<< Prev Question Next Question >>

Question 25/205

You just passed your ECSA exam and are about to start your first consulting job running security audits for a financial institution in Los Angeles. The IT manager of the company you will be working for tries to see if you remember your ECSA class. He asks about the methodology you will be using to test the company's network. How would you answer?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (205q)
Question 1: Paul is a computer forensics investigator working for Tyler ...
Question 2: Before performing a logical or physical search of a drive in...
Question 3: Which of the following information is displayed when Netstat...
Question 4: Which of the following tools will help the investigator to a...
Question 5: While analyzing a hard disk, the investigator finds that the...
Question 6: When investigating a potential e-mail crime, what is your fi...
Question 7: Which of the following is NOT a part of pre-investigation ph...
Question 8: What is the investigator trying to analyze if the system giv...
Question 9: When you are running a vulnerability scan on a network and t...
Question 10: During the course of an investigation, you locate evidence t...
Question 11: Which of the following Perl scripts will help an investigato...
Question 12: The MD5 program is used to:
Question 13: Corporate investigations are typically easier than public in...
Question 14: Which of the following are small pieces of data sent from a ...
Question 15: Julia is a senior security analyst for Berber Consulting gro...
Question 16: What is the primary function of the tool CHKDSK in Windows t...
Question 17: You work as a penetration tester for Hammond Security Consul...
Question 18: Which of the following data structures stores attributes of ...
Question 19: As a security analyst, you setup a false survey website that...
Question 20: When conducting computer forensic analysis, you must guard a...
Question 21: While looking through the IIS log file of a web server, you ...
Question 22: A picture file is recovered from a computer under investigat...
Question 23: You are working as an investigator for a corporation and you...
Question 24: Joshua is analyzing an MSSQL database for finding the attack...
Question 25: You just passed your ECSA exam and are about to start your f...
Question 26: Which of the following statements is incorrect when preservi...
Question 27: Your company uses Cisco routers exclusively throughout the n...
Question 28: What is kept in the following directory? HKLM\SECURITY\Polic...
Question 29: When is it appropriate to use computer forensics?...
Question 30: You are working as a Computer forensics investigator for a c...
Question 31: John is working as a computer forensics investigator for a c...
Question 32: Bill is the accounting manager for Grummon and Sons LLC in C...
Question 33: ____________________ is simply the application of Computer I...
Question 34: Smith, as a part his forensic investigation assignment, seiz...
Question 35: Adam, a forensic analyst, is preparing VMs for analyzing a m...
Question 36: Which of the following should a computer forensics lab used ...
Question 37: An employee is attempting to wipe out data stored on a coupl...
Question 38: Smith, a network administrator with a large MNC, was the fir...
Question 39: Office Documents (Word, Excel and PowerPoint) contain a code...
Question 40: Software firewalls work at which layer of the OSI model?...
Question 41: When investigating a computer forensics case where Microsoft...
Question 42: A law enforcement officer may only search for and seize crim...
Question 43: The efforts to obtain information before a trail by demandin...
Question 44: Which of the following Event Correlation Approach is an adva...
Question 45: George is a senior security analyst working for a state agen...
Question 46: Which of the following is a part of a Solid-State Drive (SSD...
Question 47: You are working for a local police department that services ...
Question 48: An executive has leaked the company trade secrets through an...
Question 49: Which of the following techniques can be used to beat stegan...
Question 50: In a computer that has Dropbox client installed, which of th...
Question 51: You are working in the security Department of law firm. One ...
Question 52: You are conducting an investigation of fraudulent claims in ...
Question 53: Where should the investigator look for the Edge browser's br...
Question 54: Which of the following tool can the investigator use to anal...
Question 55: What header field in the TCP/IP protocol stack involves the ...
Question 56: Why should you never power on a computer that you need to ac...
Question 57: Kimberly is studying to be an IT security analyst at a vocat...
Question 58: Why would you need to find out the gateway of a device when ...
Question 59: The Apache server saves diagnostic information and error mes...
Question 60: To preserve digital evidence, an investigator should _______...
Question 61: You have been asked to investigate after a user has reported...
Question 62: James is dealing with a case regarding a cybercrime that has...
Question 63: You are a computer forensics investigator working with local...
Question 64: Gill is a computer forensics investigator who has been calle...
Question 65: Jason discovered a file named $RIYG6VR.doc in the C:\$Recycl...
Question 66: Gary, a computer technician, is facing allegations of abusin...
Question 67: Which of the following stand true for BIOS Parameter Block?...
Question 68: The ____________________ refers to handing over the results ...
Question 69: Amber, a black hat hacker, has embedded a malware into a sma...
Question 70: Which tool does the investigator use to extract artifacts le...
Question 71: How will you categorize a cybercrime that took place within ...
Question 72: If you plan to startup a suspect's computer, you must modify...
Question 73: The given image displays information about date and time of ...
Question 74: Which U.S. law sets the rules for sending emails for commerc...
Question 75: Raw data acquisition format creates _________ of a data set ...
Question 76: To reach a bank web site, the traffic from workstations must...
Question 77: What technique used by Encase makes it virtually impossible ...
Question 78: NTFS has reduced slack space than FAT, thus having lesser po...
Question 79: What will the following command accomplish in Linux? fdisk /...
Question 80: Which of the following tool captures and allows you to inter...
Question 81: Data Files contain Multiple Data Pages, which are further di...
Question 82: How often must a company keep log files for them to be admis...
Question 83: What does the 63.78.199.4(161) denotes in a Cisco router log...
Question 84: Select the tool appropriate for examining the dynamically li...
Question 85: During an investigation, Noel found the following SIM card f...
Question 86: Smith, a forensic examiner, was analyzing a hard disk image ...
Question 87: Which of the following ISO standard defines file systems and...
Question 88: You are working as an independent computer forensics investi...
Question 89: Tasklist command displays a list of applications and service...
Question 90: What is the smallest physical storage unit on a hard drive?...
Question 91: What should you do when approached by a reporter about a cas...
Question 92: In Microsoft file structures, sectors are grouped together t...
Question 93: Frank is working on a vulnerability assessment for a company...
Question 94: Which among the following tools can help a forensic investig...
Question 95: Analyze the hex representation of mysql-bin.000013 file in t...
Question 96: Which part of the Windows Registry contains the user's passw...
Question 97: The MAC attributes are timestamps that refer to a time at wh...
Question 98: Lynne receives the following email: Dear [email protected]! We...
Question 99: An investigator has extracted the device descriptor for a 1G...
Question 100: Which of the following attack uses HTML tags like &lt;script...
Question 101: Which of the following file system uses Master File Table (M...
Question 102: Richard is extracting volatile data from a system and uses t...
Question 103: What does the acronym POST mean as it relates to a PC?...
Question 104: Which of the following tool creates a bit-by-bit image of an...
Question 105: Which of the following does not describe the type of data de...
Question 106: What binary coding is used most often for e-mail purposes?...
Question 107: Madison is on trial for allegedly breaking into her universi...
Question 108: An Employee is suspected of stealing proprietary information...
Question 109: While working for a prosecutor, what do you think you should...
Question 110: In Windows Security Event Log, what does an event id of 530 ...
Question 111: If a PDA is seized in an investigation while the device is t...
Question 112: George is performing security analysis for Hammond and Sons ...
Question 113: A forensics investigator is searching the hard drive of a co...
Question 114: Which of the following is a federal law enacted in the US to...
Question 115: In the context of file deletion process, which of the follow...
Question 116: Which of the following standard represents a legal precedent...
Question 117: An expert witness is a __________________ who is normally ap...
Question 118: What must an attorney do first before you are called to test...
Question 119: Who is responsible for the following tasks?...
Question 120: Paul's company is in the process of undergoing a complete se...
Question 121: Depending upon the jurisdictional areas, different laws appl...
Question 122: Davidson Trucking is a small transportation company that has...
Question 123: Ron, a computer forensics expert, is investigating a case in...
Question 124: Which among the following web application threats is resulte...
Question 125: While presenting his case to the court, Simon calls many wit...
Question 126: The rule of thumb when shutting down a system is to pull the...
Question 127: When obtaining a warrant, it is important to:...
Question 128: A master boot record (MBR) is the first sector ("sector zero...
Question 129: Select the data that a virtual memory would store in a Windo...
Question 130: The following is a log file screenshot from a default instal...
Question 131: Julie is a college student majoring in Information Systems a...
Question 132: What is the name of the Standard Linux Command that is also ...
Question 133: Ivanovich, a forensics investigator, is trying to extract co...
Question 134: Which part of Metasploit framework helps users to hide the d...
Question 135: Which of the following Android libraries are used to render ...
Question 136: What is the name of the first reserved sector in File alloca...
Question 137: When a user deletes a file or folder, the system stores comp...
Question 138: Event correlation is the process of finding relevance betwee...
Question 139: Under which Federal Statutes does FBI investigate for comput...
Question 140: When examining a hard disk without a write-blocker, you shou...
Question 141: The following excerpt is taken from a honeypot log that was ...
Question 142: The offset in a hexadecimal code is:...
Question 143: For what purpose do the investigators use tools like iPhoneB...
Question 144: An International Mobile Equipment Identifier (IMEI) is a 15-...
Question 145: What will the following command accomplish? dd if=/dev/xxx o...
Question 146: When examining a file with a Hex Editor, what space does the...
Question 147: What type of attack occurs when an attacker can force a rout...
Question 148: You are a security analyst performing reconnaissance on a co...
Question 149: After passively scanning the network of Department of Defens...
Question 150: After undergoing an external IT audit, George realizes his n...
Question 151: companyXYZ has asked you to assess the security of their per...
Question 152: Hard disk data addressing is a method of allotting addresses...
Question 153: Which of the following standard represents a legal precedent...
Question 154: Pick the statement which does not belong to the Rule 804. He...
Question 155: What is cold boot (hard boot)?
Question 156: Which legal document allows law enforcement to search an off...
Question 157: Which of the following files DOES NOT use Object Linking and...
Question 158: Harold is a security analyst who has just run the rdisk /s c...
Question 159: What hashing method is used to password protect Blackberry d...
Question 160: Identify the file system that uses $BitMap file to keep trac...
Question 161: NTFS sets a flag for the file once you encrypt it and create...
Question 162: James, a hacker, identifies a vulnerability in a website. To...
Question 163: In Linux OS, different log files hold different information,...
Question 164: You are called in to assist the police in an investigation i...
Question 165: Jim's company regularly performs backups of their critical s...
Question 166: What will the following command accomplish?...
Question 167: What will the following command produce on a website login p...
Question 168: Which of the following web browser uses the Extensible Stora...
Question 169: Sniffers that place NICs in promiscuous mode work at what la...
Question 170: What is the size value of a nibble?...
Question 171: Identify the term that refers to individuals who, by virtue ...
Question 172: Which of the following is an iOS Jailbreaking tool?...
Question 173: How many possible sequence number combinations are there in ...
Question 174: In a FAT32 system, a 123 KB file will use how many sectors?...
Question 175: Hackers can gain access to Windows Registry and manipulate u...
Question 176: What does the bytes 0x0B-0x53 represent in the boot sector o...
Question 177: Daryl, a computer forensics investigator, has just arrived a...
Question 178: Which of the following files contains the traces of the appl...
Question 179: Why is it a good idea to perform a penetration test from the...
Question 180: During an investigation of an XSS attack, the investigator c...
Question 181: Which of the following Linux command searches through the cu...
Question 182: While searching through a computer under investigation, you ...
Question 183: Which of the following is NOT a graphics file?...
Question 184: You are carrying out the last round of testing for your new ...
Question 185: Which of the following tool enables a user to reset his/her ...
Question 186: A small law firm located in the Midwest has possibly been br...
Question 187: You have completed a forensic investigation case. You would ...
Question 188: A(n) _____________________ is one that's performed by a comp...
Question 189: What does the 56.58.152.114(445) denote in a Cisco router lo...
Question 190: What is one method of bypassing a system BIOS password?...
Question 191: When investigating a network that uses DHCP to assign IP add...
Question 192: Which of the following is NOT an anti-forensics technique?...
Question 193: Steven has been given the task of designing a computer foren...
Question 194: As a Certified Ethical Hacker, you were contracted by a priv...
Question 195: Meyer Electronics Systems just recently had a number of lapt...
Question 196: Which list contains the most recent actions performed by a W...
Question 197: What is the location of the binary files required for the fu...
Question 198: You setup SNMP in multiple offices of your company. Your SNM...
Question 199: To make sure the evidence you recover and analyze with compu...
Question 200: Which of the following network attacks refers to sending hug...
Question 201: Which forensic investigating concept trails the whole incide...
Question 202: %3cscript%3ealert("XXXXXXXX")%3c/script%3e is a script obtai...
Question 203: Investigators can use the Type Allocation Code (TAC) to find...
Question 204: What layer of the OSI model do TCP and UDP utilize?...
Question 205: Which of the following is a record of the characteristics of...