<< Prev Question Next Question >>

Question 119/205

Who is responsible for the following tasks?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (205q)
Question 1: Paul is a computer forensics investigator working for Tyler ...
Question 2: Before performing a logical or physical search of a drive in...
Question 3: Which of the following information is displayed when Netstat...
Question 4: Which of the following tools will help the investigator to a...
Question 5: While analyzing a hard disk, the investigator finds that the...
Question 6: When investigating a potential e-mail crime, what is your fi...
Question 7: Which of the following is NOT a part of pre-investigation ph...
Question 8: What is the investigator trying to analyze if the system giv...
Question 9: When you are running a vulnerability scan on a network and t...
Question 10: During the course of an investigation, you locate evidence t...
Question 11: Which of the following Perl scripts will help an investigato...
Question 12: The MD5 program is used to:
Question 13: Corporate investigations are typically easier than public in...
Question 14: Which of the following are small pieces of data sent from a ...
Question 15: Julia is a senior security analyst for Berber Consulting gro...
Question 16: What is the primary function of the tool CHKDSK in Windows t...
Question 17: You work as a penetration tester for Hammond Security Consul...
Question 18: Which of the following data structures stores attributes of ...
Question 19: As a security analyst, you setup a false survey website that...
Question 20: When conducting computer forensic analysis, you must guard a...
Question 21: While looking through the IIS log file of a web server, you ...
Question 22: A picture file is recovered from a computer under investigat...
Question 23: You are working as an investigator for a corporation and you...
Question 24: Joshua is analyzing an MSSQL database for finding the attack...
Question 25: You just passed your ECSA exam and are about to start your f...
Question 26: Which of the following statements is incorrect when preservi...
Question 27: Your company uses Cisco routers exclusively throughout the n...
Question 28: What is kept in the following directory? HKLM\SECURITY\Polic...
Question 29: When is it appropriate to use computer forensics?...
Question 30: You are working as a Computer forensics investigator for a c...
Question 31: John is working as a computer forensics investigator for a c...
Question 32: Bill is the accounting manager for Grummon and Sons LLC in C...
Question 33: ____________________ is simply the application of Computer I...
Question 34: Smith, as a part his forensic investigation assignment, seiz...
Question 35: Adam, a forensic analyst, is preparing VMs for analyzing a m...
Question 36: Which of the following should a computer forensics lab used ...
Question 37: An employee is attempting to wipe out data stored on a coupl...
Question 38: Smith, a network administrator with a large MNC, was the fir...
Question 39: Office Documents (Word, Excel and PowerPoint) contain a code...
Question 40: Software firewalls work at which layer of the OSI model?...
Question 41: When investigating a computer forensics case where Microsoft...
Question 42: A law enforcement officer may only search for and seize crim...
Question 43: The efforts to obtain information before a trail by demandin...
Question 44: Which of the following Event Correlation Approach is an adva...
Question 45: George is a senior security analyst working for a state agen...
Question 46: Which of the following is a part of a Solid-State Drive (SSD...
Question 47: You are working for a local police department that services ...
Question 48: An executive has leaked the company trade secrets through an...
Question 49: Which of the following techniques can be used to beat stegan...
Question 50: In a computer that has Dropbox client installed, which of th...
Question 51: You are working in the security Department of law firm. One ...
Question 52: You are conducting an investigation of fraudulent claims in ...
Question 53: Where should the investigator look for the Edge browser's br...
Question 54: Which of the following tool can the investigator use to anal...
Question 55: What header field in the TCP/IP protocol stack involves the ...
Question 56: Why should you never power on a computer that you need to ac...
Question 57: Kimberly is studying to be an IT security analyst at a vocat...
Question 58: Why would you need to find out the gateway of a device when ...
Question 59: The Apache server saves diagnostic information and error mes...
Question 60: To preserve digital evidence, an investigator should _______...
Question 61: You have been asked to investigate after a user has reported...
Question 62: James is dealing with a case regarding a cybercrime that has...
Question 63: You are a computer forensics investigator working with local...
Question 64: Gill is a computer forensics investigator who has been calle...
Question 65: Jason discovered a file named $RIYG6VR.doc in the C:\$Recycl...
Question 66: Gary, a computer technician, is facing allegations of abusin...
Question 67: Which of the following stand true for BIOS Parameter Block?...
Question 68: The ____________________ refers to handing over the results ...
Question 69: Amber, a black hat hacker, has embedded a malware into a sma...
Question 70: Which tool does the investigator use to extract artifacts le...
Question 71: How will you categorize a cybercrime that took place within ...
Question 72: If you plan to startup a suspect's computer, you must modify...
Question 73: The given image displays information about date and time of ...
Question 74: Which U.S. law sets the rules for sending emails for commerc...
Question 75: Raw data acquisition format creates _________ of a data set ...
Question 76: To reach a bank web site, the traffic from workstations must...
Question 77: What technique used by Encase makes it virtually impossible ...
Question 78: NTFS has reduced slack space than FAT, thus having lesser po...
Question 79: What will the following command accomplish in Linux? fdisk /...
Question 80: Which of the following tool captures and allows you to inter...
Question 81: Data Files contain Multiple Data Pages, which are further di...
Question 82: How often must a company keep log files for them to be admis...
Question 83: What does the 63.78.199.4(161) denotes in a Cisco router log...
Question 84: Select the tool appropriate for examining the dynamically li...
Question 85: During an investigation, Noel found the following SIM card f...
Question 86: Smith, a forensic examiner, was analyzing a hard disk image ...
Question 87: Which of the following ISO standard defines file systems and...
Question 88: You are working as an independent computer forensics investi...
Question 89: Tasklist command displays a list of applications and service...
Question 90: What is the smallest physical storage unit on a hard drive?...
Question 91: What should you do when approached by a reporter about a cas...
Question 92: In Microsoft file structures, sectors are grouped together t...
Question 93: Frank is working on a vulnerability assessment for a company...
Question 94: Which among the following tools can help a forensic investig...
Question 95: Analyze the hex representation of mysql-bin.000013 file in t...
Question 96: Which part of the Windows Registry contains the user's passw...
Question 97: The MAC attributes are timestamps that refer to a time at wh...
Question 98: Lynne receives the following email: Dear [email protected]! We...
Question 99: An investigator has extracted the device descriptor for a 1G...
Question 100: Which of the following attack uses HTML tags like &lt;script...
Question 101: Which of the following file system uses Master File Table (M...
Question 102: Richard is extracting volatile data from a system and uses t...
Question 103: What does the acronym POST mean as it relates to a PC?...
Question 104: Which of the following tool creates a bit-by-bit image of an...
Question 105: Which of the following does not describe the type of data de...
Question 106: What binary coding is used most often for e-mail purposes?...
Question 107: Madison is on trial for allegedly breaking into her universi...
Question 108: An Employee is suspected of stealing proprietary information...
Question 109: While working for a prosecutor, what do you think you should...
Question 110: In Windows Security Event Log, what does an event id of 530 ...
Question 111: If a PDA is seized in an investigation while the device is t...
Question 112: George is performing security analysis for Hammond and Sons ...
Question 113: A forensics investigator is searching the hard drive of a co...
Question 114: Which of the following is a federal law enacted in the US to...
Question 115: In the context of file deletion process, which of the follow...
Question 116: Which of the following standard represents a legal precedent...
Question 117: An expert witness is a __________________ who is normally ap...
Question 118: What must an attorney do first before you are called to test...
Question 119: Who is responsible for the following tasks?...
Question 120: Paul's company is in the process of undergoing a complete se...
Question 121: Depending upon the jurisdictional areas, different laws appl...
Question 122: Davidson Trucking is a small transportation company that has...
Question 123: Ron, a computer forensics expert, is investigating a case in...
Question 124: Which among the following web application threats is resulte...
Question 125: While presenting his case to the court, Simon calls many wit...
Question 126: The rule of thumb when shutting down a system is to pull the...
Question 127: When obtaining a warrant, it is important to:...
Question 128: A master boot record (MBR) is the first sector ("sector zero...
Question 129: Select the data that a virtual memory would store in a Windo...
Question 130: The following is a log file screenshot from a default instal...
Question 131: Julie is a college student majoring in Information Systems a...
Question 132: What is the name of the Standard Linux Command that is also ...
Question 133: Ivanovich, a forensics investigator, is trying to extract co...
Question 134: Which part of Metasploit framework helps users to hide the d...
Question 135: Which of the following Android libraries are used to render ...
Question 136: What is the name of the first reserved sector in File alloca...
Question 137: When a user deletes a file or folder, the system stores comp...
Question 138: Event correlation is the process of finding relevance betwee...
Question 139: Under which Federal Statutes does FBI investigate for comput...
Question 140: When examining a hard disk without a write-blocker, you shou...
Question 141: The following excerpt is taken from a honeypot log that was ...
Question 142: The offset in a hexadecimal code is:...
Question 143: For what purpose do the investigators use tools like iPhoneB...
Question 144: An International Mobile Equipment Identifier (IMEI) is a 15-...
Question 145: What will the following command accomplish? dd if=/dev/xxx o...
Question 146: When examining a file with a Hex Editor, what space does the...
Question 147: What type of attack occurs when an attacker can force a rout...
Question 148: You are a security analyst performing reconnaissance on a co...
Question 149: After passively scanning the network of Department of Defens...
Question 150: After undergoing an external IT audit, George realizes his n...
Question 151: companyXYZ has asked you to assess the security of their per...
Question 152: Hard disk data addressing is a method of allotting addresses...
Question 153: Which of the following standard represents a legal precedent...
Question 154: Pick the statement which does not belong to the Rule 804. He...
Question 155: What is cold boot (hard boot)?
Question 156: Which legal document allows law enforcement to search an off...
Question 157: Which of the following files DOES NOT use Object Linking and...
Question 158: Harold is a security analyst who has just run the rdisk /s c...
Question 159: What hashing method is used to password protect Blackberry d...
Question 160: Identify the file system that uses $BitMap file to keep trac...
Question 161: NTFS sets a flag for the file once you encrypt it and create...
Question 162: James, a hacker, identifies a vulnerability in a website. To...
Question 163: In Linux OS, different log files hold different information,...
Question 164: You are called in to assist the police in an investigation i...
Question 165: Jim's company regularly performs backups of their critical s...
Question 166: What will the following command accomplish?...
Question 167: What will the following command produce on a website login p...
Question 168: Which of the following web browser uses the Extensible Stora...
Question 169: Sniffers that place NICs in promiscuous mode work at what la...
Question 170: What is the size value of a nibble?...
Question 171: Identify the term that refers to individuals who, by virtue ...
Question 172: Which of the following is an iOS Jailbreaking tool?...
Question 173: How many possible sequence number combinations are there in ...
Question 174: In a FAT32 system, a 123 KB file will use how many sectors?...
Question 175: Hackers can gain access to Windows Registry and manipulate u...
Question 176: What does the bytes 0x0B-0x53 represent in the boot sector o...
Question 177: Daryl, a computer forensics investigator, has just arrived a...
Question 178: Which of the following files contains the traces of the appl...
Question 179: Why is it a good idea to perform a penetration test from the...
Question 180: During an investigation of an XSS attack, the investigator c...
Question 181: Which of the following Linux command searches through the cu...
Question 182: While searching through a computer under investigation, you ...
Question 183: Which of the following is NOT a graphics file?...
Question 184: You are carrying out the last round of testing for your new ...
Question 185: Which of the following tool enables a user to reset his/her ...
Question 186: A small law firm located in the Midwest has possibly been br...
Question 187: You have completed a forensic investigation case. You would ...
Question 188: A(n) _____________________ is one that's performed by a comp...
Question 189: What does the 56.58.152.114(445) denote in a Cisco router lo...
Question 190: What is one method of bypassing a system BIOS password?...
Question 191: When investigating a network that uses DHCP to assign IP add...
Question 192: Which of the following is NOT an anti-forensics technique?...
Question 193: Steven has been given the task of designing a computer foren...
Question 194: As a Certified Ethical Hacker, you were contracted by a priv...
Question 195: Meyer Electronics Systems just recently had a number of lapt...
Question 196: Which list contains the most recent actions performed by a W...
Question 197: What is the location of the binary files required for the fu...
Question 198: You setup SNMP in multiple offices of your company. Your SNM...
Question 199: To make sure the evidence you recover and analyze with compu...
Question 200: Which of the following network attacks refers to sending hug...
Question 201: Which forensic investigating concept trails the whole incide...
Question 202: %3cscript%3ealert("XXXXXXXX")%3c/script%3e is a script obtai...
Question 203: Investigators can use the Type Allocation Code (TAC) to find...
Question 204: What layer of the OSI model do TCP and UDP utilize?...
Question 205: Which of the following is a record of the characteristics of...