Question 1
Question
What is the First Step required in preparing a computer for forensics investigation?
Answer
-
Secure any relevant media
-
Do not turn the computer off or on, run any programs, or attempt to access data on a computer
-
Suspend automated document destruction and recycling policies that may pertain to any
relevant media or users at Issue
-
Identify the type of data you are seeking, the Information you are looking for, and the urgency
level of the examination
Question 2
Question
Network forensics can be defined as the sniffing, recording, acquisition and analysis of the
network traffic and event logs in order to investigate a network security incident.
Question 3
Question
Which of the following commands shows you the names of all open shared files on a server and
number of file locks on each file?
Answer
-
Net sessions
-
Net file
-
Netconfig
-
Net share
Question 4
Question
The Recycle Bin exists as a metaphor for throwing files away, but it also allows user to retrieve
and restore files. Once the file is moved to the recycle bin, a record is added to the log file that
exists in the Recycle Bin.Which of the following files contains records that correspond to each deleted file in the Recycle
Bin?
Answer
-
INFO1 file
-
INFO2 file
-
LOGINFO2 file
-
LOGINFO1 file
Question 5
Question
Email archiving is a systematic approach to save and protect the data contained in emails so that
it can be accessed fast at a later date. There are two main archive types, namely Local Archive
and Server Storage Archive. Which of the following statements is correct while dealing with local
archives?
Answer
-
Server storage archives are the server information and settings stored on a local system
whereas the local archives are the local email client information stored on the mail server
-
Local archives should be stored together with the server storage archives in order to be
admissible in a court of law
-
Local archives do not have evidentiary value as the email client may alter the message data
-
It is difficult to deal with the webmail as there is no offline archive in most cases. So consult
your counsel on the case as to the best way to approach and gain access to the required data on
servers
Question 6
Question
Which of the following email headers specifies an address for mailer-generated errors, like "no
such user" bounce messages, to go to (instead of the sender's address)?
Question 7
Question
Which of the following commands shows you all of the network services running on Windowsbased
servers?
Answer
-
Net start
-
Net use
-
Net Session
-
Net share
Question 8
Question
Email archiving is a systematic approach to save and protect the data contained in emails so that
it can tie easily accessed at a later date
Question 9
Question
Windows Security Accounts Manager (SAM) is a registry file which stores passwords in a hashed
format. SAM file in Windows is located at:
Answer
-
C:\windows\system32\con\SAM
-
C:\windows\system32\config\SAM
-
C:\windows\system32\Boot\SAM
-
C:\windows\system32\drivers\SAM
Question 10
Question
FAT32 is a 32-bit version of FAT file system using smaller clusters and results in efficient storage
capacity. What is the maximum drive size supported?
Answer
-
1 terabytes
-
2 terabytes
-
3 terabytes
-
4 terabytes
Question 11
Question
In which step of the computer forensics investigation methodology would you run MD5 checksum
on the evidence?
Question 12
Question
Network forensics allows Investigators 10 inspect network traffic and logs to identify and locate the
attack system. Network forensics can reveal: (Select three answers)
Answer
-
Source of security incidents’ and network attacks
-
Path of the attack
-
Hardware configuration of the attacker's system
-
Intrusion techniques used by attackers
Question 13
Question
Determine the message length from following hex viewer record:
Question 14
Question
TCP/IP (Transmission Control Protocol/Internet Protocol) is a communication protocol used to
connect different hosts in the Internet. It contains four layers, namely the network interface layer.
Internet layer, transport layer, and application layer. Which of the following protocols works under the transport layer of TCP/IP?
Question 15
Question
Which of the following statements does not support the case assessment?
Answer
-
Do not document the chain of custody
-
Discuss whether other forensic processes need to be performed on the evidence
-
Identify the legal authority for the forensic examination request
-
Review the case investigator's request for service
Question 16
Question
Wireless access control attacks aim to penetrate a network by evading WLAN access control
measures, such as AP MAC filters and Wi-Fi port access controls. Which of the following wireless access control attacks allows the attacker to set up a rogue access
point outside the corporate perimeter, and then lure the employees of the organization to connect
to it?
Answer
-
War driving
-
Rogue access points
-
MAC spoofing
-
Client mis-association
Question 17
Question
File deletion is a way of removing a file from a computer's file system. What happens when a file is
deleted in windows7?
Answer
-
The last letter of a file name is replaced by a hex byte code E5h
-
The operating system marks the file's name in the MFT with a special character that indicates
that the file has been deleted
-
Corresponding clusters in FAT are marked as used
-
The computer looks at the clusters occupied by that file and does not avails space to store a
new file
Question 18
Question
What is cold boot (hard boot)?
Answer
-
It is the process of starting a computer from a powered-down or off state
-
It is the process of restarting a computer that is already turned on through the operating system
-
It is the process of shutting down a computer from a powered-on or on state
-
It is the process of restarting a computer that is already in sleep mode
Question 19
Question
When a file or folder is deleted, the complete path, including the original file name, is stored in a
special hidden file called "INF02" in the Recycled folder. If the INF02 file is deleted, it is re-created
when you___________.
Answer
-
Restart Windows
-
Kill the running processes in Windows task manager
-
Run the antivirus tool on the system
-
Run the anti-spyware tool on the system
Question 20
Question
WPA2 provides enterprise and Wi-Fi users with stronger data protection and network access
control which of the following encryption algorithm is used DVWPA2?
Answer
-
RC4-CCMP
-
RC4-TKIP
-
AES-CCMP
-
AES-TKIP
Question 21
Question
The disk in the disk drive rotates at high speed, and heads in the disk drive are used only to read
data.
Question 22
Question
What is a bit-stream copy?
Answer
-
Bit-Stream Copy is a bit-by-bit copy of the original storage medium and exact copy of the
original disk
-
A bit-stream image is the file that contains the NTFS files and folders of all the data on a disk or
partition
-
A bit-stream image is the file that contains the FAT32 files and folders of all the data on a disk
or partition
-
Creating a bit-stream image transfers only non-deleted files from the original disk to the image
disk
Question 23
Question
System software password cracking is defined as cracking the operating system and all other
utilities that enable a computer to function
Question 24
Question
Which of the following Steganography techniques allows you to encode information that ensures
creation of cover for secret communication?
Answer
-
Substitution techniques
-
Transform domain techniques
-
Cover generation techniques
-
Spread spectrum techniques
Question 25
Question
Ron. a computer forensics expert, Is Investigating a case involving corporate espionage. He has
recovered several mobile computing devices from the crime scene. One of the evidence that Ron
possesses is a mobile phone from Nokia that was left in on condition. Ron needs to recover the
IMEI number of the device to establish the identity of the device owner. Which of the following key
combinations he can use to recover the IMEI number?
Question 26
Question
Who is responsible for the following tasks?
Secure the scene and ensure that it is maintained In a secure state until the Forensic Team
advises
Make notes about the scene that will eventually be handed over to the Forensic Team
Question 27
Question
system with a simple logging mechanism has not been given much attention during
development, this system is now being targeted by attackers, if the attacker wants to perform a
new line injection attack, what will he/she inject into the log file?
Answer
-
Plaintext
-
Single pipe character
-
Multiple pipe characters
-
HTML tags
Question 28
Question
During the seizure of digital evidence, the suspect can be allowed touch the computer system.
Question 29
Question
Which of the following password cracking techniques works like a dictionary attack, but adds some
numbers and symbols to the words from the dictionary and tries to crack the password?
Answer
-
Brute forcing attack
-
Hybrid attack
-
Syllable attack
-
Rule-based attack
Question 30
Question
Consistency in the investigative report is more important than the exact format in the report to
eliminate uncertainty and confusion.
Question 31
Question
When dealing with the powered-off computers at the crime scene, if the computer is switched off,
turn it on
Question 32
Question
MAC filtering is a security access control methodology, where a ___________ is assigned to each
network card to determine access to the network
Answer
-
16-bit address
-
24-bit address
-
32-bit address
-
48-bit address
Question 33
Question
You can interact with the Registry through intermediate programs. Graphical user interface (GUI)
Registry editors such as Regedit.exe or Regedt32 exe are commonly used as intermediate
programs in Windows 7. Which of the following is a root folder of the registry editor?
Answer
-
HKEY_USERS
-
HKEY_LOCAL_ADMIN
-
HKEY_CLASSES_ADMIN
-
HKEY_CLASSES_SYSTEM
Question 34
Question
You have been given the task to investigate web attacks on a Windows-based server.
Which of the following commands will you use to look at which sessions the machine has opened
with other systems?
Answer
-
Net sessions
-
Net use
-
Net config
-
Net share
Question 35
Question
What is a SCSI (Small Computer System Interface)?
Answer
-
A set of ANSI standard electronic interfaces that allow personal computers to communicate with
peripheral hardware such as disk drives, tape drives. CD-ROM drives, printers, and scanners
-
A standard electronic interface used between a computer motherboard's data paths or bus and
the computer's disk storage devices
-
A "plug-and-play" interface, which allows a device to be added without an adapter card and
without rebooting the computer
-
A point-to-point serial bi-directional interface for transmitting data between computer devices at
data rates of up to 4 Gbps
Question 36
Question
The status of the network interface cards (NICs) connected to a system gives information about
whether the system is connected to a wireless access point and what IP address is being used. which command displays the network configuration of the NICs on the system?
Answer
-
ipconfig /all
-
netstat
-
net session
-
tasklist
Question 37
Question
Which Is a Linux journaling file system?
Question 38
Question
Which of the following steganography types hides the secret message in a specifically designed
pattern on the document that is unclear to the average reader?
Question 39
Question
Web applications provide an Interface between end users and web servers through a set of webpages that are generated at the server-end or contain script code to be executed dynamically within the client Web browser.
Question 40
Question
Jason, a renowned forensic investigator, is investigating a network attack that resulted in the
compromise of several systems in a reputed multinational's network. He started Wireshark to
capture the network traffic. Upon investigation, he found that the DNS packets travelling across
the network belonged to a non-company configured IP. Which of the following attack Jason can
infer from his findings?
Answer
-
DNS Poisoning
-
Cookie Poisoning Attack
-
DNS Redirection
-
Session poisoning
Question 41
Question
Which table is used to convert huge word lists (i .e. dictionary files and brute-force lists) into
password hashes
Answer
-
Rainbow tables
-
Hash tables
-
Master file tables
-
Database tables
Question 42
Question
Data acquisition system is a combination of tools or processes used to gather, analyze and record
Information about some phenomenon. Different data acquisition system are used depends on the
location, speed, cost. etc. Serial communication data acquisition system is used when the actual
location of the data is at some distance from the computer. Which of the following communication
standard is used in serial communication data acquisition system?
Question 43
Question
Which of the following statements is incorrect when preserving digital evidence?
Answer
-
Document the actions and changes that you observe in the monitor, computer, printer, or in
other peripherals
-
Verily if the monitor is in on, off, or in sleep mode
-
Remove the power cable depending on the power state of the computer i.e., in on. off, or in
sleep mode
-
Turn on the computer and extract Windows event viewer log files
Question 44
Question
Which of the following would you consider an aspect of organizational security, especially focusing
on IT security?
Question 45
Question
Which of the following approaches checks and compares all the fields systematically and
intentionally for positive and negative correlation with each other to determine the correlation
across one or multiple fields?
Question 46
Question
Log management includes all the processes and techniques used to collect, aggregate, and
analyze computer-generated log messages. It consists of the hardware, software, network and
media used to generate, transmit, store, analyze, and dispose of log data.
Question 47
Question
Data files from original evidence should be used for forensics analysis
Question 48
Question
Attackers can manipulate variables that reference files with "dot-dot-slash (./)" sequences and
their variations such as http://www.juggyDoy.corn/GET/process.php./././././././././etc/passwd.Identify the attack referred.
Answer
-
Directory traversal
-
SQL Injection
-
XSS attack
-
File injection
Question 49
Question
The Electronic Serial Number (ESN) is a unique __________ recorded on a secure chip in a
mobile phone by the manufacturer.
Answer
-
16-bit identifier
-
24-bit identifier
-
32-bit identifier
-
64-bit identifier
Question 50
Question
First response to an incident may involve three different groups of people, and each will have
differing skills and need to carry out differing tasks based on the incident. Who is responsible for
collecting, preserving, and packaging electronic evidence?
Question 51
Question
Task list command displays a list of applications and services with their Process ID (PID) for all
tasks running on either a local or a remote computer.
Which of the following task list commands provides information about the listed processes,
including the image name, PID, name, and number of the session for the process?
Answer
-
tasklist/s
-
tasklist/u
-
tasklist/p
-
tasklist/v
Question 52
Question
An expert witness is a witness, who by virtue of education, profession, or experience, is believed
to have special knowledge of his/her subject beyond that of the average person, sufficient that
others legally depend upon his/her opinion
Question 53
Question
P0P3 (Post Office Protocol 3) is a standard protocol for receiving email that deletes mail on the
server as soon as the user downloads it. When a message arrives, the POP3 server appends it to
the bottom of the recipient's account file, which can be retrieved by the email client at any
preferred time. Email client connects to the POP3 server at _______________by default to fetch
emails.
Answer
-
Port 109
-
Port 110
-
Port 115
-
Port 123
Question 54
Question
Windows Security Event Log contains records of login/logout activity or other security-related
events specified by the system's audit policy. What does event ID 531 in Windows Security Event
Log indicates?
Answer
-
A user successfully logged on to a computer
-
The logon attempt was made with an unknown user name or a known user name with a bad
password
-
An attempt was made to log on with the user account outside of the allowed time
-
A logon attempt was made using a disabled account
Question 55
Question
When collecting evidence from the RAM, where do you look for data?
Answer
-
Swap file
-
SAM file
-
Data file
-
Log file
Question 56
Question
A rogue/unauthorized access point is one that Is not authorized for operation by a particular firm or
network
Question 57
Question
Computer security logs contain information about the events occurring within an organization's
systems and networks. Application and Web server log files are useful in detecting web attacks.
The source, nature, and time of the attack can be determined by _________of the compromised
system.
Question 58
Question
Deposition enables opposing counsel to preview an expert witness's testimony at trial. Which of
the following deposition is not a standard practice?
Answer
-
Both attorneys are present
-
Only one attorneys is present
-
No jury or judge
-
Opposing counsel asks questions
Question 59
Question
Deposition enables opposing counsel to preview an expert witness's testimony at trial. Which of
the following deposition is not a standard practice?
Answer
-
Both attorneys are present
-
Only one attorneys is present
-
No jury or judge
-
Opposing counsel asks questions
Question 60
Question
If a file (readme.txt) on a hard disk has a size of 2600 bytes, how many sectors are normally
allocated to this file?
Answer
-
4 Sectors
-
5 Sectors
-
6 Sectors
-
7 Sectors
Question 61
Question
Recovery of the deleted partition is the process by which the investigator evaluates and extracts
the deleted partitions.
Question 62
Question
During first responder procedure you should follow all laws while collecting the evidence, and
contact a computer forensic examiner as soon as possible
Question 63
Question
Which one of the following is not a consideration in a forensic readiness planning checklist?
Answer
-
Define the business states that need digital evidence
-
Identify the potential evidence available
-
Decide the procedure for securely collecting the evidence that meets the requirement in a
forensically sound manner
-
Take permission from all employees of the organization
Question 64
Question
When collecting electronic evidence at the crime scene, the collection should proceed from the
most volatile to the least volatile
Question 65
Question
What is a chain of custody?
Answer
-
A legal document that demonstrates the progression of evidence as it travels from the original
evidence location to the forensic laboratory
-
It is a search warrant that is required for seizing evidence at a crime scene
-
It Is a document that lists chain of windows process events
-
Chain of custody refers to obtaining preemptive court order to restrict further damage of
evidence in electronic seizures
Question 66
Question
Data is striped at a byte level across multiple drives and parity information is distributed among all
member drives. What RAID level is represented here?
Answer
-
RAID Level0
-
RAID Level 1
-
RAID Level 3
-
RAID Level 5
Question 67
Question
Computer forensics report provides detailed information on complete computer forensics
investigation process. It should explain how the incident occurred, provide technical details of the
incident and should be clear to understand. Which of the following attributes of a forensics report
can render it inadmissible in a court of law?
Answer
-
It includes metadata about the incident
-
It includes relevant extracts referred to In the report that support analysis or conclusions
-
It is based on logical assumptions about the incident timeline
-
It maintains a single document style throughout the text
Question 68
Question
Email spoofing refers to:
Answer
-
The forgery of an email header so that the message appears to have originated from someone
or somewhere other than the actual source
-
The criminal act of sending an illegitimate email, falsely claiming to be from a legitimate site in
an attempt to acquire the user's personal or account information
-
Sending huge volumes of email to an address in an attempt to overflow the mailbox or
overwhelm the server where the email address Is hosted to cause a denial-of-service attack
-
A sudden spike of "Reply All" messages on an email distribution list, caused by one misdirected
message
Question 69
Question
Volatile information can be easily modified or lost when the system is shut down or rebooted. It helps to determine a logical timeline of the security incident and the users who would be
responsible.
Question 70
Question
A steganographic file system is a method to store the files in a way that encrypts and hides the
data without the knowledge of others
Question 71
Question
Which device in a wireless local area network (WLAN) determines the next network point to which
a packet should be forwarded toward its destination?
Answer
-
Wireless router
-
Wireless modem
-
Antenna
-
Mobile station
Question 72
Question
Data Acquisition is the process of imaging or otherwise obtaining information from a digital device
and its peripheral equipment and media
Question 73
Question
LBA (Logical Block Address) addresses data by allotting a ___________to each sector of the hard
disk.
Answer
-
Sequential number
-
Index number
-
Operating system number
-
Sector number
Question 74
Question
Buffer Overflow occurs when an application writes more data to a block of memory, or buffer, than
the buffer is allocated to hold. Buffer overflow attacks allow an attacker to modify the
_______________in order to control the process execution, crash the process and modify internal
variables.
Question 75
Question
Physical security recommendations: There should be only one entrance to a forensics lab
Question 76
Question
File signature analysis involves collecting information from the __________ of a file to determine
the type and function of the file
Answer
-
First 10 bytes
-
First 20 bytes
-
First 30 bytes
-
First 40 bytes
Question 77
Question
You should always work with original evidence
Question 78
Question
When a system is compromised, attackers often try to disable auditing, in Windows 7;
modifications to the audit policy are recorded as entries of Event ID____________.
Question 79
Question
Which of the following network attacks refers to sending huge volumes of email to an address in
an attempt to overflow the mailbox, or overwhelm the server where the email address is hosted, to
cause a denial-of-service attack?
Answer
-
Email spamming
-
Mail bombing
-
Phishing
-
Email spoofing
Question 80
Question
Which of the following file in Novel GroupWise stores information about user accounts?
Answer
-
ngwguard.db
-
gwcheck.db
-
PRIV.EDB
-
PRIV.STM
Question 81
Question
Digital evidence is not fragile in nature
Question 82
Question
Which of the following log injection attacks uses white space padding to create unusual log
entries?
Question 83
Question
Which of the following is not correct when documenting an electronic crime scene?
Answer
-
Document the physical scene, such as the position of the mouse and the location of
components near the system
-
Document related electronic components that are difficult to find
-
Record the condition of the computer system, storage media, electronic devices and
conventional evidence, including power status of the computer
-
Write down the color of shirt and pant the suspect was wearing
Question 84
Question
Under no circumstances should anyone, with the exception of qualified computer forensics
personnel, make any attempts to restore or recover information from a computer system or device
that holds electronic information.
Question 85
Question
Syslog is a client/server protocol standard for forwarding log messages across an IP network.
Syslog uses ___________to transfer log messages in a clear text format
Question 86
Question
An image is an artifact that reproduces the likeness of some subject. These are produced by
optical devices (i.e. cameras, mirrors, lenses, telescopes, and microscopes).
Which property of the image shows you the number of colors available for each pixel in an image?
Answer
-
Pixel
-
Bit Depth
-
File Formats
-
Image File Size
Question 87
Question
Which of the following statements is incorrect related to acquiring electronic evidence at crime
scene?
Answer
-
Sample banners are used to record the system activities when used by the unauthorized user
-
In warning banners, organizations give clear and unequivocal notice to intruders that by signing onto the system they are expressly consenting to such monitoring
-
The equipment is seized which is connected to the case, knowing the role of the computer
which will indicate what should be taken
-
At the time of seizing process, you need to shut down the computer immediately
Question 88
Question
Depending upon the Jurisdictional areas, different laws apply to different incidents. Which of the
following law is related to fraud and related activity in connection with computers?
Answer
-
18 USC 7029
-
18 USC 7030
-
18 USC 7361
-
18 USC 7371
Question 89
Question
Which of the following is not a part of the technical specification of the laboratory-based imaging
system?
Answer
-
High performance workstation PC
-
Remote preview and imaging pod
-
Anti-repudiation techniques
-
very low image capture rate
Question 90
Question
Which of the following is not a part of data acquisition forensics Investigation?
Answer
-
Permit only authorized personnel to access
-
Protect the evidence from extremes in temperature
-
Work on the original storage medium not on the duplicated copy
-
Disable all remote access to the system
Question 91
Question
At the time of evidence transfer, both sender and receiver need to give the information about date
and time of transfer in the chain of custody record
Question 92
Question
Digital photography helps in correcting the perspective of the Image which Is used In taking the
measurements of the evidence. Snapshots of the evidence and incident-prone areas need to be
taken to help in the forensic process. Is digital photography accepted as evidence in the court of
law?
Question 93
Question
Computer security logs contain information about the events occurring within an organization's
systems and networks. Which of the following security logs contains Logs of network and hostbased
security software?
Question 94
Question
What is the "Best Evidence Rule"?
Answer
-
It states that the court only allows the original evidence of a document, photograph, or
recording at the trial rather than a copy
-
It contains system time, logged-on user(s), open files, network information, process information,
process-to-port mapping, process memory, clipboard contents, service/driver information, and
command history
-
It contains hidden files, slack space, swap file, index.dat files, unallocated clusters, unused
partitions, hidden partitions, registry settings, and event logs
-
It contains information such as open network connection, user logout, programs that reside in
memory, and cache data
Question 95
Question
SIM is a removable component that contains essential information about the subscriber. It has
both volatile and non-volatile memory. The file system of a SIM resides in _____________
memory.
Question 96
Question
Which of the following passwords are sent over the wire (and wireless) network, or stored on some
media as it is typed without any alteration?
Answer
-
Clear text passwords
-
Obfuscated passwords
-
Hashed passwords
-
Hex passwords
Question 97
Question
In Windows 7 system files, which file reads the Boot.ini file and loads Ntoskrnl.exe. Bootvid.dll.
Hal.dll, and boot-start device drivers?
Answer
-
Ntldr
-
Gdi32.dll
-
Kernel32.dll
-
Boot.in
Question 98
Question
Networks are vulnerable to an attack which occurs due to overextension of bandwidth,
bottlenecks, network data interception, etc.
Which of the following network attacks refers to a process in which an attacker changes his or her
IP address so that he or she appears to be someone else?
Answer
-
IP address spoofing
-
Man-in-the-middle attack
-
Denial of Service attack
-
Session sniffing
Question 99
Question
In an echo data hiding technique, the secret message is embedded into a __________as an echo.
Question 100
Question
Attacker uses vulnerabilities in the authentication or session management functions such as
exposed accounts, session IDs, logout, password management, timeouts, remember me. secret
question, account update etc. to impersonate users, if a user simply closes the browser without
logging out from sites accessed through a public computer, attacker can use the same browser
later and exploit the user's privileges. Which of the following vulnerability/exploitation is referred
above?
Answer
-
Session ID in URLs
-
Timeout Exploitation
-
I/O exploitation
-
Password Exploitation
Question 101
Question
An Internet standard protocol (built on top of TCP/IP) that assures accurate synchronization to the
millisecond of computer clock times in a network of computers. Which of the following statement is
true for NTP Stratum Levels?
Answer
-
Stratum-0 servers are used on the network; they are not directly connected to computers which
then operate as stratum-1 servers
-
Stratum-1 time server is linked over a network path to a reliable source of UTC time such as GPS, WWV, or CDMA transmissions
-
A stratum-2 server is directly linked (not over a network path) to a reliable source of UTC time
such as GPS, WWV, or CDMA transmissions
-
A stratum-3 server gets its time over a network link, via NTP, from a stratum-2 server, and so
on
Question 102
Question
Which is not a part of environmental conditions of a forensics lab?
Answer
-
Large dimensions of the room
-
Good cooling system to overcome excess heat generated by the work station
-
Allocation of workstations as per the room dimensions
-
Open windows facing the public road
Question 103
Question
Graphics Interchange Format (GIF) is a ___________RGB bitmap Image format for Images with
up to 256 distinct colors per frame
Answer
-
8-bit
-
16-bit
-
24-bit
-
32-bit
Question 104
Question
Cyber-crime is defined as any Illegal act involving a gun, ammunition, or its applications.
Question 105
Question
In what circumstances would you conduct searches without a warrant?
Answer
-
When destruction of evidence is imminent, a warrantless seizure of that evidence is justified if
there is probable cause to believe that the item seized constitutes evidence of criminal activity
-
Agents may search a place or object without a warrant if he suspect the crime was committed
-
A search warrant is not required if the crime involves Denial-Of-Service attack over the Internet
-
Law enforcement agencies located in California under section SB 567 are authorized to seize
computers without warrant under all circumstances
Question 106
Question
A computer forensic report is a report which provides detailed information on the complete
forensics investigation process.
Question 107
Question
Data compression involves encoding the data to take up less storage space and less bandwidth
for transmission. It helps in saving cost and high data manipulation in many business applications.
Which data compression technique maintains data integrity?
Question 108
Question
First responder is a person who arrives first at the crime scene and accesses the victim's
computer system after the incident. He or She is responsible for protecting, integrating, and
preserving the evidence obtained from the crime scene.
Which of the following is not a role of first responder?
Answer
-
Identify and analyze the crime scene
-
Protect and secure the crime scene
-
Package and transport the electronic evidence to forensics lab
-
Prosecute the suspect in court of law
Question 109
Question
Hash injection attack allows attackers to inject a compromised hash into a local session and use
the hash to validate network resources.
Question 110
Question
Smith, as a part his forensic investigation assignment, has seized a mobile device. He was asked to recover the Subscriber Identity Module (SIM card) data the mobile device. Smith found that the
SIM was protected by a Personal identification Number (PIN) code but he was also aware that
people generally leave the PIN numbers to the defaults or use easily guessable numbers such as
1234. He unsuccessfully tried three PIN numbers that blocked the SIM card. What Jason can do in
this scenario to reset the PIN and access SIM data
Answer
-
He should contact the device manufacturer for a Temporary Unlock Code (TUK) to gain access
to the SIM
-
He cannot access the SIM data in this scenario as the network operators or device
manufacturers have no idea about a device PIN
-
He should again attempt PIN guesses after a time of 24 hours
-
He should ask the network operator for Personal Unlock Number (PUK) to gain access to the
SIM
Question 111
Question
Centralized logging is defined as gathering the computer system logs for a group of systems in a
centralized location. It is used to efficiently monitor computer system logs with the frequency
required to detect security violations and unusual activity
Question 112
Question
Centralized logging is defined as gathering the computer system logs for a group of systems in a
centralized location. It is used to efficiently monitor computer system logs with the frequency
required to detect security violations and unusual activity.
Question 113
Question
A swap file is a space on a hard disk used as the virtual memory extension of a computer's RAM.
Where is the hidden swap file in Windows located?
Answer
-
C:\pagefile.sys
-
C:\hiberfil.sys
-
C:\config.sys
-
C:\ALCSetup.log
Question 114
Question
Which of the following reports are delivered under oath to a board of directors/managers/panel of
jury?
Answer
-
Written informal Report
-
Verbal Formal Report
-
Written Formal Report
-
Verbal Informal Report
Question 115
Question
Dumpster Diving refers to:
Answer
-
Searching for sensitive information in the user's trash bins and printer trash bins, and searching
the user's desk for sticky notes
-
Looking at either the user's keyboard or screen while he/she is logging in
-
Convincing people to reveal the confidential information
-
Creating a set of dictionary words and names, and trying all the possible combinations to crack
the password
Question 116
Question
if the partition size Is 4 GB, each cluster will be 32 K. Even If a file needs only 10 K, the entire 32
K will be allocated, resulting In 22 K of
Answer
-
Slack space
-
Deleted space
-
Cluster space
-
Sector space
Question 117
Question
Which of the following Wi-Fi chalking methods refers to drawing symbols in public places to
advertise open Wi-Fi networks
Answer
-
WarWalking
-
WarFlying
-
WarChalking
-
WarDhving
Question 118
Question
Steganography is a technique of hiding a secret message within an ordinary message and
extracting it at the destination to maintain the confidentiality of data.
Question 119
Question
Identify the attack from following sequence of actions?
Step 1: A user logs in to a trusted site and creates a new session
Step 2: The trusted site stores a session identifier for the session in a cookie in the web browser
Step 3: The user is tricked to visit a malicious site
Step 4: the malicious site sends a request from the user's browser using his session cookie
Answer
-
Web Application Denial-of-Service (DoS) Attack
-
Cross-Site Scripting (XSS) Attacks
-
Cross-Site Request Forgery (CSRF) Attack
-
Hidden Field Manipulation Attack
Question 120
Question
Router log files provide detailed Information about the network traffic on the Internet. It gives
information about the attacks to and from the networks. The router stores log files in
the____________.
Answer
-
Router cache
-
Application logs
-
IDS logs
-
Audit logs
Question 121
Question
The Recycle Bin is located on the Windows desktop. When you delete an item from the hard disk,
Windows sends that deleted item to the Recycle Bin and the icon changes to full from empty, but
items deleted from removable media, such as a floppy disk or network drive, are not stored in the
Recycle Bin.
What is the size limit for Recycle Bin in Vista and later versions of the Windows?
Answer
-
No size limit
-
Maximum of 3.99 GB
-
Maximum of 4.99 GB
-
Maximum of 5.99 GB
Question 122
Question
Which of the following is not an example of a cyber-crime?
Answer
-
Fraud achieved by the manipulation of the computer records
-
Firing an employee for misconduct
-
Deliberate circumvention of the computer security systems
-
Intellectual property theft, including software piracy
Question 123
Question
Files stored in the Recycle Bin in its physical location are renamed as Dxy.ext, where, “X”
represents the _________.
Question 124
Question
Which of the following statement is not correct when dealing with a powered-on computer at the
crime scene?
Answer
-
If a computer is switched on and the screen is viewable, record the programs running on screen
and photograph the screen
-
If a computer is on and the monitor shows some picture or screen saver, move the mouse
slowly without depressing any mouse button and take a photograph of the screen and record the
information displayed
-
If a monitor is powered on and the display is blank, move the mouse slowly without depressing
any mouse button and take a photograph
-
If the computer is switched off. power on the computer to take screenshot of the desktop
Question 125
Question
Tracks numbering on a hard disk begins at 0 from the outer edge and moves towards the center,
typically reaching a value of ___________.
Question 126
Question
Event correlation is a procedure that is assigned with a new meaning for a set of events that occur
in a predefined interval of time.
Which type of correlation will you use if your organization wants to use different OS and network
hardware platforms throughout the network?
Answer
-
Same-platform correlation
-
Cross-platform correlation
-
Multiple-platform correlation
-
Network-platform correlation
Question 127
Question
Which root folder (hive) of registry editor contains a vast array of configuration information for the
system, including hardware settings and software settings?
Answer
-
HKEY_USERS
-
HKEY_CURRENT_USER
-
HKEY_LOCAL_MACHINE
-
HKEY-CURRENT_CONFIG
Question 128
Question
Hard disk data addressing is a method of allotting addresses to each ___________of data on a
hard disk
Answer
-
Physical block
-
Logical block
-
Operating system block
-
Hard disk block
Question 129
Question
How do you define forensic computing?
Answer
-
It is the science of capturing, processing, and investigating data security incidents and making it
acceptable to a court of law.
-
It is a methodology of guidelines that deals with the process of cyber investigation
-
It Is a preliminary and mandatory course necessary to pursue and understand fundamental
principles of ethical hacking
-
It is the administrative and legal proceeding in the process of forensic investigation
Question 130
Question
What is the smallest allocation unit of a hard disk?
Answer
-
Cluster
-
Spinning tracks
-
Disk platters
-
Slack space
Question 131
Question
Which one of the following statements is not correct while preparing for testimony?
Answer
-
Go through the documentation thoroughly
-
Do not determine the basic facts of the case before beginning and examining the evidence
-
Establish early communication with the attorney
-
Substantiate the findings with documentation and by collaborating with other computer
forensics professionals
Question 132
Question
Which of the following statements is not a part of securing and evaluating electronic crime scene
checklist
Answer
-
Locate and help the victim
-
Transmit additional flash messages to other responding units
-
Request additional help at the scene if needed
-
Blog about the incident on the internet
Question 133
Question
The Apache server saves diagnostic information and error messages that it encounters while
processing requests. The default path of this file is usr/local/apache/logs/error.log in Linux. Identify
the Apache error log from the following logs.
Answer
-
127.0.0.1 - frank [10/Oct/2000:13:55:36-0700] "GET /apache_pb.grf HTTP/1.0" 200 2326
-
[Wed Oct 11 14:32:52 2000] [error] [client 127.0.0.1] client denied by server configuration:
/export/home/live/ap/htdocs/test
-
http://victim.com/scripts/..%c0%af./..%c0%af./..%c0%af./..%c0%af./..%c0%af./..%c0%af./..%c0%af
./..%c0%af./../winnt/system32/cmd.exe?/c+di r+c:\wintt\system32\Logfiles\W3SVC1
-
127.0.0.1 --[10/Apr/2007:10:39:11 +0300] ] [error] "GET /apache_pb.gif HTTP/1.0' 200 2326
Question 134
Question
Operating System logs are most beneficial for Identifying or Investigating suspicious activities
involving a particular host. Which of the following Operating System logs contains information
about operational actions performed by OS components
Answer
-
Event logs
-
Audit logs
-
Firewall logs
-
IDS logs
Question 135
Question
A mobile operating system manages communication between the mobile device and other
compatible devices like computers, televisions, or printers. Which mobile operating system architecture is represented here
Question 136
Question
All the Information about the user activity on the network, like details about login and logoff
attempts, is collected in the security log of the computer. When a user's login is successful,
successful audits generate an entry whereas unsuccessful audits generate an entry for failed login
attempts in the logon event ID table.
In the logon event ID table, which event ID entry (number) represents a successful logging on to a
computer?
Question 137
Question
What is the first step that needs to be carried out to investigate wireless attacks?
Answer
-
Obtain a search warrant
-
Identify wireless devices at crime scene
-
Document the scene and maintain a chain of custody
-
Detect the wireless connections
Question 138
Question
Which of the following commands shows you the username and IP address used to access the
system via a remote login session and the Type of client from which they are accessing the
system
Answer
-
Net sessions
-
Net file
-
Net config
-
Net share
Question 139
Question
SMTP (Simple Mail Transfer protocol) receives outgoing mail from clients and validates source
and destination addresses, and also sends and receives emails to and from other SMTP servers.
Question 140
Question
Which of the following commands shows you the username and IP address used to access the
system via a remote login session and the Type of client from which they are accessing the
system?
Answer
-
Net sessions
-
Net file
-
Net config
-
Net share
Question 141
Question
SMTP (Simple Mail Transfer protocol) receives outgoing mail from clients and validates source
and destination addresses, and also sends and receives emails to and from other SMTP servers.
Question 142
Question
Why is it Important to consider health and safety factors in the work carried out at all stages of the
forensic process conducted by the forensic analysts?
Answer
-
This is to protect the staff and preserve any fingerprints that may need to be recovered at a
later date
-
All forensic teams should wear protective latex gloves which makes them look professional and
cool
-
Local law enforcement agencies compel them to wear latest gloves
-
It is a part of ANSI 346 forensics standard
Question 143
Question
When NTFS Is formatted, the format program assigns the __________ sectors to the boot sectors
and to the bootstrap code
Answer
-
First 12
-
First 16
-
First 22
-
First 24
Question 144
Question
What is the goal of forensic science?
Answer
-
To determine the evidential value of the crime scene and related evidence
-
Mitigate the effects of the information security breach
-
Save the good will of the investigating organization
-
It is a disciple to deal with the legal processes
Question 145
Question
Smith, an employee of a reputed forensic Investigation firm, has been hired by a private
organization to investigate a laptop that is suspected to be involved in hacking of organization DC
server. Smith wants to find all the values typed into the Run box in the Start menu. Which of the
following registry key Smith will check to find the above information?
Answer
-
UserAssist Key
-
MountedDevices key
-
RunMRU key
-
TypedURLs key
Question 146
Question
Shortcuts are the files with the extension .Ink that are created and are accessed by the users.
These files provide you with information about:
Answer
-
Files or network shares
-
Running application
-
Application logs
-
System logs
Question 147
Question
When the operating system marks cluster as used, but does not allocate them to any file, such
clusters are known as ___________
Answer
-
Lost clusters
-
Bad clusters
-
Empty clusters
-
Unused clusters
Question 148
Question
Quality of a raster Image is determined by the _________________and the amount of information
in each pixel
Answer
-
Total number of pixels
-
image file format
-
Compression method
-
Image file size
Question 149
Question
What is the first step that needs to be carried out to crack the password?
Answer
-
A word list is created using a dictionary generator program or dictionaries
-
The list of dictionary words is hashed or encrypted
-
The hashed wordlist is compared against the target hashed password, generally one word at a
time
-
If it matches, that password has been cracked and the password cracker displays the
unencrypted version of the password
Question 150
Question
Which wireless standard has bandwidth up to 54 Mbps and signals in a regulated frequency
spectrum around 5 GHz?
Answer
-
802.11a
-
802.11b
-
802.11g
-
802.11i
Question 151
Question
According to US federal rules, to present a testimony in a court of law, an expert witness needs to
furnish certain information to prove his eligibility. Jason, a qualified computer forensic expert who
has started practicing two years back, was denied an expert testimony in a computer crime case
by the US Court of Appeals for the Fourth Circuit in Richmond, Virginia. Considering the US
federal rules, what could be the most appropriate reason for the court to reject Jason's eligibility as
an expert witness?
Answer
-
Jason was unable to furnish documents showing four years of previous experience in the field
-
Being a computer forensic expert, Jason is not eligible to present testimony in a computer crime
case
-
Jason was unable to furnish documents to prove that he is a computer forensic expert
-
Jason was not aware of legal issues involved with computer crimes
Question 152
Question
Ever-changing advancement or mobile devices increases the complexity of mobile device
examinations. Which or the following is an appropriate action for the mobile forensic investigation?
Answer
-
To avoid unwanted interaction with devices found on the scene, turn on any wireless interfaces
such as Bluetooth and Wi-Fi radios
-
Do not wear gloves while handling cell phone evidence to maintain integrity of physical
evidence
-
If the device's display is ON. the screen's contents should be photographed and, if necessary,
recorded manually, capturing the time, service status, battery level, and other displayed icons
-
If the phone is in a cradle or connected to a PC with a cable, then unplug the device from the
computer
Question 153
Question
What is static executable file analysis?
Answer
-
It is a process that consists of collecting information about and from an executable file without
actually launching the file under any circumstances
-
It is a process that consists of collecting information about and from an executable file by
launching the file under any circumstances
-
It is a process that consists of collecting information about and from an executable file without
actually launching an executable file in a controlled and monitored environment
-
It is a process that consists of collecting information about and from an executable file by
launching an executable file in a controlled and monitored environment
Question 154
Question
The need for computer forensics is highlighted by an exponential increase in the number of
cybercrimes and litigations where large organizations were involved. Computer forensics plays an
important role in tracking the cyber criminals. The main role of computer forensics is to:
Answer
-
Maximize the investigative potential by maximizing the costs
-
Harden organization perimeter security
-
Document monitoring processes of employees of the organization
-
Extract, process, and interpret the factual evidence so that it proves the attacker's actions in the
court
Question 155
Question
Mobile phone forensics is the science of recovering digital evidence from a mobile phone under
forensically sound conditions.
Question 156
Question
An attack vector is a path or means by which an attacker can gain access to computer or network
resources in order to deliver an attack payload or cause a malicious outcome.
Question 157
Question
How do you define Technical Steganography?
Answer
-
Steganography that uses physical or chemical means to hide the existence of a message
-
Steganography that utilizes written natural language to hide the message in the carrier in some
non-obvious ways
-
Steganography that utilizes written JAVA language to hide the message in the carrier in some
non-obvious ways
-
Steganography that utilizes visual symbols or signs to hide secret messages
Question 158
Question
Which of the following is not a part of disk imaging tool requirements?
Answer
-
The tool should not change the original content
-
The tool should log I/O errors in an accessible and readable form, including the type and
location of the error
-
The tool must have the ability to be held up to scientific and peer review
-
The tool should not compute a hash value for the complete bit stream copy generated from an
image file of the source
Question 159
Question
A forensic investigator is a person who handles the complete Investigation process, that is, the
preservation, identification, extraction, and documentation of the evidence. The investigator has
many roles and responsibilities relating to the cybercrime analysis. The role of the forensic
investigator is to:
Answer
-
Take permission from all employees of the organization for investigation
-
Harden organization network security
-
Create an image backup of the original evidence without tampering with potential evidence
-
Keep the evidence a highly confidential and hide the evidence from law enforcement agencies
Question 160
Question
What document does the screenshot represent?
Answer
-
Chain of custody form
-
Search warrant form
-
Evidence collection form
-
Expert witness form
Question 161
Question
Which of the following standard is based on a legal precedent regarding the admissibility of
scientific examinations or experiments in legal cases?
Answer
-
Daubert Standard
-
Schneiderman Standard
-
Frye Standard
-
FERPA standard
Question 162
Question
Wi-Fi Protected Access (WPA) is a data encryption method for WLANs based on 802.11
standards. Temporal Key Integrity Protocol (TKIP) enhances WEP by adding a rekeying
mechanism to provide fresh encryption and integrity keys. Temporal keys are changed for
every____________.
Answer
-
5,000 packets
-
10.000 packets
-
15,000 packets
-
20.000 packets
Question 163
Question
Billy, a computer forensics expert, has recovered a large number of DBX files during forensic investigation of a laptop. Which of the following email clients he can use to analyze the DBX files?
Question 164
Question
Which of the following is the certifying body of forensics labs that investigate criminal cases by
analyzing evidence?
Answer
-
The American Society of Crime Laboratory Directors (ASCLD)
-
International Society of Forensics Laboratory (ISFL)
-
The American Forensics Laboratory Society (AFLS)
-
The American Forensics Laboratory for Computer Forensics (AFLCF)
Question 165
Question
Which of the following attacks allows an attacker to access restricted directories, including
application source code, configuration and critical system files, and to execute commands outside
of the web server's root directory?
Question 166
Question
Raw data acquisition format creates ____________of a data set or suspect drive.
Question 167
Question
JPEG is a commonly used method of compressing photographic Images. It uses a compression
algorithm to minimize the size of the natural image, without affecting the quality of the image. The
JPEG lossy algorithm divides the image in separate blocks of____________.
Answer
-
4x4 pixels
-
8x8 pixels
-
16x16 pixels
-
32x32 pixels
Question 168
Question
Which of the following attacks allows attacker to acquire access to the communication channels
between the victim and server to extract the information?
Question 169
Question
Injection flaws are web application vulnerabilities that allow untrusted data to be Interpreted and
executed as part of a command or query. Attackers exploit injection flaws by constructing
malicious commands or queries that result in data loss or corruption, lack of accountability, or
denial of access. Which of the following injection flaws involves the injection of malicious code
through a web application?
Answer
-
SQL Injection
-
password brute force
-
Nmap Scanning
-
Footprinting
Question 170
Question
What is a first sector ("sector zero") of a hard disk?
Answer
-
Master boot record
-
System boot record
-
Secondary boot record
-
Hard disk boot record
Question 171
Question
Microsoft Security IDs are available in Windows Registry Editor. The path to locate IDs in
Windows 7 is:
Answer
-
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\Currentversion \ProfileList
-
HKEY_LOCAL_MACHlNE\SOFTWARE\Microsoft\Windows NT\CurrentVersion \NetworkList
-
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentsVersion \setup
-
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule
Question 172
Question
Netstat is a tool for collecting Information regarding network connections. It provides a simple view
of TCP and UDP connections, and their state and network traffic statistics.
Which of the following commands shows you the TCP and UDP network connections, listening
ports, and the identifiers?
Answer
-
netstat ?ano
-
netstat ?b
-
netstat ?r
-
netstat ?s
Question 173
Question
International Mobile Equipment Identifier (IMEI) is a 15-dlgit number that indicates the
manufacturer, model type, and country of approval for GSM devices. The first eight digits of an
IMEI number that provide information about the model and origin of the mobile device is also
known as:
Answer
-
Type Allocation Code (TAC)
-
Device Origin Code (DOC)
-
Manufacturer identification Code (MIC)
-
Integrated Circuit Code (ICC)
Question 174
Question
The IIS log file format is a fixed (cannot be customized) ASCII text-based format. The IIS format
includes basic items, such as client IP address, user name, date and time, service and instance,
server name and IP address, request type, target of operation, etc. Identify the service status code
from the following IIS log.
192.168.100.150, -, 03/6/11, 8:45:30, W3SVC2, SERVER, 172.15.10.30, 4210, 125, 3524, 100, 0,
GET, /dollerlogo.gif,
Question 175
Question
The evolution of web services and their increasing use in business offers new attack vectors in an
application framework. Web services are based on XML protocols such as web Services Definition
Language (WSDL) for describing the connection points, Universal Description, Discovery, and
Integration (UDDI) for the description and discovery of Web services and Simple Object Access
Protocol (SOAP) for communication between Web services that are vulnerable to various web
application threats. Which of the following layer in web services stack is vulnerable to fault code
leaks?
Answer
-
Presentation Layer
-
Security Layer
-
Discovery Layer
-
Access Layer
Question 176
Question
A mobile operating system is the operating system that operates a mobile device like a mobile
phone, smartphone, PDA, etc. It determines the functions and features available on mobile
devices such as keyboards, applications, email, text messaging, etc. Which of the following mobile
operating systems is free and open source?
Answer
-
Web OS
-
Android
-
Apple IOS
-
Symbian OS
Question 177
Question
Digital evidence validation involves using a hashing algorithm utility to create a binary or
hexadecimal number that represents the uniqueness of a data set, such as a disk drive or file.
Which of the following hash algorithms produces a message digest that is 128 bits long?
Question 178
Question
An intrusion detection system (IDS) gathers and analyzes information from within a computer or a
network to identify any possible violations of security policy, including unauthorized access, as well
as misuse.
Which of the following intrusion detection systems audit events that occur on a specific host?
Question 179
Question
Wireless network discovery tools use two different methodologies to detect, monitor and log a
WLAN device (i.e. active scanning and passive scanning). Active scanning methodology involves
____________and waiting for responses from available wireless networks.
Answer
-
Broadcasting a probe request frame
-
Sniffing the packets from the airwave
-
Scanning the network
-
Inspecting WLAN and surrounding networks
Question 180
Question
Damaged portions of a disk on which no read/Write operation can be performed is known as
Answer
-
Lost sector
-
Bad sector
-
Empty sector
-
Unused sector
Question 181
Question
BMP (Bitmap) is a standard file format for computers running the Windows operating system. BMP
images can range from black and white (1 bit per pixel) up to 24 bit color (16.7 million colors).
Each bitmap file contains header, the RGBQUAD array, information header, and image data.
Which of the following element specifies the dimensions, compression type, and color format for
the bitmap?
Answer
-
Header
-
The RGBQUAD array
-
Information header
-
Image data