Labour Day Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

Computer Hacking Forensic Investigator (v9) Question and Answers

Computer Hacking Forensic Investigator (v9)

Last Update May 5, 2024
Total Questions : 589

We are offering FREE 312-49v9 ECCouncil exam questions. All you do is to just go and sign up. Give your details, prepare 312-49v9 free exam questions and then go for complete pool of Computer Hacking Forensic Investigator (v9) test questions that will help you more.

312-49v9 pdf

312-49v9 PDF

$35  $99.99
312-49v9 Engine

312-49v9 Testing Engine

$42  $119.99
312-49v9 PDF + Engine

312-49v9 PDF + Testing Engine

$56  $159.99
Questions 1

To reach a bank web site, the traffic from workstations must pass through a firewall. You have been asked to review the firewall configuration to ensure that workstations in network 10.10.10.0/24 can only reach the bank web site 10.20.20.1 using https. Which of the following firewall rules meets this requirement?

Options:

A.  

if (source matches 10.10.10.0/24 and destination matches 10.20.20.1 and port matches 443) then permit

B.  

if (source matches 10.10.10.0/24 and destination matches 10.20.20.1 and port matches 80 or 443) then permit

C.  

if (source matches 10.10.10.0 and destination matches 10.20.20.1 and port matches 443) then permit

Discussion 0
Questions 2

You have been asked to investigate after a user has reported a threatening e-mail they have received from an external source. Which of the following are you most interested in when trying to trace the source of the message?

Options:

A.  

The X509 Address

B.  

The SMTP reply Address

C.  

The E-mail Header

D.  

The Host Domain Name

Discussion 0
Questions 3

A suspect is accused of violating the acceptable use of computing resources, as he has visited adult websites and downloaded images. The investigator wants to demonstrate that the suspect did indeed visit these sites. However, the suspect has cleared the search history and emptied the cookie cache. Moreover, he has removed any images he might have downloaded. What can the investigator do to prove the violation?

Options:

A.  

Image the disk and try to recover deleted files

B.  

Seek the help of co-workers who are eye-witnesses

C.  

Check the Windows registry for connection data (you may or may not recover)

D.  

Approach the websites for evidence

Discussion 0
Questions 4

In which implementation of RAID will the image of a Hardware RAID volume be different from the image taken separately from the disks?

Options:

A.  

RAID 1

B.  

The images will always be identical because data is mirrored for redundancy

C.  

RAID 0

D.  

It will always be different

Discussion 0
Questions 5

Which of the following statements is incorrect when preserving digital evidence?

Options:

A.  

Verify if the monitor is in on, off, or in sleep mode

B.  

Turn on the computer and extract Windows event viewer log files

C.  

Remove the plug from the power router or modem

D.  

Document the actions and changes that you observe in the monitor, computer, printer, or in other peripherals

Discussion 0
Questions 6

Bob has encountered a system crash and has lost vital data stored on the hard drive of his Windows computer. He has no cloud storage or backup hard drives. He wants to recover all the data, which includes his personal photos, music, documents, videos, official emails, etc. Which of the following tools shall resolve Bob's purpose?

Options:

A.  

Cain & Abel

B.  

Recuva

C.  

Xplico

D.  

Colasoft’s Capsa

Discussion 0
Questions 7

Where should the investigator look for the Edge browser’s browsing records, including history, cache, and cookies?

Options:

A.  

ESE Database

B.  

Virtual Memory

C.  

Sparse files

D.  

Slack Space

Discussion 0
Questions 8

Which of the following stand true for BIOS Parameter Block?

Options:

A.  

The BIOS Partition Block describes the physical layout of a data storage volume

B.  

The BIOS Partition Block is the first sector of a data storage device

C.  

The length of BIOS Partition Block remains the same across all the file systems

D.  

The BIOS Partition Block always refers to the 512-byte boot sector

Discussion 0
Questions 9

Self-Monitoring, Analysis, and Reporting Technology (SMART) is built into the hard drives to monitor and report system activity. Which of the following is included in the report generated by SMART?

Options:

A.  

Power Off time

B.  

Logs of high temperatures the drive has reached

C.  

All the states (running and discontinued) associated with the OS

D.  

List of running processes

Discussion 0
Questions 10

What malware analysis operation can the investigator perform using the jv16 tool?

Options:

A.  

Files and Folder Monitor

B.  

Installation Monitor

C.  

Network Traffic Monitoring/Analysis

D.  

Registry Analysis/Monitoring

Discussion 0
Questions 11

Lynne receives the following email:

Dear lynne@gmail.com! We are sorry to inform you that your ID has been temporarily frozen due to incorrect or missing information saved at 2016/11/10 20:40:24

You have 24 hours to fix this problem or risk to be closed permanently!

To proceed Please Connect >> My Apple ID

Thank You The link to My Apple ID shows http://byggarbetsplatsen.se/backup/signon/

What type of attack is this?

Options:

A.  

Mail Bombing

B.  

Phishing

C.  

Email Spamming

D.  

Email Spoofing

Discussion 0
Questions 12

Which of the following web browser uses the Extensible Storage Engine (ESE) database format to store browsing records, including history, cache, and cookies?

Options:

A.  

Safari

B.  

Mozilla Firefox

C.  

Microsoft Edge

D.  

Google Chrome

Discussion 0
Questions 13

Gill is a computer forensics investigator who has been called upon to examine a seized computer. This computer, according to the police, was used by a hacker who gained access to numerous banking institutions to steal customer information. After preliminary investigations, Gill finds in the computer’s log files that the hacker was able to gain access to these banks through the use of Trojan horses. The hacker then used these Trojan horses to obtain remote access to the companies’ domain controllers. From this point, Gill found that the hacker pulled off the SAM files from the domain controllers to then attempt and crack network passwords. What is the most likely password cracking technique used by this hacker to break the user passwords from the SAM files?

Options:

A.  

Syllable attack

B.  

Hybrid attack

C.  

Brute force attack

D.  

Dictionary attack

Discussion 0
Questions 14

You have been called in to help with an investigation of an alleged network intrusion. After questioning the members of the company IT department, you search through the server log files to find any trace of the intrusion. After that you decide to telnet into one of the company routers to see if there is any evidence to be found. While connected to the router, you see some unusual activity and believe that the attackers are currently connected to that router. You start up an ethereal session to begin capturing traffic on the router that could be used in the investigation. At what layer of the OSI model are you monitoring while watching traffic to and from the router?

Options:

A.  

Network

B.  

Transport

C.  

Data Link

D.  

Session

Discussion 0
Questions 15

What type of analysis helps to identify the time and sequence of events in an investigation?

Options:

A.  

Time-based

B.  

Functional

C.  

Relational

D.  

Temporal

Discussion 0
Questions 16

Which program is the bootloader when Windows XP starts up?

Options:

A.  

KERNEL.EXE

B.  

NTLDR

C.  

LOADER

D.  

LILO

Discussion 0
Questions 17

What type of equipment would a forensics investigator store in a StrongHold bag?

Options:

A.  

PDAPDA?

B.  

Backup tapes

C.  

Hard drives

D.  

Wireless cards

Discussion 0
Questions 18

When operating systems mark a cluster as used but not allocated, the cluster is considered as _________

Options:

A.  

Corrupt

B.  

Bad

C.  

Lost

D.  

Unallocated

Discussion 0
Questions 19

Which of the following technique creates a replica of an evidence media?

Options:

A.  

Data Extraction

B.  

Backup

C.  

Bit Stream Imaging

D.  

Data Deduplication

Discussion 0
Questions 20

What will the following command accomplish in Linux?

fdisk /dev/hda

Options:

A.  

Partition the hard drive

B.  

Format the hard drive

C.  

Delete all files under the /dev/hda folder

D.  

Fill the disk with zeros

Discussion 0
Questions 21

When making the preliminary investigations in a sexual harassment case, how many investigators are you recommended having?

Options:

A.  

One

B.  

Two

C.  

Three

D.  

Four

Discussion 0
Questions 22

Jim’s company regularly performs backups of their critical servers. But the company can’t afford to send backup tapes to an off-site vendor for long term storage and archiving. Instead Jim’s company keeps the backup tapes in a safe in the office. Jim’s company is audited each year, and the results from this year’s audit show a risk because backup tapes aren’t stored off-site. The Manager of Information Technology has a plan to take the backup tapes home with him and wants to know what two things he can do to secure the backup tapes while in transit?

Options:

A.  

Encrypt the backup tapes and use a courier to transport them.

B.  

Encrypt the backup tapes and transport them in a lock box

C.  

Degauss the backup tapes and transport them in a lock box.

D.  

Hash the backup tapes and transport them in a lock box.

Discussion 0
Questions 23

Which of the following files contains the traces of the applications installed, run, or uninstalled from a system?

Options:

A.  

Virtual Files

B.  

Image Files

C.  

Shortcut Files

D.  

Prefetch Files

Discussion 0
Questions 24

Which command line tool is used to determine active network connections?

Options:

A.  

netsh

B.  

nbstat

C.  

nslookup

D.  

netstat

Discussion 0
Questions 25

Identify the term that refers to individuals who, by virtue of their knowledge and expertise, express an independent opinion on a matter related to a case based on the information that is provided.

Options:

A.  

Expert Witness

B.  

Evidence Examiner

C.  

Forensic Examiner

D.  

Defense Witness

Discussion 0
Questions 26

Which of the following file formats allows the user to compress the acquired data as well as keep it randomly accessible?

Options:

A.  

Proprietary Format

B.  

Generic Forensic Zip (gfzip)

C.  

Advanced Forensic Framework 4

D.  

Advanced Forensics Format (AFF)

Discussion 0
Questions 27

Which of the following techniques delete the files permanently?

Options:

A.  

Steganography

B.  

Artifact Wiping

C.  

Data Hiding

D.  

Trail obfuscation

Discussion 0
Questions 28

Which of the following is NOT an anti-forensics technique?

Options:

A.  

Data Deduplication

B.  

Password Protection

C.  

Encryption

D.  

Steganography

Discussion 0
Questions 29

Which of the following components within the android architecture stack take care of displaying windows owned by different applications?

Options:

A.  

Media Framework

B.  

Surface Manager

C.  

Resource Manager

D.  

Application Framework

Discussion 0
Questions 30

Steve, a forensic investigator, was asked to investigate an email incident in his organization. The organization has Microsoft Exchange Server deployed for email communications. Which among the following files will Steve check to analyze message headers, message text, and standard attachments?

Options:

A.  

PUB.EDB

B.  

PRIV.EDB

C.  

PUB.STM

D.  

PRIV.STM

Discussion 0
Questions 31

Which of the following is a responsibility of the first responder?

Options:

A.  

Determine the severity of the incident

B.  

Collect as much information about the incident as possible

C.  

Share the collected information to determine the root cause

D.  

Document the findings

Discussion 0
Questions 32

James is dealing with a case regarding a cybercrime that has taken place in Arizona, USA. James needs to lawfully seize the evidence from an electronic device without affecting the user's anonymity. Which of the following law should he comply with, before retrieving the evidence?

Options:

A.  

First Amendment of the U.S. Constitution

B.  

Fourth Amendment of the U.S. Constitution

C.  

Third Amendment of the U.S. Constitution

D.  

Fifth Amendment of the U.S. Constitution

Discussion 0
Questions 33

Which among the following tools can help a forensic investigator to access the registry files during postmortem analysis?

Options:

A.  

RegistryChangesView

B.  

RegDIIView

C.  

RegRipper

D.  

ProDiscover

Discussion 0
Questions 34

What is cold boot (hard boot)?

Options:

A.  

It is the process of restarting a computer that is already in sleep mode

B.  

It is the process of shutting down a computer from a powered-on or on state

C.  

It is the process of restarting a computer that is already turned on through the operating system

D.  

It is the process of starting a computer from a powered-down or off state

Discussion 0
Questions 35

Gary is checking for the devices connected to USB ports of a suspect system during an investigation. Select the appropriate tool that will help him document all the connected devices.

Options:

A.  

DevScan

B.  

Devcon

C.  

fsutil

D.  

Reg.exe

Discussion 0
Questions 36

What does the bytes 0x0B-0x53 represent in the boot sector of NTFS volume on Windows 2000?

Options:

A.  

Jump instruction and the OEM ID

B.  

BIOS Parameter Block (BPB) and the OEM ID

C.  

BIOS Parameter Block (BPB) and the extended BPB

D.  

Bootstrap code and the end of the sector marker

Discussion 0
Questions 37

James, a hacker, identifies a vulnerability in a website. To exploit the vulnerability, he visits the login page and notes down the session ID that is created. He appends this session ID to the login URL and shares the link with a victim. Once the victim logs into the website using the shared URL, James reloads the webpage (containing the URL with the session ID appended) and now, he can browse the active session of the victim. Which attack did James successfully execute?

Options:

A.  

Cross Site Request Forgery

B.  

Cookie Tampering

C.  

Parameter Tampering

D.  

Session Fixation Attack

Discussion 0
Questions 38

The MAC attributes are timestamps that refer to a time at which the file was last modified or last accessed or originally created. Which of the following file systems store MAC attributes in Coordinated Universal Time (UTC) format?

Options:

A.  

File Allocation Table (FAT

B.  

New Technology File System (NTFS)

C.  

Hierarchical File System (HFS)

D.  

Global File System (GFS)

Discussion 0
Questions 39

Randy has extracted data from an old version of a Windows-based system and discovered info file Dc5.txt in the system recycle bin. What does the file name denote?

Options:

A.  

A text file deleted from C drive in sixth sequential order

B.  

A text file deleted from C drive in fifth sequential order

C.  

A text file copied from D drive to C drive in fifth sequential order

D.  

A text file copied from C drive to D drive in fifth sequential order

Discussion 0
Questions 40

Which of the following does not describe the type of data density on a hard disk?

Options:

A.  

Volume density

B.  

Track density

C.  

Linear or recording density

D.  

Areal density

Discussion 0
Questions 41

Data is striped at a byte level across multiple drives, and parity information is distributed among all member drives.

What RAID level is represented here?

Options:

A.  

RAID Level 0

B.  

RAID Level 5

C.  

RAID Level 3

D.  

RAID Level 1

Discussion 0
Questions 42

This type of testimony is presented by someone who does the actual fieldwork and does not offer a view in court.

Options:

A.  

Civil litigation testimony

B.  

Expert testimony

C.  

Victim advocate testimony

D.  

Technical testimony

Discussion 0
Questions 43

Your company's network just finished going through a SAS 70 audit. This audit reported that overall, your network is secure, but there are some areas that needs improvement. The major area was SNMP security. The audit company recommended turning off SNMP, but that is not an option since you have so many remote nodes to keep track of. What step could you take to help secure SNMP on your network?

Options:

A.  

Block all internal MAC address from using SNMP

B.  

Block access to UDP port 171

C.  

Block access to TCP port 171

D.  

Change the default community string names

Discussion 0
Questions 44

What is the location of the binary files required for the functioning of the OS in a Linux system?

Options:

A.  

/run

B.  

/bin

C.  

/root

D.  

/sbin

Discussion 0
Questions 45

How many times can data be written to a DVD+R disk?

Options:

A.  

Twice

B.  

Once

C.  

Zero

D.  

Infinite

Discussion 0
Questions 46

Using Linux to carry out a forensics investigation, what would the following command accomplish?

dd if=/usr/home/partition.image of=/dev/sdb2 bs=4096 conv=notrunc,noerror

Options:

A.  

Search for disk errors within an image file

B.  

Backup a disk to an image file

C.  

Copy a partition to an image file

D.  

Restore a disk from an image file

Discussion 0
Questions 47

What is the first step taken in an investigation for laboratory forensic staff members?

Options:

A.  

Packaging the electronic evidence

B.  

Securing and evaluating the electronic crime scene

C.  

Conducting preliminary interviews

D.  

Transporting the electronic evidence

Discussion 0
Questions 48

What is the smallest physical storage unit on a hard drive?

Options:

A.  

Track

B.  

Cluster

C.  

Sector

D.  

Platter

Discussion 0
Questions 49

A master boot record (MBR) is the first sector (“sector zero”) of a data storage device. What is the size of MBR?

Options:

A.  

Depends on the capacity of the storage device

B.  

1048 Bytes

C.  

4092 Bytes

D.  

512 Bytes

Discussion 0
Questions 50

Casey has acquired data from a hard disk in an open source acquisition format that allows her to generate compressed or uncompressed image files. What format did she use?

Options:

A.  

Portable Document Format

B.  

Advanced Forensics Format (AFF)

C.  

Proprietary Format

D.  

Raw Format

Discussion 0
Questions 51

A picture file is recovered from a computer under investigation. During the investigation process, the file is enlarged 500% to get a better view of its contents. The picture quality is not degraded at all from this process. What kind of picture is this file. What kind of picture is this file?

Options:

A.  

Raster image

B.  

Vector image

C.  

Metafile image

D.  

Catalog image

Discussion 0
Questions 52

What hashing method is used to password protect Blackberry devices?

Options:

A.  

AES

B.  

RC5

C.  

MD5

D.  

SHA-1

Discussion 0
Questions 53

Heather, a computer forensics investigator, is assisting a group of investigators working on a large computer fraud case involving over 20 people. These 20 people, working in different offices, allegedly siphoned off money from many different client accounts. Heather responsibility is to find out how the accused people communicated between each other. She has searched their email and their computers and has not found any useful evidence. Heather then finds some possibly useful evidence under the desk of one of the accused.

In an envelope she finds a piece of plastic with numerous holes cut out of it. Heather then finds the same exact piece of plastic with holes at many of the other accused peoples desks. Heather believes that the 20 people involved in the case were using a cipher to send secret messages in between each other. What type of cipher was used by the accused in this case?

Options:

A.  

Grill cipher

B.  

Null cipher

C.  

Text semagram

D.  

Visual semagram

Discussion 0
Questions 54

Which of the following are small pieces of data sent from a website and stored on the user’s computer by the user’s web browser to track, validate, and maintain specific user information?

Options:

A.  

Temporary Files

B.  

Open files

C.  

Cookies

D.  

Web Browser Cache

Discussion 0
Questions 55

What type of attack sends SYN requests to a target system with spoofed IP addresses?

Options:

A.  

SYN flood

B.  

Ping of death

C.  

Cross site scripting

D.  

Land

Discussion 0
Questions 56

Which of the following stages in a Linux boot process involve initialization of the system’s hardware?

Options:

A.  

BIOS Stage

B.  

Bootloader Stage

C.  

BootROM Stage

D.  

Kernel Stage

Discussion 0
Questions 57

Given the drive dimensions as follows and assuming a sector has 512 bytes, what is the capacity of the described hard drive?

22,164 cylinders/disk

80 heads/cylinder

63 sectors/track

Options:

A.  

53.26 GB

B.  

57.19 GB

C.  

11.17 GB

D.  

10 GB

Discussion 0
Questions 58

Bob works as information security analyst for a big finance company. One day, the anomaly-based intrusion detection system alerted that a volumetric DDOS targeting the main IP of the main web server was occurring. What kind of attack is it?

Options:

A.  

IDS attack

B.  

APT

C.  

Web application attack

D.  

Network attack

Discussion 0
Questions 59

Which of the following files stores information about a local Google Drive installation such as User email ID, Local Sync Root Path, and Client version installed?

Options:

A.  

filecache.db

B.  

config.db

C.  

sigstore.db

D.  

Sync_config.db

Discussion 0
Questions 60

What type of flash memory card comes in either Type I or Type II and consumes only five percent of the power required by small hard drives?

Options:

A.  

SD memory

B.  

CF memory

C.  

MMC memory

D.  

SM memory

Discussion 0
Questions 61

You have compromised a lower-level administrator account on an Active Directory network of a small company in Dallas, Texas. You discover Domain Controllers through enumeration. You connect to one of the Domain Controllers on port 389 using ldp.exe. What are you trying to accomplish here?

Options:

A.  

Poison the DNS records with false records

B.  

Enumerate MX and A records from DNS

C.  

Establish a remote connection to the Domain Controller

D.  

Enumerate domain user accounts and built-in groups

Discussion 0
Questions 62

Bob has been trying to penetrate a remote production system for the past two weeks. This time however, he is able to get into the system. He was able to use the System for a period of three weeks. However, law enforcement agencies were recoding his every activity and this was later presented as evidence.

The organization had used a Virtual Environment to trap Bob. What is a Virtual Environment?

Options:

A.  

A Honeypot that traps hackers

B.  

A system Using Trojaned commands

C.  

An environment set up after the user logs in

D.  

An environment set up before a user logs in

Discussion 0
Questions 63

Chris has been called upon to investigate a hacking incident reported by one of his clients. The company suspects the involvement of an insider accomplice in the attack. Upon reaching the incident scene, Chris secures the physical area, records the scene using visual media. He shuts the system down by pulling the power plug so that he does not disturb the system in any way. He labels all cables and connectors prior to disconnecting any. What do you think would be the next sequence of events?

Options:

A.  

Connect the target media; prepare the system for acquisition; Secure the evidence; Copy the media

B.  

Prepare the system for acquisition; Connect the target media; copy the media; Secure the evidence

C.  

Connect the target media; Prepare the system for acquisition; Secure the evidence; Copy the media

D.  

Secure the evidence; prepare the system for acquisition; Connect the target media; copy the media

Discussion 0
Questions 64

You are the network administrator for a small bank in Dallas, Texas. To ensure network security, you enact a security policy that requires all users to have 14 character passwords. After giving your users 2 weeks notice, you change the Group Policy to force 14 character passwords. A week later you dump the SAM database from the standalone server and run a password-cracking tool against it. Over 99% of the passwords are broken within an hour. Why were these passwords cracked so Quickly?

Options:

A.  

Passwords of 14 characters or less are broken up into two 7-character hashes

B.  

A password Group Policy change takes at least 3 weeks to completely replicate throughout a network

C.  

Networks using Active Directory never use SAM databases so the SAM database pulled was empty

D.  

The passwords that were cracked are local accounts on the Domain Controller

Discussion 0
Questions 65

In Microsoft file structures, sectors are grouped together to form:

Options:

A.  

Clusters

B.  

Drives

C.  

Bitstreams

D.  

Partitions

Discussion 0
Questions 66

Which Intrusion Detection System (IDS) usually produces the most false alarms due to the unpredictable behaviors of users and networks?

Options:

A.  

network-based IDS systems (NIDS)

B.  

host-based IDS systems (HIDS)

C.  

anomaly detection

D.  

signature recognition

Discussion 0
Questions 67

When cataloging digital evidence, the primary goal is to

Options:

A.  

Make bit-stream images of all hard drives

B.  

Preserve evidence integrity

C.  

Not remove the evidence from the scene

D.  

Not allow the computer to be turned off

Discussion 0
Questions 68

What TCP/UDP port does the toolkit program netstat use?

Options:

A.  

Port 7

B.  

Port 15

C.  

Port 23

D.  

Port 69

Discussion 0
Questions 69

If a suspect computer is located in an area that may have toxic chemicals, you must:

Options:

A.  

coordinate with the HAZMAT team

B.  

determine a way to obtain the suspect computer

C.  

assume the suspect machine is contaminated

D.  

do not enter alone

Discussion 0
Questions 70

This is original file structure database that Microsoft originally designed for floppy disks. It is written to the outermost track of a disk and contains information about each file stored on the drive.

Options:

A.  

Master Boot Record (MBR)

B.  

Master File Table (MFT)

C.  

File Allocation Table (FAT)

D.  

Disk Operating System (DOS)

Discussion 0
Questions 71

Which federal computer crime law specifically refers to fraud and related activity in connection with access devices like routers?

Options:

A.  

18 U.S.C. 1029

B.  

18 U.S.C. 1362

C.  

18 U.S.

C.  

2511

D.  

18 U.S.C. 2703

Discussion 0
Questions 72

When setting up a wireless network with multiple access points, why is it important to set each access point on a different channel?

Options:

A.  

Multiple access points can be set up on the same channel without any issues

B.  

Avoid over-saturation of wireless signals

C.  

So that the access points will work on different frequencies

D.  

Avoid cross talk

Discussion 0
Questions 73

Profiling is a forensics technique for analyzing evidence with the goal of identifying the perpetrator from their various activity. After a computer has been compromised by a hacker, which of the following would be most important in forming a profile of the incident?

Options:

A.  

The manufacturer of the system compromised

B.  

The logic, formatting and elegance of the code used in the attack

C.  

The nature of the attack

D.  

The vulnerability exploited in the incident

Discussion 0
Questions 74

____________________ is simply the application of Computer Investigation and analysis techniques in the interests of determining potential legal evidence.

Options:

A.  

Network Forensics

B.  

Computer Forensics

C.  

Incident Response

D.  

Event Reaction

Discussion 0
Questions 75

You are a security analyst performing reconnaissance on a company you will be carrying out a penetration test for. You conduct a search for IT jobs on Dice.com and find the following information for an open position: 7+ years experience in Windows Server environment 5+ years experience in Exchange 2000/2003 environment Experience with Cisco Pix Firewall, Linksys 1376 router, Oracle 11i and MYOB v3.4 Accounting software are required MCSA desired, MCSE, CEH preferred No Unix/Linux Experience needed What is this information posted on the job website considered?

Options:

A.  

Social engineering exploit

B.  

Competitive exploit

C.  

Information vulnerability

D.  

Trade secret

Discussion 0
Questions 76

You have been asked to investigate the possibility of computer fraud in the finance department of a company. It is suspected that a staff member has been committing finance fraud by printing cheques that have not been authorized. You have exhaustively searched all data files on a bitmap image of the target computer, but have found no evidence. You suspect the files may not have been saved. What should you examine next in this case?

Options:

A.  

The registry

B.  

The swap file

C.  

The recycle bin

D.  

The metadata

Discussion 0
Questions 77

You setup SNMP in multiple offices of your company. Your SNMP software manager is not receiving data from other offices like it is for your main office. You suspect that firewall changes are to blame. What ports should you open for SNMP to work through Firewalls? (Choose two.)

Options:

A.  

162

B.  

161

C.  

163

D.  

160

Discussion 0
Questions 78

You are conducting an investigation of fraudulent claims in an insurance company that involves complex text searches through large numbers of documents. Which of the following tools would allow you to quickly and efficiently search for a string within a file on the bitmap image of the target computer?

Options:

A.  

Stringsearch

B.  

grep

C.  

dir

D.  

vim

Discussion 0
Questions 79

Microsoft Outlook maintains email messages in a proprietary format in what type of file?

Options:

A.  

.email

B.  

.mail

C.  

.pst

D.  

.doc

Discussion 0
Questions 80

How many sectors will a 125 KB file use in a FAT32 file system?

Options:

A.  

32

B.  

16

C.  

256

D.  

25

Discussion 0
Questions 81

What is a good security method to prevent unauthorized users from "tailgating"?

Options:

A.  

Man trap

B.  

Electronic combination locks

C.  

Pick-resistant locks

D.  

Electronic key systems

Discussion 0
Questions 82

The objective of this act was to protect consumers’ personal financial information held by financial institutions and their service providers.

Options:

A.  

Gramm-Leach-Bliley Act

B.  

Sarbanes-Oxley 2002

C.  

California SB 1386

D.  

HIPAA

Discussion 0
Questions 83

Hackers can gain access to Windows Registry and manipulate user passwords, DNS settings, access rights or others features that they may need in order to accomplish their objectives. One simple method for loading an application at startup is to add an entry (Key) to the following Registry Hive:

Options:

A.  

HKEY_LOCAL_MACHINE\hardware\windows\start

B.  

HKEY_LOCAL_USERS\Software\Microsoft\old\Version\Load

C.  

HKEY_CURRENT_USER\Microsoft\Default

D.  

HKEY_LOCAL_MACHINE\Software\Microsoft\CurrentVersion\Run

Discussion 0
Questions 84

In what way do the procedures for dealing with evidence in a criminal case differ from the procedures for dealing with evidence in a civil case?

Options:

A.  

evidence must be handled in the same way regardless of the type of case

B.  

evidence procedures are not important unless you work for a law enforcement agency

C.  

evidence in a criminal case must be secured more tightly than in a civil case

D.  

evidence in a civil case must be secured more tightly than in a criminal case

Discussion 0
Questions 85

Which part of the Windows Registry contains the user's password file?

Options:

A.  

HKEY_LOCAL_MACHINE

B.  

HKEY_CURRENT_CONFIGURATION

C.  

HKEY_USER

D.  

HKEY_CURRENT_USER

Discussion 0
Questions 86

Bill is the accounting manager for Grummon and Sons LLC in Chicago. On a regular basis, he needs to send PDF documents containing sensitive information through E-mail to his customers.

Bill protects the PDF documents with a password and sends them to their intended recipients.

Why PDF passwords do not offer maximum protection?

Options:

A.  

PDF passwords can easily be cracked by software brute force tools

B.  

PDF passwords are converted to clear text when sent through E-mail

C.  

PDF passwords are not considered safe by Sarbanes-Oxley

D.  

When sent through E-mail, PDF passwords are stripped from the document completely

Discussion 0
Questions 87

You are assisting a Department of Defense contract company to become compliant with the stringent security policies set by the DoD. One such strict rule is that firewalls must only allow incoming connections that were first initiated by internal computers. What type of firewall must you implement to abide by this policy?

Options:

A.  

Packet filtering firewall

B.  

Circuit-level proxy firewall

C.  

Application-level proxy firewall

D.  

Stateful firewall

Discussion 0
Questions 88

Which of the following should a computer forensics lab used for investigations have?

Options:

A.  

isolation

B.  

restricted access

C.  

open access

D.  

an entry log

Discussion 0