<< Prev Question Next Question >>

Question 89/209

What does the command "C:\>wevtutil gl <log name>" display?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (209q)
Question 1: Which list contains the most recent actions performed by a W...
Question 2: Which of the following Event Correlation Approach is an adva...
Question 3: Which of the following is a part of a Solid-State Drive (SSD...
Question 4: Which of the following tool enables data acquisition and dup...
Question 5: You are working as a Computer forensics investigator for a c...
Question 6: George is the network administrator of a large Internet comp...
Question 7: When monitoring for both intrusion and security events betwe...
Question 8: In conducting a computer abuse investigation you become awar...
Question 9: A(n) _____________________ is one that's performed by a comp...
Question 10: You are employed directly by an attorney to help investigate...
Question 11: When a user deletes a file or folder, the system stores comp...
Question 12: Which forensic investigating concept trails the whole incide...
Question 13: Which of the following ISO standard defines file systems and...
Question 14: Where are files temporarily written in Unix when printing?...
Question 15: A picture file is recovered from a computer under investigat...
Question 16: After passively scanning the network of Department of Defens...
Question 17: Pick the statement which does not belong to the Rule 804. He...
Question 18: What type of attack sends spoofed UDP packets (instead of pi...
Question 19: What is the smallest physical storage unit on a hard drive?...
Question 20: Which of the following components within the android archite...
Question 21: Consider that you are investigating a machine running an Win...
Question 22: In the following email header, where did the email first ori...
Question 23: If a PDA is seized in an investigation while the device is t...
Question 24: In a virtual test environment, Michael is testing the streng...
Question 25: What will the following URL produce in an unpatched IIS Web ...
Question 26: What does the part of the log, "% SEC-6-IPACCESSLOGP", extra...
Question 27: Steven has been given the task of designing a computer foren...
Question 28: Which of the following registry hive gives the configuration...
Question 29: Law enforcement officers are conducting a legal search for w...
Question 30: When carrying out a forensics investigation, why should you ...
Question 31: This organization maintains a database of hash signatures fo...
Question 32: In a forensic examination of hard drives for digital evidenc...
Question 33: A master boot record (MBR) is the first sector ("sector zero...
Question 34: Jim performed a vulnerability analysis on his network and fo...
Question 35: Data is striped at a byte level across multiple drives, and ...
Question 36: Select the data that a virtual memory would store in a Windo...
Question 37: A small law firm located in the Midwest has possibly been br...
Question 38: Select the tool appropriate for examining the dynamically li...
Question 39: What type of analysis helps to identify the time and sequenc...
Question 40: In Windows Security Event Log, what does an event id of 530 ...
Question 41: What value of the "Boot Record Signature" is used to indicat...
Question 42: When you carve an image, recovering the image depends on whi...
Question 43: The MD5 program is used to:
Question 44: Which among the following web application threats is resulte...
Question 45: Raw data acquisition format creates _________ of a data set ...
Question 46: You are working for a local police department that services ...
Question 47: An "idle" system is also referred to as what?...
Question 48: While looking through the IIS log file of a web server, you ...
Question 49: Which of the following statements is true regarding SMTP Ser...
Question 50: How many bits is Source Port Number in TCP Header packet?...
Question 51: With the standard Linux second extended file system (Ext2fs)...
Question 52: What operating system would respond to the following command...
Question 53: You are trying to locate Microsoft Outlook Web Access Defaul...
Question 54: You have been given the task to investigate web attacks on a...
Question 55: You should make at least how many bit-stream copies of a sus...
Question 56: Smith, a forensic examiner, was analyzing a hard disk image ...
Question 57: The investigator wants to examine changes made to the system...
Question 58: When analyzing logs, it is important that the clocks of all ...
Question 59: Why is it a good idea to perform a penetration test from the...
Question 60: A forensics investigator needs to copy data from a computer ...
Question 61: What information do you need to recover when searching a vic...
Question 62: The rule of thumb when shutting down a system is to pull the...
Question 63: Julie is a college student majoring in Information Systems a...
Question 64: Daryl, a computer forensics investigator, has just arrived a...
Question 65: What does ICMP Type 3/Code 13 mean?...
Question 66: Bob works as information security analyst for a big finance ...
Question 67: When a router receives an update for its routing table, what...
Question 68: Which US law does the interstate or international transporta...
Question 69: Where should the investigator look for the Edge browser's br...
Question 70: What is cold boot (hard boot)?
Question 71: Centralized binary logging is a process in which many websit...
Question 72: With Regard to using an Antivirus scanner during a computer ...
Question 73: Which Intrusion Detection System (IDS) usually produces the ...
Question 74: Which of the following techniques can be used to beat stegan...
Question 75: Chris has been called upon to investigate a hacking incident...
Question 76: The surface of a hard disk consists of several concentric ri...
Question 77: Travis, a computer forensics investigator, is finishing up a...
Question 78: During an investigation, an employee was found to have delet...
Question 79: Steve, a forensic investigator, was asked to investigate an ...
Question 80: Bob has been trying to penetrate a remote production system ...
Question 81: Which of the following is a database in which information ab...
Question 82: Diskcopy is:
Question 83: Which of the following data structures stores attributes of ...
Question 84: Amber, a black hat hacker, has embedded a malware into a sma...
Question 85: The use of warning banners helps a company avoid litigation ...
Question 86: Data Files contain Multiple Data Pages, which are further di...
Question 87: Which of the following is a non-zero data that an applicatio...
Question 88: Which of the following are small pieces of data sent from a ...
Question 89: What does the command "C:\&gt;wevtutil gl &lt;log name&gt;" ...
Question 90: Your company uses Cisco routers exclusively throughout the n...
Question 91: In a computer forensics investigation, what describes the ro...
Question 92: Harold is finishing up a report on a case of network intrusi...
Question 93: Which of the following tools is not a data acquisition hardw...
Question 94: Which of the following files store the MySQL database data p...
Question 95: To preserve digital evidence, an investigator should _______...
Question 96: An investigator has found certain details after analysis of ...
Question 97: Which of the following attack uses HTML tags like &lt;script...
Question 98: You are the network administrator for a small bank in Dallas...
Question 99: Meyer Electronics Systems just recently had a number of lapt...
Question 100: Which of the following statements is incorrect when preservi...
Question 101: Which of the following application password cracking tool ca...
Question 102: Which password cracking technique uses details such as lengt...
Question 103: Rusty, a computer forensics apprentice, uses the command nbt...
Question 104: You are asked to build a forensic lab and your manager has s...
Question 105: Which of the following techniques delete the files permanent...
Question 106: Which password cracking technique uses every possible combin...
Question 107: You are a computer forensics investigator working with local...
Question 108: The following is a log file screenshot from a default instal...
Question 109: What method would be most efficient for you to acquire digit...
Question 110: Paul's company is in the process of undergoing a complete se...
Question 111: Which principle states that "anyone or anything, entering a ...
Question 112: Stephen is checking an image using Compare Files by The Wiza...
Question 113: In Windows, prefetching is done to improve system performanc...
Question 114: John is using Firewalk to test the security of his Cisco PIX...
Question 115: Which layer of iOS architecture should a forensics investiga...
Question 116: Bob has encountered a system crash and has lost vital data s...
Question 117: An employee is attempting to wipe out data stored on a coupl...
Question 118: John is working as a computer forensics investigator for a c...
Question 119: When should an MD5 hash check be performed when processing e...
Question 120: Examination of a computer by a technically unauthorized pers...
Question 121: Which of the following Linux command searches through the cu...
Question 122: Which of the following web browser uses the Extensible Stora...
Question 123: You are assisting a Department of Defense contract company t...
Question 124: A Linux system is undergoing investigation. In which directo...
Question 125: Which of the following statements is TRUE about SQL Server e...
Question 126: You are working as an independent computer forensics investi...
Question 127: Which part of Metasploit framework helps users to hide the d...
Question 128: When needing to search for a website that is no longer prese...
Question 129: You are carrying out the last round of testing for your new ...
Question 130: You setup SNMP in multiple offices of your company. Your SNM...
Question 131: Which of the following files DOES NOT use Object Linking and...
Question 132: Which U.S. law sets the rules for sending emails for commerc...
Question 133: The process of restarting a computer that is already turned ...
Question 134: Microsoft Outlook maintains email messages in a proprietary ...
Question 135: On an Active Directory network using NTLM authentication, wh...
Question 136: Which of the following file system uses Master File Table (M...
Question 137: You work as a penetration tester for Hammond Security Consul...
Question 138: Which of the following standard represents a legal precedent...
Question 139: Brian needs to acquire data from RAID storage. Which of the ...
Question 140: To reach a bank web site, the traffic from workstations must...
Question 141: Which tool does the investigator use to extract artifacts le...
Question 142: Which of the following standard represents a legal precedent...
Question 143: Using Internet logging software to investigate a case of mal...
Question 144: Email archiving is a systematic approach to save and protect...
Question 145: Which of the following is a list of recently used programs o...
Question 146: You are a security analyst performing reconnaissance on a co...
Question 147: You are assisting in the investigation of a possible Web Ser...
Question 148: Checkpoint Firewall logs can be viewed through a Check Point...
Question 149: When obtaining a warrant, it is important to:...
Question 150: Event correlation is the process of finding relevance betwee...
Question 151: Sectors are pie-shaped regions on a hard disk that store dat...
Question 152: A forensic examiner is examining a Windows system seized fro...
Question 153: Simon is a former employee of Trinitron XML Inc. He feels he...
Question 154: A state department site was recently attacked and all the se...
Question 155: While analyzing a hard disk, the investigator finds that the...
Question 156: Casey has acquired data from a hard disk in an open source a...
Question 157: An Employee is suspected of stealing proprietary information...
Question 158: When a file is deleted by Windows Explorer or through the MS...
Question 159: Select the tool appropriate for finding the dynamically link...
Question 160: What does 254 represent in ICCID 89254021520014515744?...
Question 161: Which of the following stages in a Linux boot process involv...
Question 162: If the partition size is 4 GB, each cluster will be 32 K. Ev...
Question 163: Michael works for Kimball Construction Company as senior sec...
Question 164: Hard disk data addressing is a method of allotting addresses...
Question 165: When searching through file headers for picture file formats...
Question 166: Buffer overflow vulnerability of a web application occurs wh...
Question 167: Where does Encase search to recover NTFS files and folders?...
Question 168: A section of your forensics lab houses several electrical an...
Question 169: Which Linux command when executed displays kernel ring buffe...
Question 170: Which of the following files stores information about a loca...
Question 171: Which among the following search warrants allows the first r...
Question 172: Which of these rootkit detection techniques function by comp...
Question 173: A honey pot deployed with the IP 172.16.1.108 was compromise...
Question 174: You have compromised a lower-level administrator account on ...
Question 175: How will you categorize a cybercrime that took place within ...
Question 176: Given the drive dimensions as follows and assuming a sector ...
Question 177: How many times can data be written to a DVD+R disk?...
Question 178: Which of the following refers to the process of the witness ...
Question 179: Amelia has got an email from a well-reputed company stating ...
Question 180: If you see the files Zer0.tar.gz and copy.tar.gz on a Linux ...
Question 181: Harold is a web designer who has completed a website for ght...
Question 182: James is testing the ability of his routers to withstand DoS...
Question 183: A packet is sent to a router that does not have the packet d...
Question 184: During the course of a corporate investigation, you find tha...
Question 185: Self-Monitoring, Analysis, and Reporting Technology (SMART) ...
Question 186: Which code does the FAT file system use to mark the file as ...
Question 187: Which of the following is NOT a part of pre-investigation ph...
Question 188: Which of the following stand true for BIOS Parameter Block?...
Question 189: Jack Smith is a forensics investigator who works for Mason C...
Question 190: Sheila is a forensics trainee and is searching for hidden im...
Question 191: Robert, a cloud architect, received a huge bill from the clo...
Question 192: Jason has set up a honeypot environment by creating a DMZ th...
Question 193: One technique for hiding information is to change the file e...
Question 194: Which program uses different techniques to conceal a malware...
Question 195: Which of the following processes is part of the dynamic malw...
Question 196: What is the size value of a nibble?...
Question 197: If a suspect computer is located in an area that may have to...
Question 198: If you plan to startup a suspect's computer, you must modify...
Question 199: Which of the following email headers specifies an address fo...
Question 200: What term is used to describe a cryptographic technique for ...
Question 201: Which of the following commands shows you the names of all o...
Question 202: Why would you need to find out the gateway of a device when ...
Question 203: During the trial, an investigator observes that one of the p...
Question 204: What type of attack sends SYN requests to a target system wi...
Question 205: Andie, a network administrator, suspects unusual network ser...
Question 206: Which of the following is found within the unique instance I...
Question 207: Tyler is setting up a wireless network for his business that...
Question 208: Which Event Correlation approach assumes and predicts what a...
Question 209: In handling computer-related incidents, which IT role should...