(V9) v11.0 (312-49v9) Flashcards
File deletion is a way of removing a file from a computer’s file system. What happens when
a file is deleted in windows7?
The operating system marks the file’s name in the MFT with a special character that indicates that the file has been deleted
Networks are vulnerable to an attack which occurs due to overextension of bandwidth,
bottlenecks, network data interception, etc.
Which of the following network attacks refers to a process in which an attacker changes his
or her IP address so that he or she appears to be someone else?
IP address spoofing
The evolution of web services and their increasing use in business offers new attack
vectors in an application framework. Web services are based on XML protocols such as
web Services Definition Language (WSDL) for describing the connection points, Universal
Description, Discovery, and Integration (UDDI) for the description and discovery of Web
services and Simple Object Access Protocol (SOAP) for communication between Web
services that are vulnerable to various web application threats. Which of the following layer
in web services stack is vulnerable to fault code leaks?
Discovery Layer
The ARP table of a router comes in handy for Investigating network attacks, as the table
contains IP addresses associated with the respective MAC addresses.
The ARP table can be accessed using the __________command in Windows 7.
C:\arp -a
Attackers can manipulate variables that reference files with “dot-dot-slash (./)” sequences
and their variations such as
http://www.juggyDoy.corn/GET/process.php./././././././././etc/passwd.
Identify the attack referred.
Directory traversal
What is a SCSI (Small Computer System Interface)?
A set of ANSI standard electronic interfaces that allow personal computers to communicate with peripheral hardware such as disk drives, tape drives. CD-ROM drives, printers, and scanners
Billy, a computer forensics expert, has recovered a large number of DBX files during
forensic investigation of a laptop. Which of the following email clients he can use to analyze
the DBX files?
Microsoft Outlook Express
Depending upon the Jurisdictional areas, different laws apply to different incidents. Which
of the following law is related to fraud and related activity in connection with computers?
18 USC 7030
What is a bit-stream copy?
Bit-Stream Copy is a bit-by-bit copy of the original storage medium and exact copy of the original disk
T or F? Network forensics can be defined as the sniffing, recording, acquisition and analysis of the
network traffic and event logs in order to investigate a network security incident.
True
According to US federal rules, to present a testimony in a court of law, an expert witness
needs to furnish certain information to prove his eligibility. Jason, a qualified computer
forensic expert who has started practicing two years back, was denied an expert testimony
in a computer crime case by the US Court of Appeals for the Fourth Circuit in Richmond,
Virginia. Considering the US federal rules, what could be the most appropriate reason for
the court to reject Jason’s eligibility as an expert witness?
Jason was unable to furnish documents showing four years of previous experience in the field
Syslog is a client/server protocol standard for forwarding log messages across an IP
network. Syslog uses ___________to transfer log messages in a clear text format.
TCP
Which of the following statements is incorrect when preserving digital evidence?
Turn on the computer and extract Windows event viewer log files
An Internet standard protocol (built on top of TCP/IP) that assures accurate synchronization
to the millisecond of computer clock times in a network of computers. Which of the
following statement is true for NTP Stratum Levels?
A stratum-3 server gets its time over a network link, via NTP, from a stratum-2 server, and so on
JPEG is a commonly used method of compressing photographic Images. It uses a
compression algorithm to minimize the size of the natural image, without affecting the
quality of the image. The JPEG lossy algorithm divides the image in separate blocks
of____________.
8x8 pixels
Which of the following commands shows you the NetBIOS name table each?
nbtstat -n
Computer security logs contain information about the events occurring within an
organization’s systems and networks. Which of the following security logs contains Logs of
network and host-based security software?
Security software logs
What is the smallest allocation unit of a hard disk?
Cluster
Which of the following is not a part of data acquisition forensics Investigation?
Work on the original storage medium not on the duplicated copy
In which step of the computer forensics investigation methodology would you run MD5
checksum on the evidence?
Acquire the data
Damaged portions of a disk on which no read/Write operation can be performed is known
as ______________.
Bad sector
SIM is a removable component that contains essential information about the subscriber. It
has both volatile and non-volatile memory. The file system of a SIM resides in
_____________ memory.
Non-volatile
T or F? During first responder procedure you should follow all laws while collecting the evidence,
and contact a computer forensic examiner as soon as possible
True
Which of the following is not a part of disk imaging tool requirements?
The tool should not compute a hash value for the complete bit stream copy generated from an image file of the source
Why is it Important to consider health and safety factors in the work carried out at all stages
of the forensic process conducted by the forensic analysts?
This is to protect the staff and preserve any fingerprints that may need to be recovered at a later date
Deposition enables opposing counsel to preview an expert witness’s testimony at trial.
Which of the following deposition is not a standard practice?
Only one attorneys is present
T or F? When dealing with the powered-off computers at the crime scene, if the computer is
switched off, turn it on
False
Which table is used to convert huge word lists (i .e. dictionary files and brute-force lists) into
password hashes?
Rainbow tables
T or F? An expert witness is a witness, who by virtue of education, profession, or experience, is
believed to have special knowledge of his/her subject beyond that of the average person,
sufficient that others legally depend upon his/her opinion.
True
T or F? Centralized logging is defined as gathering the computer system logs for a group of
systems in a centralized location. It is used to efficiently monitor computer system logs with
the frequency required to detect security violations and unusual activity.
True
T or F? Cyber-crime is defined as any Illegal act involving a gun, ammunition, or its applications.
False
Files stored in the Recycle Bin in its physical location are renamed as Dxy.ext, where, X
represents the _________.
Drive name
Ever-changing advancement or mobile devices increases the complexity of mobile device
examinations. Which or the following is an appropriate action for the mobile forensic
investigation?
If the device’s display is ON. the screen’s contents should be photographed and, if necessary, recorded manually, capturing the time, service status, battery level, and other displayed icons
What is the “Best Evidence Rule”?
It states that the court only allows the original evidence of a document, photograph, or recording at the trial rather than a copy
T or F? During the seizure of digital evidence, the suspect can be allowed touch the computer
system.
False
Which of the following standard is based on a legal precedent regarding the admissibility of
scientific examinations or experiments in legal cases?
Frye Standard
All the Information about the user activity on the network, like details about login and logoff
attempts, is collected in the security log of the computer. When a user’s login is successful,
successful audits generate an entry whereas unsuccessful audits generate an entry for
failed login attempts in the logon event ID table.
In the logon event ID table, which event ID entry (number) represents a successful logging
on to a computer?
528
The Recycle Bin is located on the Windows desktop. When you delete an item from the
hard disk, Windows sends that deleted item to the Recycle Bin and the icon changes to full
from empty, but items deleted from removable media, such as a floppy disk or network
drive, are not stored in the Recycle Bin.
What is the size limit for Recycle Bin in Vista and later versions of the Windows?
No size limit
In Windows 7 system files, which file reads the Boot.ini file and loads Ntoskrnl.exe.
Bootvid.dll. Hal.dll, and boot-start device drivers?
Ntldr
Digital evidence validation involves using a hashing algorithm utility to create a binary or
hexadecimal number that represents the uniqueness of a data set, such as a disk drive or
file.
Which of the following hash algorithms produces a message digest that is 128 bits long?
MD5
Which device in a wireless local area network (WLAN) determines the next network point to
which a packet should be forwarded toward its destination?
Wireless router
What is the first step that needs to be carried out to crack the password?
A word list is created using a dictionary generator program or dictionaries
T or F? Under no circumstances should anyone, with the exception of qualified computer forensics
personnel, make any attempts to restore or recover information from a computer system or
device that holds electronic information.
True
Email archiving is a systematic approach to save and protect the data contained in emails
so that it can be accessed fast at a later date. There are two main archive types, namely
Local Archive and Server Storage Archive. Which of the following statements is correct
while dealing with local archives?
It is difficult to deal with the webmail as there is no offline archive in most cases. So consult your counsel on the case as to the best way to approach and gain access to the required data on servers
When a system is compromised, attackers often try to disable auditing, in Windows 7;
modifications to the audit policy are recorded as entries of Event ID____________.
4902
Graphics Interchange Format (GIF) is a ___________RGB bitmap Image format for
Images with up to 256 distinct colors per frame.
8-bit
Who is responsible for the following tasks?
? Secure the scene and ensure that it is maintained In a secure state until the
Forensic Team advises
? Make notes about the scene that will eventually be handed over to the Forensic
Team
Non-Laboratory Staff
First responder is a person who arrives first at the crime scene and accesses the victim’s
computer system after the incident. He or She is responsible for protecting, integrating, and
preserving the evidence obtained from the crime scene.
Which of the following is not a role of first responder?
Prosecute the suspect in court of law
T or F? System software password cracking is defined as cracking the operating system and all
other utilities that enable a computer to function
True
T or F? A computer forensic report is a report which provides detailed information on the complete
forensics investigation process.
True
When collecting evidence from the RAM, where do you look for data?
Swap file
Which of the following Steganography techniques allows you to encode information that
ensures creation of cover for secret communication?
Cover generation techniques
Router log files provide detailed Information about the network traffic on the Internet. It
gives information about the attacks to and from the networks. The router stores log files in
the____________.
Router cache
When NTFS Is formatted, the format program assigns the __________ sectors to the boot
sectors and to the bootstrap code
First 16
Smith, as a part his forensic investigation assignment, has seized a mobile device. He was
asked to recover the Subscriber Identity Module (SIM card) data the mobile device. Smith
found that the SIM was protected by a Personal identification Number (PIN) code but he
was also aware that people generally leave the PIN numbers to the defaults or use easily
guessable numbers such as 1234. He unsuccessfully tried three PIN numbers that blocked
the SIM card. What Jason can do in this scenario to reset the PIN and access SIM data?
He should ask the network operator for Personal Unlock Number (PUK) to gain access to the SIM
Injection flaws are web application vulnerabilities that allow untrusted data to be Interpreted
and executed as part of a command or query. Attackers exploit injection flaws by
constructing malicious commands or queries that result in data loss or corruption, lack of
accountability, or denial of access. Which of the following injection flaws involves the
injection of malicious code through a web application?
SQL Injection
How do you define Technical Steganography?
Steganography that uses physical or chemical means to hide the existence of a message
Which of the following statements is not a part of securing and evaluating electronic crime
scene checklist?
Blog about the incident on the internet
BMP (Bitmap) is a standard file format for computers running the Windows operating
system. BMP images can range from black and white (1 bit per pixel) up to 24 bit color
(16.7 million colors). Each bitmap file contains header, the RGBQUAD array, information
header, and image data. Which of the following element specifies the dimensions,
compression type, and color format for the bitmap?
The RGBQUAD array
T or F: Data files from original evidence should be used for forensics analysis
False
Event correlation is a procedure that is assigned with a new meaning for a set of events
that occur in a predefined interval of time.
Which type of correlation will you use if your organization wants to use different OS and
network hardware platforms throughout the network?
Cross-platform correlation
Which of the following steganography types hides the secret message in a specifically
designed pattern on the document that is unclear to the average reader?
Open code steganography
Network forensics allows Investigators to inspect network traffic and logs to identify and
locate the attack system
Network forensics can reveal: (Select three answers)
A. Source of security incidents’ and network attacks
B. Path of the attack
C. Intrusion techniques used by attackers
Windows Security Accounts Manager (SAM) is a registry file which stores passwords in a
hashed format.
SAM file in Windows is located at:
C:\windows\system32\config\SAM
T or F: Email archiving is a systematic approach to save and protect the data contained in emails
so that it can tie easily accessed at a later date.
True
P0P3 (Post Office Protocol 3) is a standard protocol for receiving email that deletes mail on
the server as soon as the user downloads it. When a message arrives, the POP3 server
appends it to the bottom of the recipient’s account file, which can be retrieved by the email
client at any preferred time. Email client connects to the POP3 server at
_______________by default to fetch emails.
Port 110
The status of the network interface cards (NICs) connected to a system gives information
about whether the system is connected to a wireless access point and what IP address is
being used.
Which command displays the network configuration of the NICs on the system?
ipconfig /all
Raw data acquisition format creates ____________of a data set or suspect drive.
Simple sequential flat files
What is a first sector (“sector zero”) of a hard disk?
Master boot record
You have been given the task to investigate web attacks on a Windows-based server.
Which of the following commands will you use to look at which sessions the machine has
opened with other systems?
Net use
The Recycle Bin exists as a metaphor for throwing files away, but it also allows user to
retrieve and restore files. Once the file is moved to the recycle bin, a record is added to the
log file that exists in the Recycle Bin.
Which of the following files contains records that correspond to each deleted file in the
Recycle Bin?
INFO2 file
Which one of the following is not a consideration in a forensic readiness planning checklist?
Take permission from all employees of the organization
LBA (Logical Block Address) addresses data by allotting a ___________to each sector of
the hard disk.
Sequential number
How do you define forensic computing?
It is the science of capturing, processing, and investigating data security incidents and making it acceptable to a court of law.
File deletion is a way of removing a file from a computer’s file system. What happens when
a file is deleted in windows7?
The operating system marks the file’s name in the MFT with a special character that indicates that the file has been deleted
Networks are vulnerable to an attack which occurs due to overextension of bandwidth,
bottlenecks, network data interception, etc.
Which of the following network attacks refers to a process in which an attacker changes his
or her IP address so that he or she appears to be someone else?
IP address spoofing
The evolution of web services and their increasing use in business offers new attack
vectors in an application framework. Web services are based on XML protocols such as
web Services Definition Language (WSDL) for describing the connection points, Universal
Description, Discovery, and Integration (UDDI) for the description and discovery of Web
services and Simple Object Access Protocol (SOAP) for communication between Web
services that are vulnerable to various web application threats. Which of the following layer
in web services stack is vulnerable to fault code leaks?
Discovery Layer
The ARP table of a router comes in handy for Investigating network attacks, as the table
contains IP addresses associated with the respective MAC addresses.
The ARP table can be accessed using the __________command in Windows 7.
C:\arp -a
Attackers can manipulate variables that reference files with “dot-dot-slash (./)” sequences
and their variations such as
http://www.juggyDoy.corn/GET/process.php./././././././././etc/passwd.
Identify the attack referred.
Directory traversal
What is a SCSI (Small Computer System Interface)?
A set of ANSI standard electronic interfaces that allow personal computers to communicate with peripheral hardware such as disk drives, tape drives. CD-ROM drives, printers, and scanners
Billy, a computer forensics expert, has recovered a large number of DBX files during
forensic investigation of a laptop. Which of the following email clients he can use to analyze
the DBX files?
Microsoft Outlook Express
Depending upon the Jurisdictional areas, different laws apply to different incidents. Which
of the following law is related to fraud and related activity in connection with computers?
18 USC 7030
What is a bit-stream copy?
Bit-Stream Copy is a bit-by-bit copy of the original storage medium and exact copy of the original disk
T or F: Network forensics can be defined as the sniffing, recording, acquisition and analysis of the
network traffic and event logs in order to investigate a network security incident.
True
According to US federal rules, to present a testimony in a court of law, an expert witness
needs to furnish certain information to prove his eligibility. Jason, a qualified computer
forensic expert who has started practicing two years back, was denied an expert testimony
in a computer crime case by the US Court of Appeals for the Fourth Circuit in Richmond,
Virginia. Considering the US federal rules, what could be the most appropriate reason for
the court to reject Jason’s eligibility as an expert witness?
Jason was unable to furnish documents showing four years of previous experience in the field
Syslog is a client/server protocol standard for forwarding log messages across an IP
network. Syslog uses ___________to transfer log messages in a clear text format.
TCP
Which of the following statements is incorrect when preserving digital evidence?
Turn on the computer and extract Windows event viewer log files
An Internet standard protocol (built on top of TCP/IP) that assures accurate synchronization
to the millisecond of computer clock times in a network of computers. Which of the
following statement is true for NTP Stratum Levels?
A stratum-3 server gets its time over a network link, via NTP, from a stratum-2 server, and so on
Smith, an employee of a reputed forensic Investigation firm, has been hired by a private
organization to investigate a laptop that is suspected to be involved in hacking of
organization DC server. Smith wants to find all the values typed into the Run box in the
Start menu. Which of the following registry key Smith will check to find the above
information?
RunMRU key
An intrusion detection system (IDS) gathers and analyzes information from within a
computer or a network to identify any possible violations of security policy, including
unauthorized access, as well as misuse.
Which of the following intrusion detection systems audit events that occur on a specific
host?
Host-based intrusion detection
Jason, a renowned forensic investigator, is investigating a network attack that resulted in
the compromise of several systems in a reputed multinational’s network. He started
Wireshark to capture the network traffic. Upon investigation, he found that the DNS packets
travelling across the network belonged to a non-company configured IP. Which of the
following attack Jason can infer from his findings?
DNS Poisoning
Which of the following email headers specifies an address for mailer-generated errors, like
“no such user” bounce messages, to go to (instead of the sender’s address)?
Errors-To header
Dumpster Diving refers to:
Searching for sensitive information in the user’s trash bins and printer trash bins, and searching the user’s desk for sticky notes
Which of the following statement is not correct when dealing with a powered-on computer
at the crime scene?
If the computer is switched off. power on the computer to take screenshot of the desktop
What is the First Step required in preparing a computer for forensics investigation?
Do not turn the computer off or on, run any programs, or attempt to access data on a computer
Which of the following file in Novel GroupWise stores information about user accounts?
ngwguard.db
T or F: Physical security recommendations: There should be only one entrance to a forensics lab
True
T or F: Mobile phone forensics is the science of recovering digital evidence from a mobile phone
under forensically sound conditions.
True
Which Is a Linux journaling file system?
Ext3
Which of the following Wi-Fi chalking methods refers to drawing symbols in public places to
advertise open Wi-Fi networks?
WarChalking
Which of the following is not a part of the technical specification of the laboratory-based
imaging system?
very low image capture rate
Which of the following would you consider an aspect of organizational security, especially
focusing on IT security?
Application security
Task list command displays a list of applications and services with their Process ID (PID)
for all tasks running on either a local or a remote computer.
Which of the following task list commands provides information about the listed processes,
including the image name, PID, name, and number of the session for the process?
tasklist/V
Which of the following reports are delivered under oath to a board of
directors/managers/panel of jury?
Verbal Formal Report
Attacker uses vulnerabilities in the authentication or session management functions such
as exposed accounts, session IDs, logout, password management, timeouts, remember
me. secret question, account update etc. to impersonate users, if a user simply closes the
browser without logging out from sites accessed through a public computer, attacker can
use the same browser later and exploit the user’s privileges. Which of the following
vulnerability/exploitation is referred above?
Timeout Exploitation
T or F: Digital evidence is not fragile in nature.
False
The need for computer forensics is highlighted by an exponential increase in the number of
cybercrimes and litigations where large organizations were involved. Computer forensics
plays an important role in tracking the cyber criminals. The main role of computer forensics
is to:
Extract, process, and interpret the factual evidence so that it proves the attacker’s actions in the court
In an echo data hiding technique, the secret message is embedded into a __________as
an echo.
Cover audio signal
T or f: When collecting electronic evidence at the crime scene, the collection should proceed from
the most volatile to the least volatile
True
Which wireless standard has bandwidth up to 54 Mbps and signals in a regulated
frequency spectrum around 5 GHz?
802.11a
File signature analysis involves collecting information from the __________ of a file to
determine the type and function of the file
First 20 bytes
Which of the following attacks allows attacker to acquire access to the communication
channels between the victim and server to extract the information?
Man-in-the-middle (MITM) attack
The Electronic Serial Number (ESN) is a unique __________ recorded on a secure chip in
a mobile phone by the manufacturer.
32-bit identifier
Which of the following is not correct when documenting an electronic crime scene?
Write down the color of shirt and pant the suspect was wearing
T or F: A steganographic file system is a method to store the files in a way that encrypts and hides
the data without the knowledge of others
True
An image is an artifact that reproduces the likeness of some subject. These are produced
by optical devices (i.e. cameras, mirrors, lenses, telescopes, and microscopes).
Which property of the image shows you the number of colors available for each pixel in an
image?
Bit Depth
Which of the following log injection attacks uses white space padding to create unusual log
entries?
Word wrap abuse attack
T or F: SMTP (Simple Mail Transfer protocol) receives outgoing mail from clients and validates
source and destination addresses, and also sends and receives emails to and from other
SMTP servers.
True
Buffer Overflow occurs when an application writes more data to a block of memory, or
buffer, than the buffer is allocated to hold. Buffer overflow attacks allow an attacker to
modify the _______________in order to control the process execution, crash the process
and modify internal variables.
Target process’s address space
Which of the following statements does not support the case assessment?
Do not document the chain of custody
What is static executable file analysis?
It is a process that consists of collecting information about and from an executable file without actually launching the file under any circumstances
Which is not a part of environmental conditions of a forensics lab?
Open windows facing the public road
T or F: At the time of evidence transfer, both sender and receiver need to give the information
about date and time of transfer in the chain of custody record.
True
Operating System logs are most beneficial for Identifying or Investigating suspicious
activities involving a particular host. Which of the following Operating System logs contains
information about operational actions performed by OS components?
Event logs
A mobile operating system is the operating system that operates a mobile device like a
mobile phone, smartphone, PDA, etc. It determines the functions and features available on
mobile devices such as keyboards, applications, email, text messaging, etc. Which of the
following mobile operating systems is free and open source?
Android
Hard disk data addressing is a method of allotting addresses to each ___________of data
on a hard disk
Physical block
WPA2 provides enterprise and Wi-Fi users with stronger data protection and network
access control which of the following encryption algorithm is used DVWPA2?
AES-CCMP
T or F: Steganography is a technique of hiding a secret message within an ordinary message and
extracting it at the destination to maintain the confidentiality of data.
True
T or F: Digital photography helps in correcting the perspective of the Image which Is used In taking
the measurements of the evidence. Snapshots of the evidence and incident-prone areas
need to be taken to help in the forensic process. Is digital photography accepted as
evidence in the court of law?
True
T or F: Consistency in the investigative report is more important than the exact format in the report
to eliminate uncertainty and confusion.
True
International Mobile Equipment Identifier (IMEI) is a 15-dlgit number that indicates the
manufacturer, model type, and country of approval for GSM devices. The first eight digits of
an IMEI number that provide information about the model and origin of the mobile device is
also known as:
Type Allocation Code (TAC)
Windows Security Event Log contains records of login/logout activity or other security-
related events specified by the system’s audit policy. What does event ID 531 in Windows
Security Event Log indicates?
A logon attempt was made using a disabled account
Wireless access control attacks aim to penetrate a network by evading WLAN access
control measures, such as AP MAC filters and Wi-Fi port access controls.
Which of the following wireless access control attacks allows the attacker to set up a rogue
access point outside the corporate perimeter, and then lure the employees of the
organization to connect to it?
Client mis-association
A forensic investigator is a person who handles the complete Investigation process, that is,
the preservation, identification, extraction, and documentation of the evidence. The
investigator has many roles and responsibilities relating to the cybercrime analysis. The
role of the forensic investigator is to:
Create an image backup of the original evidence without tampering with potential evidence
T or F: Web applications provide an Interface between end users and web servers through a set of
web pages that are generated at the server-end or contain script code to be executed
dynamically within the client Web browser.
True
If a file (readme.txt) on a hard disk has a size of 2600 bytes, how many sectors are
normally allocated to this file?
6 Sectors
MAC filtering is a security access control methodology, where a ___________ is assigned
to each network card to determine access to the network
48-bit address
Which of the following commands shows you the username and IP address used to access
the system via a remote login session and the Type of client from which they are accessing
the system?
Net sessions
Which of the following is the certifying body of forensics labs that investigate criminal cases
by analyzing evidence?
The American Society of Crime Laboratory Directors (ASCLD)
T or F: An attack vector is a path or means by which an attacker can gain access to computer or
network resources in order to deliver an attack payload or cause a malicious outcome.
True
What is the first step that needs to be carried out to investigate wireless attacks?
Obtain a search warrant
Tracks numbering on a hard disk begins at 0 from the outer edge and moves towards the
center, typically reaching a value of ___________.
1023
T or F: Data Acquisition is the process of imaging or otherwise obtaining information from a digital
device and its peripheral equipment and media
True
If the partition size Is 4 GB, each cluster will be 32 K. Even If a file needs only 10 K, the
entire 32 K will be allocated, resulting In 22 K of___________.
Slack space
Shortcuts are the files with the extension .Ink that are created and are accessed by the
users. These files provide you with information about:
Files or network shares
The IIS log file format is a fixed (cannot be customized) ASCII text-based format. The IIS
format includes basic items, such as client IP address, user name, date and time, service
and instance, server name and IP address, request type, target of operation, etc. Identify
the service status code from the following IIS log.
192.168.100.150, -, 03/6/11, 8:45:30, W3SVC2, SERVER, 172.15.10.30, 4210, 125, 3524,
100, 0, GET, /dollerlogo.gif,
100
Computer security logs contain information about the events occurring within an
organization’s systems and networks. Application and Web server log files are useful in
detecting web attacks. The source, nature, and time of the attack can be determined by
_________of the compromised system.
Analyzing log files
T or F: The disk in the disk drive rotates at high speed, and heads in the disk drive are used only
to read data.
False
Which of the following approaches checks and compares all the fields systematically and
intentionally for positive and negative correlation with each other to determine the
correlation across one or multiple fields?
Automated field correlation approach
Subscriber Identity Module (SIM) is a removable component that contains essential
information about the subscriber. Its main function entails authenticating the user of the cell
phone to the network to gain access to subscribed services. SIM contains a 20-digit long
Integrated Circuit Card identification (ICCID) number, identify the issuer identifier Number
from the ICCID below.
2nd set of numbers listed on the card
Which of the following attacks allows an attacker to access restricted directories, including
application source code, configuration and critical system files, and to execute commands
outside of the web server’s root directory?
Directory traversal
Data acquisition system is a combination of tools or processes used to gather, analyze and
record Information about some phenomenon. Different data acquisition system are used
depends on the location, speed, cost. etc. Serial communication data acquisition system is
used when the actual location of the data is at some distance from the computer. Which of
the following communication standard is used in serial communication data acquisition
system?
RS232
When a file or folder is deleted, the complete path, including the original file name, is stored
in a special hidden file called “INF02” in the Recycled folder. If the INF02 file is deleted, it is
re-created when you___________.
Restart Windows
A system with a simple logging mechanism has not been given much attention during
development, this system is now being targeted by attackers, if the attacker wants to
perform a new line injection attack, what will he/she inject into the log file?
Plaintext
You can interact with the Registry through intermediate programs. Graphical user interface
(GUI) Registry editors such as Regedit.exe or Regedt32 exe are commonly used as
intermediate programs in Windows 7. Which of the following is a root folder of the registry
editor?
HKEY_USERS
A swap file is a space on a hard disk used as the virtual memory extension of a computer’s
RAM. Where is the hidden swap file in Windows located?
C:\pagefile.sys
Netstat is a tool for collecting Information regarding network connections. It provides a
simple view of TCP and UDP connections, and their state and network traffic statistics.
Which of the following commands shows you the TCP and UDP network connections,
listening ports, and the identifiers?
netstat -ano
Microsoft Security IDs are available in Windows Registry Editor. The path to locate IDs in
Windows 7 is:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\Currentversion \ProfileList
Computer forensics report provides detailed information on complete computer forensics
investigation process. It should explain how the incident occurred, provide technical details
of the incident and should be clear to understand. Which of the following attributes of a
forensics report can render it inadmissible in a court of law?
It is based on logical assumptions about the incident timeline
Which of the following network attacks refers to sending huge volumes of email to an
address in an attempt to overflow the mailbox, or overwhelm the server where the email
address is hosted, to cause a denial-of-service attack?
Mail bombing
T or F: Log management includes all the processes and techniques used to collect, aggregate,
and analyze computer-generated log messages. It consists of the hardware, software,
network and media used to generate, transmit, store, analyze, and dispose of log data.
True
Which of the following is not an example of a cyber-crime?
Firing an employee for misconduct
FAT32 is a 32-bit version of FAT file system using smaller clusters and results in efficient
storage capacity. What is the maximum drive size supported?
2 terabytes
When the operating system marks cluster as used, but does not allocate them to any file,
such clusters are known as ___________.
Lost clusters
T or F: Volatile information can be easily modified or lost when the system is shut down or
rebooted. It helps to determine a logical timeline of the security incident and the users who
would be responsible.
True
Data compression involves encoding the data to take up less storage space and less
bandwidth for transmission. It helps in saving cost and high data manipulation in many
business applications.
Which data compression technique maintains data integrity?
Lossless compression
T or F: A rogue/unauthorized access point is one that Is not authorized for operation by a particular
firm or network
True
First response to an incident may involve three different groups of people, and each will
have differing skills and need to carry out differing tasks based on the incident. Who is
responsible for collecting, preserving, and packaging electronic evidence?
Forensic laboratory staff
Which of the following commands shows you the names of all open shared files on a server
and number of file locks on each file?
Net file
Identify the attack from following sequence of actions?
Step 1: A user logs in to a trusted site and creates a new session
Step 2: The trusted site stores a session identifier for the session in a cookie in the web
browser
Step 3: The user is tricked to visit a malicious site
Step 4: the malicious site sends a request from the user’s browser using his session cookie
Cross-Site Request Forgery (CSRF) Attack
What is the goal of forensic science?
To determine the evidential value of the crime scene and related evidence
Which of the following statements is incorrect related to acquiring electronic evidence at
crime scene?
At the time of seizing process, you need to shut down the computer immediately
TCP/IP (Transmission Control Protocol/Internet Protocol) is a communication protocol used
to connect different hosts in the Internet. It contains four layers, namely the network
interface layer. Internet layer, transport layer, and application layer.
Which of the following protocols works under the transport layer of TCP/IP?
UDP
T or F: Hash injection attack allows attackers to inject a compromised hash into a local session
and use the hash to validate network resources.
True
Which of the following passwords are sent over the wire (and wireless) network, or stored
on some media as it is typed without any alteration?
Clear text passwords
Quality of a raster Image is determined by the _________________and the amount of
information in each pixel.
Total number of pixels
Wireless network discovery tools use two different methodologies to detect, monitor and
log a WLAN device (i.e. active scanning and passive scanning). Active scanning
methodology involves ____________and waiting for responses from available wireless
networks.
Broadcasting a probe request frame
The Apache server saves diagnostic information and error messages that it encounters
while processing requests. The default path of this file is usr/local/apache/logs/error.log in
Linux. Identify the Apache error log from the following logs.
[Wed Oct 11 14:32:52 2000] [error] [client 127.0.0.1] client denied by server configuration: /export/home/live/ap/htdocs/test
Which one of the following statements is not correct while preparing for testimony?
Do not determine the basic facts of the case before beginning and examining the evidence
Which of the following commands shows you all of the network services running on
Windows-based servers?
Net start
Which root folder (hive) of registry editor contains a vast array of configuration information
for the system, including hardware settings and software settings?
HKEY_LOCAL_MACHINE
Wi-Fi Protected Access (WPA) is a data encryption method for WLANs based on 802.11
standards. Temporal Key Integrity Protocol (TKIP) enhances WEP by adding a rekeying
mechanism to provide fresh encryption and integrity keys. Temporal keys are changed for
every____________.
10.000 packets
What is a chain of custody?
A legal document that demonstrates the progression of evidence as it travels from the original evidence location to the forensic laboratory
Email spoofing refers to:
The forgery of an email header so that the message appears to have originated from someone or somewhere other than the actual source
Which of the following password cracking techniques works like a dictionary attack, but
adds some numbers and symbols to the words from the dictionary and tries to crack the
password?
Hybrid attack
In what circumstances would you conduct searches without a warrant?
When destruction of evidence is imminent, a warrantless seizure of that evidence is justified if there is probable cause to believe that the item seized constitutes evidence of criminal activity
Ron. a computer forensics expert, Is Investigating a case involving corporate espionage.
He has recovered several mobile computing devices from the crime scene. One of the
evidence that Ron possesses is a mobile phone from Nokia that was left in on condition.
Ron needs to recover the IMEI number of the device to establish the identity of the device
owner. Which of the following key combinations he can use to recover the IMEI number?
*#06#
What is cold boot (hard boot)?
It is the process of starting a computer from a powered-down or off state
T or F: You should always work with original evidence
False
T or F: Recovery of the deleted partition is the process by which the investigator evaluates and
extracts the deleted partitions.
True
What advantage does the tool Evidor have over the built-in Windows search?
It can search slack space
A picture file is recovered from a computer under investigation. During the investigation
process, the file is enlarged 500% to get a better view of its contents. The picture quality is
not degraded at all from this process. What kind of picture is this file?its contents. The
picture? quality is not degraded at all from this process. What kind of picture is this file?
Vector image
When searching through file headers for picture file formats, what should be searched to
find a JPEG file in hexadecimal format?
FF D8 FF E0 00 10
What method of copying should always be performed first before carrying out an
investigation?
Bit-stream copy