the manufacturer’s information (choose the best answer).

18
Q

The $I file contains all of the following EXCEPT:

A

The original File Size

19
Q

The $I file contains all of the following EXCEPT:

A

The length of the file as 344 bytes long

20
Q

This verifies the file system integrity of a volume, fixes logical file system errors, and is similar to the fsck command in Unix.

21
Q

A hacker commits a DDoS attack against a specific IP address of a company’s Web server. This is considered what type of attack?

A

Network Attack

22
Q

You can view DBX files in:

A

MS Outlook Express

23
Q

UTC stands for:

A

Coordinated Universal Time

24
Q

This can do data acquisition and duplication.

25
This contains the Google Drive version, the local sync root path, and user’s email address.
sync_config.db
26
The first __ bits of the ESN is the manufacturer’s code.
8-bits
27
The attorney that calls the witness to the stand is asking the questions.
Direct Examination
28
The Linux bootloader is active in this stage.
Bootloader Stage
29
The installation of Google Drive Client Version in Windows 10 creates this (choose the best answer):
sync_log.log
30
This is part of Metasploit that can be used to hide data in the slack space of FAT and NTFS.
Slacker
31
The forensic investigator uses this command to see what sessions are open.
net session
32
Exchange server email header information is located here.
PRIV.EDB
33
GIF has how many bits per pixel.
8
34
This tool is used to open registry hives.
Registry Editor
35
The default Google Drive installation location in Windows 10 OS.
C:\Program Files (x86)\Google\Drive
36
Jv16 tool is used for:
Registry
37
These are saved in the installation folder in the user profile for Google Drive.
configuration Files
38
This Tasklist command specifies the name or IP address of a remote computer.
/s
39
This does not use OLE.
PDF
40
This contains executables, libraries, Program Files, LiNK files, links of user profiles, and application shortcuts in Dropbox.
Dropbox Client