<< Prev Question Next Question >>

Question 96/218

You are conducting an investigation of fraudulent claims in an insurance company that involves complex text searches through large numbers of documents. Which of the following tools would allow you to quickly and efficiently search for a string within a file on the bitmap image of the target computer?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (218q)
Question 1: What encryption technology is used on Blackberry devices Pas...
Question 2: Which among the following U.S. laws requires financial insti...
Question 3: Which of the following web browser uses the Extensible Stora...
Question 4: What do you call the process in which an attacker uses magne...
Question 5: In a Linux-based system, what does the command "Last -F" dis...
Question 6: Web browsers can store relevant information from user activi...
Question 7: Jack Smith is a forensics investigator who works for Mason C...
Question 8: James is dealing with a case regarding a cybercrime that has...
Question 9: In what way do the procedures for dealing with evidence in a...
Question 10: Office Documents (Word, Excel and PowerPoint) contain a code...
Question 11: ______allows a forensic investigator to identify the missing...
Question 12: Debbie has obtained a warrant to search a known pedophiles h...
Question 13: You are a Penetration Tester and are assigned to scan a serv...
Question 14: During a forensic investigation, a large number of files wer...
Question 15: You are a security analyst performing a penetration tests fo...
Question 16: Which of the following standard represents a legal precedent...
Question 17: On NTFS file system, which of the following tools can a fore...
Question 18: Consider that you are investigating a machine running an Win...
Question 19: A company's policy requires employees to perform file transf...
Question 20: Which of the following files gives information about the cli...
Question 21: In forensics.______are used lo view stored or deleted data f...
Question 22: You are working as Computer Forensics investigator and are c...
Question 23: Which of the following tool enables a user to reset his/her ...
Question 24: Which of the following protocols allows non-ASCII files, suc...
Question 25: The rule of thumb when shutting down a system is to pull the...
Question 26: Meyer Electronics Systems just recently had a number of lapt...
Question 27: Email archiving is a systematic approach to save and protect...
Question 28: Which of the following setups should a tester choose to anal...
Question 29: Which of the following tools is used to dump the memory of a...
Question 30: Which of the following file contains the traces of the appli...
Question 31: A Linux system is undergoing investigation. In which directo...
Question 32: Simon is a former employee of Trinitron XML Inc. He feels he...
Question 33: Company ABC has employed a firewall, IDS, Antivirus, Domain ...
Question 34: Brian has the job of analyzing malware for a software securi...
Question 35: After suspecting a change in MS-Exchange Server storage arch...
Question 36: Which of the following statements is true with respect to SS...
Question 37: Law enforcement officers are conducting a legal search for w...
Question 38: Which is a standard procedure to perform during all computer...
Question 39: Diskcopy is:
Question 40: Which of the following information is displayed when Netstat...
Question 41: Donald made an OS disk snapshot of a compromised Azure VM un...
Question 42: You are assigned a task to examine the log files pertaining ...
Question 43: Where does Encase search to recover NTFS files and folders?...
Question 44: In General, __________________ Involves the investigation of...
Question 45: The working of the Tor browser is based on which of the foll...
Question 46: What type of equipment would a forensics investigator store ...
Question 47: Which of the following is a device monitoring tool?...
Question 48: During forensics investigations, investigators tend to colle...
Question 49: Volatile Memory is one of the leading problems for forensics...
Question 50: How often must a company keep log files for them to be admis...
Question 51: What is the name of the first reserved sector in File alloca...
Question 52: The given image displays information about date and time of ...
Question 53: What TCP/UDP port does the toolkit program netstat use?...
Question 54: An executive has leaked the company trade secrets through an...
Question 55: Which of the following commands shows you the names of all o...
Question 56: Jason discovered a file named $RIYG6VR.doc in the C:\$Recycl...
Question 57: In the context of file deletion process, which of the follow...
Question 58: John is working as a computer forensics investigator for a c...
Question 59: An Employee is suspected of stealing proprietary information...
Question 60: In Linux OS, different log files hold different information,...
Question 61: A picture file is recovered from a computer under investigat...
Question 62: Which tool does the investigator use to extract artifacts le...
Question 63: If you see the files Zer0.tar.gz and copy.tar.gz on a Linux ...
Question 64: A call detail record (CDR) provides metadata about calls mad...
Question 65: Analyze the hex representation of mysql-bin.000013 file in t...
Question 66: What advantage does the tool Evidor have over the built-in W...
Question 67: You have been asked to investigate after a user has reported...
Question 68: How many bits is Source Port Number in TCP Header packet?...
Question 69: Which of the following network attacks refers to sending hug...
Question 70: Select the data that a virtual memory would store in a Windo...
Question 71: What command-line tool enables forensic Investigator to esta...
Question 72: What type of file is represented by a colon (:) with a name ...
Question 73: In which implementation of RAID will the image of a Hardware...
Question 74: What type of analysis helps to identify the time and sequenc...
Question 75: Which Federal Rule of Evidence speaks about the Hearsay exce...
Question 76: When a user deletes a file or folder, the system stores comp...
Question 77: Harold wants to set up a firewall on his network but is not ...
Question 78: One way to identify the presence of hidden partitions on a s...
Question 79: What should you do when approached by a reporter about a cas...
Question 80: An investigator seized a notebook device installed with a Mi...
Question 81: Which of the following is a MAC-based File Recovery Tool?...
Question 82: Steve received a mail that seemed to have come from her bank...
Question 83: Which ISO Standard enables laboratories to demonstrate that ...
Question 84: Which of the following tools will allow a forensic Investiga...
Question 85: You have been called in to help with an investigation of an ...
Question 86: What does the part of the log, "% SEC-6-IPACCESSLOGP", extra...
Question 87: What is the primary function of the tool CHKDSK in Windows t...
Question 88: Raw data acquisition format creates _________ of a data set ...
Question 89: What information do you need to recover when searching a vic...
Question 90: Annie is searching for certain deleted files on a system run...
Question 91: Which of the following techniques can be used to beat stegan...
Question 92: Wireless access control attacks aim to penetrate a network b...
Question 93: Why is it still possible to recover files that have been emp...
Question 94: Bill is the accounting manager for Grummon and Sons LLC in C...
Question 95: Edgar is part of the FBI's forensic media and malware analys...
Question 96: You are conducting an investigation of fraudulent claims in ...
Question 97: Your company's network just finished going through a SAS 70 ...
Question 98: What method of computer forensics will allow you to trace al...
Question 99: Simona has written a regular expression for the detection of...
Question 100: Shane, a forensic specialist, is investigating an ongoing at...
Question 101: In which of these attacks will a steganalyst use a random me...
Question 102: While presenting his case to the court, Simon calls many wit...
Question 103: Profiling is a forensics technique for analyzing evidence wi...
Question 104: Stephen is checking an image using Compare Files by The Wiza...
Question 105: Madison is on trial for allegedly breaking into her universi...
Question 106: Jim performed a vulnerability analysis on his network and fo...
Question 107: What type of flash memory card comes in either Type I or Typ...
Question 108: The process of restarting a computer that is already turned ...
Question 109: Which of the following is a federal law enacted in the US to...
Question 110: Which of the following is found within the unique instance I...
Question 111: Charles has accidentally deleted an important file while wor...
Question 112: Which of the following Perl scripts will help an investigato...
Question 113: Buffer overflow vulnerability of a web application occurs wh...
Question 114: Depending upon the jurisdictional areas, different laws appl...
Question 115: This law sets the rules for commercial email, establishes re...
Question 116: Which of the following is a precomputed table containing wor...
Question 117: Which of the following files store the MySQL database data p...
Question 118: What must an attorney do first before you are called to test...
Question 119: Joshua is analyzing an MSSQL database for finding the attack...
Question 120: Adam, a forensic investigator, is investigating an attack on...
Question 121: In conducting a computer abuse investigation you become awar...
Question 122: When examining the log files from a Windows IIS Web Server, ...
Question 123: Which forensic investigating concept trails the whole incide...
Question 124: Given the drive dimensions as follows and assuming a sector ...
Question 125: Which of the following should a computer forensics lab used ...
Question 126: ____________________ is simply the application of Computer I...
Question 127: What method would be most efficient for you to acquire digit...
Question 128: When carrying out a forensics investigation, why should you ...
Question 129: You are trying to locate Microsoft Outlook Web Access Defaul...
Question 130: CAN-SPAM act requires that you:...
Question 131: Which of the following acts as a network intrusion detection...
Question 132: When Investigating a system, the forensics analyst discovers...
Question 133: What operating system would respond to the following command...
Question 134: What does the command "C:\&gt;wevtutil gl &lt;log name&gt;" ...
Question 135: Using Internet logging software to investigate a case of mal...
Question 136: Which of the following malware targets Android mobile device...
Question 137: Buffer overflow vulnerabilities, of web applications, occurs...
Question 138: Hackers can gain access to Windows Registry and manipulate u...
Question 139: Adam Is thinking of establishing a hospital In the US and ap...
Question 140: What type of attack sends SYN requests to a target system wi...
Question 141: Why are Linux/Unix based computers better to use than Window...
Question 142: What does 254 represent in ICCID 89254021520014515744?...
Question 143: After undergoing an external IT audit, George realizes his n...
Question 144: How many times can data be written to a DVD+R disk?...
Question 145: You are running through a series of tests on your network to...
Question 146: In the following directory listing, (Exhibit) Which file sho...
Question 147: Which part of the Windows Registry contains the user's passw...
Question 148: Which of these Windows utility help you to repair logical fi...
Question 149: Why is it a good idea to perform a penetration test from the...
Question 150: UEFI is a specification that defines a software interface be...
Question 151: When you are running a vulnerability scan on a network and t...
Question 152: Which of the following is NOT a part of pre-investigation ph...
Question 153: Robert needs to copy an OS disk snapshot of a compromised VM...
Question 154: Which of these ISO standards define the file system for opti...
Question 155: All Blackberry email is eventually sent and received through...
Question 156: "No action taken by law enforcement agencies or their agents...
Question 157: A master boot record (MBR) is the first sector ("sector zero...
Question 158: Amber, a black hat hacker, has embedded malware into a small...
Question 159: Which of the following directory contains the binary files o...
Question 160: When investigating a potential e-mail crime, what is your fi...
Question 161: In Microsoft file structures, sectors are grouped together t...
Question 162: An employee is attempting to wipe out data stored on a coupl...
Question 163: Which of the following tool is used to locate IP addresses?...
Question 164: NTFS sets a flag for the file once you encrypt it and create...
Question 165: While searching through a computer under investigation, you ...
Question 166: A computer forensics Investigator or forensic analyst Is a s...
Question 167: Which type of attack is possible when attackers know some cr...
Question 168: Which of the following Ii considered as the starting point o...
Question 169: Heather, a computer forensics investigator, is assisting a g...
Question 170: Which of the following tool captures and allows you to inter...
Question 171: When installed on a Windows machine, which port does the Tor...
Question 172: Which of the following file formats allows the user to compr...
Question 173: It takes _____________ mismanaged case/s to ruin your profes...
Question 174: Smith is an IT technician that has been appointed to his com...
Question 175: When obtaining a warrant, it is important to:...
Question 176: When setting up a wireless network with multiple access poin...
Question 177: A honey pot deployed with the IP 172.16.1.108 was compromise...
Question 178: When you carve an image, recovering the image depends on whi...
Question 179: Data is striped at a byte level across multiple drives, and ...
Question 180: You are called by an author who is writing a book and he wan...
Question 181: The Apache server saves diagnostic information and error mes...
Question 182: James is testing the ability of his routers to withstand DoS...
Question 183: Data density of a disk drive is calculated by using_______...
Question 184: Richard is extracting volatile data from a system and uses t...
Question 185: What does mactime, an essential part of the coroner's toolki...
Question 186: When a file is deleted by Windows Explorer or through the MS...
Question 187: To reach a bank web site, the traffic from workstations must...
Question 188: Sectors in hard disks typically contain how many bytes?...
Question 189: Which of the following commands shows you the username and I...
Question 190: When reviewing web logs, you see an entry for resource not f...
Question 191: Identify the term that refers to individuals who, by virtue ...
Question 192: This type of testimony is presented by someone who does the ...
Question 193: Which code does the FAT file system use to mark the file as ...
Question 194: In which loT attack does the attacker use multiple forged id...
Question 195: Under confession, an accused criminal admitted to encrypting...
Question 196: Which of the following is a tool to reset Windows admin pass...
Question 197: An Investigator Is checking a Cisco firewall log that reads ...
Question 198: Item 2If you come across a sheepdip machine at your client s...
Question 199: Which of the following file system is used by Mac OS X?...
Question 200: Investigators can use the Type Allocation Code (TAC) to find...
Question 201: What feature of Windows is the following command trying to u...
Question 202: Which "Standards and Criteria" under SWDGE states that "the ...
Question 203: A state department site was recently attacked and all the se...
Question 204: Tasklist command displays a list of applications and service...
Question 205: According to RFC 3227, which of the following is considered ...
Question 206: Harold is a computer forensics investigator working for a co...
Question 207: When investigating a Windows System, it is important to view...
Question 208: E-mail logs contain which of the following information to he...
Question 209: Which OWASP loT vulnerability talks about security flaws suc...
Question 210: What term is used to describe a cryptographic technique for ...
Question 211: Brian needs to acquire data from RAID storage. Which of the ...
Question 212: What stage of the incident handling process involves reporti...
Question 213: Which among the following is an act passed by the U.S. Congr...
Question 214: Maria has executed a suspicious executable file In a control...
Question 215: During an investigation, an employee was found to have delet...
Question 216: What does the superblock in Linux define?...
Question 217: To which phase of the computer forensics investigation proce...
Question 218: Which of the following statements is TRUE with respect to th...