<< Prev Question Next Question >>

Question 65/180

Data Acquisition is the process of imaging or otherwise obtaining information from a digital device and its peripheral equipment and media

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (180q)
Question 1: The Recycle Bin is located on the Windows desktop. When you ...
Question 2: Injection flaws are web application vulnerabilities that all...
Question 3: What is the First Step required in preparing a computer for ...
Question 4: Tracks numbering on a hard disk begins at 0 from the outer e...
Question 5: What document does the screenshot represent? (Exhibit)...
Question 6: JPEG is a commonly used method of compressing photographic I...
Question 7: Which one of the following statements is not correct while p...
Question 8: Mobile phone forensics is the science of recovering digital ...
Question 9: Deposition enables opposing counsel to preview an expert wit...
Question 10: When a system is compromised, attackers often try to disable...
Question 11: Email archiving is a systematic approach to save and protect...
Question 12: MAC filtering is a security access control methodology, wher...
Question 13: Attackers can manipulate variables that reference files with...
Question 14: The disk in the disk drive rotates at high speed, and heads ...
Question 15: Which of the following is not correct when documenting an el...
Question 16: Which of the following attacks allows an attacker to access ...
Question 17: Which of the following email headers specifies an address fo...
Question 18: Which device in a wireless local area network (WLAN) determi...
Question 19: When collecting electronic evidence at the crime scene, the ...
Question 20: Which of the following approaches checks and compares all th...
Question 21: Windows Security Event Log contains records of login/logout ...
Question 22: Which root folder (hive) of registry editor contains a vast ...
Question 23: In Windows 7 system files, which file reads the Boot.ini fil...
Question 24: An intrusion detection system (IDS) gathers and analyzes inf...
Question 25: You have been given the task to investigate web attacks on a...
Question 26: Which of the following standard is based on a legal preceden...
Question 27: Determine the message length from following hex viewer recor...
Question 28: You should always work with original evidence...
Question 29: Wireless access control attacks aim to penetrate a network b...
Question 30: Which is not a part of environmental conditions of a forensi...
Question 31: A computer forensic report is a report which provides detail...
Question 32: The Recycle Bin exists as a metaphor for throwing files away...
Question 33: An attack vector is a path or means by which an attacker can...
Question 34: When dealing with the powered-off computers at the crime sce...
Question 35: A system with a simple logging mechanism has not been given ...
Question 36: Which of the following network attacks refers to sending hug...
Question 37: Which of the following statements does not support the case ...
Question 38: What is a chain of custody?
Question 39: Files stored in the Recycle Bin in its physical location are...
Question 40: Computer security logs contain information about the events ...
Question 41: At the time of evidence transfer, both sender and receiver n...
Question 42: Microsoft Security IDs are available in Windows Registry Edi...
Question 43: FAT32 is a 32-bit version of FAT file system using smaller c...
Question 44: Event correlation is a procedure that is assigned with a new...
Question 45: Digital evidence validation involves using a hashing algorit...
Question 46: Log management includes all the processes and techniques use...
Question 47: Digital evidence is not fragile in nature....
Question 48: Computer forensics report provides detailed information on c...
Question 49: What is the "Best Evidence Rule"?...
Question 50: Physical security recommendations: There should be only one ...
Question 51: Which of the following reports are delivered under oath to a...
Question 52: Dumpster Diving refers to:
Question 53: File signature analysis involves collecting information from...
Question 54: The Apache server saves diagnostic information and error mes...
Question 55: In which step of the computer forensics investigation method...
Question 56: Which of the following steganography types hides the secret ...
Question 57: Steganography is a technique of hiding a secret message with...
Question 58: Data acquisition system is a combination of tools or process...
Question 59: First response to an incident may involve three different gr...
Question 60: Which of the following commands shows you the username and I...
Question 61: Consistency in the investigative report is more important th...
Question 62: Who is responsible for the following tasks? Secure the scene...
Question 63: Network forensics allows Investigators to inspect network tr...
Question 64: Ever-changing advancement or mobile devices increases the co...
Question 65: Data Acquisition is the process of imaging or otherwise obta...
Question 66: International Mobile Equipment Identifier (IMEI) is a 15-dlg...
Question 67: When a file or folder is deleted, the complete path, includi...
Question 68: During first responder procedure you should follow all laws ...
Question 69: Windows Security Accounts Manager (SAM) is a registry file w...
Question 70: Which of the following is not a part of disk imaging tool re...
Question 71: Shortcuts are the files with the extension .Ink that are cre...
Question 72: How do you define forensic computing?...
Question 73: Subscriber Identity Module (SIM) is a removable component th...
Question 74: Netstat is a tool for collecting Information regarding netwo...
Question 75: An expert witness is a witness, who by virtue of education, ...
Question 76: LBA (Logical Block Address) addresses data by allotting a __...
Question 77: The ARP table of a router comes in handy for Investigating n...
Question 78: Wi-Fi Protected Access (WPA) is a data encryption method for...
Question 79: Data is striped at a byte level across multiple drives and p...
Question 80: Identify the attack from following sequence of actions? Step...
Question 81: Ron. a computer forensics expert, Is Investigating a case in...
Question 82: When collecting evidence from the RAM, where do you look for...
Question 83: Networks are vulnerable to an attack which occurs due to ove...
Question 84: A mobile operating system is the operating system that opera...
Question 85: Which of the following file in Novel GroupWise stores inform...
Question 86: Which of the following password cracking techniques works li...
Question 87: Which of the following statements is incorrect related to ac...
Question 88: Syslog is a client/server protocol standard for forwarding l...
Question 89: When the operating system marks cluster as used, but does no...
Question 90: Centralized logging is defined as gathering the computer sys...
Question 91: A mobile operating system manages communication between the ...
Question 92: What is the goal of forensic science?...
Question 93: What is a SCSI (Small Computer System Interface)?...
Question 94: The status of the network interface cards (NICs) connected t...
Question 95: Depending upon the Jurisdictional areas, different laws appl...
Question 96: Recovery of the deleted partition is the process by which th...
Question 97: What is a first sector ("sector zero") of a hard disk?...
Question 98: What is static executable file analysis?...
Question 99: Smith, as a part his forensic investigation assignment, has ...
Question 100: Which of the following commands shows you the names of all o...
Question 101: Which of the following would you consider an aspect of organ...
Question 102: What is the smallest allocation unit of a hard disk?...
Question 103: Graphics Interchange Format (GIF) is a ___________RGB bitmap...
Question 104: Damaged portions of a disk on which no read/Write operation ...
Question 105: Data files from original evidence should be used for forensi...
Question 106: A forensic investigator is a person who handles the complete...
Question 107: Which of the following is not an example of a cyber-crime?...
Question 108: Task list command displays a list of applications and servic...
Question 109: How do you define Technical Steganography?...
Question 110: Why is it Important to consider health and safety factors in...
Question 111: You can interact with the Registry through intermediate prog...
Question 112: TCP/IP (Transmission Control Protocol/Internet Protocol) is ...
Question 113: If the partition size Is 4 GB, each cluster will be 32 K Eve...
Question 114: Which one of the following is not a consideration in a foren...
Question 115: Which of the following is the certifying body of forensics l...
Question 116: A swap file is a space on a hard disk used as the virtual me...
Question 117: Which of the following passwords are sent over the wire (and...
Question 118: Quality of a raster Image is determined by the _____________...
Question 119: SMTP (Simple Mail Transfer protocol) receives outgoing mail ...
Question 120: Cyber-crime is defined as any Illegal act involving a gun, a...
Question 121: Hard disk data addressing is a method of allotting addresses...
Question 122: All the Information about the user activity on the network, ...
Question 123: According to US federal rules, to present a testimony in a c...
Question 124: An image is an artifact that reproduces the likeness of some...
Question 125: Which of the following statement is not correct when dealing...
Question 126: During the seizure of digital evidence, the suspect can be a...
Question 127: Raw data acquisition format creates ____________of a data se...
Question 128: The Electronic Serial Number (ESN) is a unique __________ re...
Question 129: A rogue/unauthorized access point is one that Is not authori...
Question 130: Which wireless standard has bandwidth up to 54 Mbps and sign...
Question 131: System software password cracking is defined as cracking the...
Question 132: BMP (Bitmap) is a standard file format for computers running...
Question 133: Which of the following commands shows you all of the network...
Question 134: Which table is used to convert huge word lists (i .e. dictio...
Question 135: Web applications provide an Interface between end users and ...
Question 136: Which of the following attacks allows attacker to acquire ac...
Question 137: If a file (readme.txt) on a hard disk has a size of 2600 byt...
Question 138: The IIS log file format is a fixed (cannot be customized) AS...
Question 139: Under no circumstances should anyone, with the exception of ...
Question 140: Hash injection attack allows attackers to inject a compromis...
Question 141: Jason, a renowned forensic investigator, is investigating a ...
Question 142: A steganographic file system is a method to store the files ...
Question 143: Which of the following statements is incorrect when preservi...
Question 144: The evolution of web services and their increasing use in bu...
Question 145: Smith, an employee of a reputed forensic Investigation firm,...
Question 146: Which of the following is not a part of the technical specif...
Question 147: In what circumstances would you conduct searches without a w...
Question 148: SIM is a removable component that contains essential informa...
Question 149: What is cold boot (hard boot)?
Question 150: Email spoofing refers to:
Question 151: Which Is a Linux journaling file system?...
Question 152: Buffer Overflow occurs when an application writes more data ...
Question 153: File deletion is a way of removing a file from a computer's ...
Question 154: Digital photography helps in correcting the perspective of t...
Question 155: The need for computer forensics is highlighted by an exponen...
Question 156: Computer security logs contain information about the events ...
Question 157: An Internet standard protocol (built on top of TCP/IP) that ...
Question 158: What is the first step that needs to be carried out to inves...
Question 159: Network forensics can be defined as the sniffing, recording,...
Question 160: P0P3 (Post Office Protocol 3) is a standard protocol for rec...
Question 161: Router log files provide detailed Information about the netw...
Question 162: What is a bit-stream copy?
Question 163: Which of the following is not a part of data acquisition for...
Question 164: First responder is a person who arrives first at the crime s...
Question 165: Which of the following log injection attacks uses white spac...
Question 166: Volatile information can be easily modified or lost when the...
Question 167: Which of the following statements is not a part of securing ...
Question 168: Which of the following Steganography techniques allows you t...
Question 169: What is the first step that needs to be carried out to crack...
Question 170: WPA2 provides enterprise and Wi-Fi users with stronger data ...
Question 171: When NTFS Is formatted, the format program assigns the _____...
Question 172: Data compression involves encoding the data to take up less ...
Question 173: Operating System logs are most beneficial for Identifying or...
Question 174: Which of the following Wi-Fi chalking methods refers to draw...
Question 175: Billy, a computer forensics expert, has recovered a large nu...
Question 176: Attacker uses vulnerabilities in the authentication or sessi...
Question 177: Wireless network discovery tools use two different methodolo...
Question 178: Email archiving is a systematic approach to save and protect...
Question 179: Which of the following commands shows you the NetBIOS name t...
Question 180: In an echo data hiding technique, the secret message is embe...