{ "dataset": "DFIR-Metric Dataset (Module I MCQ challenges)", "authors": "Bilel Cherif, Aaesha Aldahmani, Saeed Alshehhi, Tamas Bisztray, Richard A. Dubniczky, and Norbert Tihanyi", "sources": "https://github.com/DFIR-Metric", "number_of_questions": 713, "questions": [ { "question": "You work as a penetration tester for Hammond Security Consultants. You are currently working on a contract for the state government of California. Your next step is to initiate a DoS attack on their network. Why would you want to initiate a DoS attack on a system you are testing?", "options": { "A": "Demonstrate that no system can be protected against DoS attacks", "B": "List weak points on their network", "C": "Use attack as a launching point to penetrate deeper into the network", "D": "Show outdated equipment so it can be replaced" }, "answer": "B" }, { "question": "What will the following command produce on a website login page? SELECT email, passwd, login\\_id, full\\_name FROM members WHERE email = 'someone@somehwere.com'; DROP TABLE members; --'", "options": { "A": "Retrieves the password for the first user in the members table", "B": "Deletes the entire members table", "C": "This command will not produce anything since the syntax is incorrect", "D": "Inserts the Error! Reference source not found.email address into the members table" }, "answer": "B" }, { "question": "What is the first step that needs to be carried out to crack the password?", "options": { "A": "If it matches, that password has been cracked and the password cracker displays the unencrypted version of the password", "B": "The list of dictionary words is hashed or encrypted", "C": "The hashed wordlist is compared against the target hashed password, generally one word at a time", "D": "A word list is created using a dictionary generator program or dictionaries" }, "answer": "D" }, { "question": "What does the 'Prefetch' folder in Windows store?", "options": { "A": "Temporary internet files", "B": "System restore points", "C": "Application execution information", "D": "User documents" }, "answer": "C" }, { "question": "Which of the following statement is not correct when dealing with a powered-on computer at the crime scene?", "options": { "A": "If a computer is on and the monitor shows some picture or screen saver, move the mouse slowly without depressing any mouse button and take a photograph of the screen and record the information displayed", "B": "If the computer is switched off, power on the computer to take screenshot of the desktop", "C": "If a monitor is powered on and the display is blank, move the mouse slowly without depressing any mouse button and take a photograph", "D": "If a computer is switched on and the screen is viewable, record the programs running on screen and photograph the screen" }, "answer": "B" }, { "question": "Which one of the following is not a consideration in a forensic readiness planning checklist?", "options": { "A": "Decide the procedure for securely collecting the evidence that meets the requirement in a forensically sound manner", "B": "Take permission from all employees of the organization", "C": "Identify the potential evidence available", "D": "Define the business states that need digital evidence" }, "answer": "B" }, { "question": "You are a Penetration Tester and are assigned to scan a server. You need to use a scanning technique wherein the TCP Header is split into many packets so it becomes difficult to detect what the packets are meant for. Which of the below scanning technique will you use?", "options": { "A": "IP Fragment Scanning", "B": "Inverse TCP flag scanning", "C": "TCP Scanning", "D": "ACK flag scanning" }, "answer": "A" }, { "question": "Casey has acquired data from a hard disk in an open source acquisition format that allows her to generate compressed or uncompressed image files. What format did she use?", "options": { "A": "Proprietary Format", "B": "Advanced Forensics Format (AFF)", "C": "Raw Format", "D": "Portable Document Format" }, "answer": "B" }, { "question": "Computer security logs contain information about the events occurring within an organization's systems and networks. Which of the following security log Logs of network and host-based security software?", "options": { "A": "Application logs", "B": "Audit logs", "C": "Security software logs", "D": "Operating System (OS) logs" }, "answer": "C" }, { "question": "A picture file is recovered from a computer under investigation. During the investigation process, the file is enlarged 500% to get a better view of its contents. The picture quality is not degraded at all from this process. What kind of picture is this file. What kind of picture is this file?", "options": { "A": "Catalog image", "B": "Metafile image", "C": "Vector image", "D": "Raster image" }, "answer": "C" }, { "question": "What does the 'DCO' in hard drive forensics refer to?", "options": { "A": "Data Collection Order", "B": "Digital Chain of Ownership", "C": "Disk Copy Operation", "D": "Device Configuration Overlay" }, "answer": "D" }, { "question": "Which of the following is NOT a physical evidence?", "options": { "A": "Removable media", "B": "Pendrive", "C": "Publications", "D": "Cables" }, "answer": "C" }, { "question": "Melanie was newly assigned to an investigation and asked to make a copy of all the evidence from the compromised system. Melanie did a DOS copy of all the files on the system. What would be the primary reason for you to recommend a disk imaging tool?", "options": { "A": "A simple DOS copy will not include deleted files, file slack and other information", "B": "Evidence file format will contain case data entered by the examiner and encrypted at the beginning of the evidence file", "C": "A disk imaging tool would check for CRC32s for internal self checking and validation and have MD5 checksum", "D": "There is no case for an imaging tool as it will use a closed, proprietary format that if compared to the original will not match up sector for sector" }, "answer": "A" }, { "question": "When examining a hard disk without a write-blocker, you should not start windows because Windows will write data to the:", "options": { "A": "BIOS", "B": "Recycle Bin", "C": "MSDOS.sys", "D": "Case files" }, "answer": "B" }, { "question": "Data compression involves encoding the data to take up less storage space and less bandwidth for transmission. It helps in saving cost and high data manipulation in many business applications. Which data compression technique maintains data integrity?", "options": { "A": "Lossy compression", "B": "Speech encoding compression", "C": "Lossless compression", "D": "Lossy video compression" }, "answer": "C" }, { "question": "Norbert is testing the ability of his routers to withstand DoS attacks. Norbert sends ICMP ECHO requests to the broadcast address of his network. What type attack is Norbert testing against his network?", "options": { "A": "SYN flood", "B": "Fraggle", "C": "Smurf", "D": "Trinoo" }, "answer": "C" }, { "question": "Travis, a computer forensics investigator, is finishing up a case he has been working on for over a month involving copyright infringement and embezzlement. His last task is to prepare an investigative report for the president of the company he has been working for. Travis must submit a hard copy and an electronic copy to this president. In what electronic format should Travis send this report?", "options": { "A": "TIFF-8", "B": "WPD", "C": "DOC", "D": "PDF" }, "answer": "D" }, { "question": "When a file or folder is deleted, the complete path, including the original file name, is stored in a special hidden file called \"INF02\" in the Recycled INF02 file is deleted, it is re-created when you ___ .", "options": { "A": "Run the anti-spyware tool on the system", "B": "Kill the running processes in Windows task manager", "C": "Run the antivirus tool on the system", "D": "Restart Windows" }, "answer": "D" }, { "question": "You have been asked to investigate the possibility of computer fraud in the finance department of a company. It is suspected that a staff member has bee committing finance fraud by printing cheques that have not been authorized. You have exhaustively searched all data files on a bitmap image of the targeted computer, but have found no evidence. You suspect the files may not have been saved. What should you examine next in this case?", "options": { "A": "The registry", "B": "The swap file", "C": "The metadata", "D": "The recycle bin" }, "answer": "B" }, { "question": "Which type of evidence is most volatile?", "options": { "A": "RAM contents", "B": "Hard drive data", "C": "Optical media", "D": "Archived emails" }, "answer": "A" }, { "question": "A Linux system is undergoing investigation. In which directory should the investigators look for its current state data if the system is in powered on state?", "options": { "A": "/auth", "B": "/var/spool/cron/", "C": "/var/log/debug", "D": "/proc" }, "answer": "D" }, { "question": "Which one of the following is not a first response procedure?", "options": { "A": "Crack passwords", "B": "Take photos", "C": "Preserve volatile data", "D": "Fill forms" }, "answer": "A" }, { "question": "You are called by an author who is writing a book and he wants to know how long the copyright for his book will last after he has the book published?", "options": { "A": "the life of the author", "B": "the life of the author plus 70 years", "C": "copyrights last forever", "D": "70 years" }, "answer": "B" }, { "question": "What are the security risks of running a \"repair\" installation for Windows XP?", "options": { "A": "Pressing Ctrl+F10 gives the user administrative rights", "B": "There are no security risks when running the \"repair\" installation for Windows XP", "C": "Pressing Shift+F10 gives the user administrative rights", "D": "Pressing Shift+F1 gives the user administrative rights" }, "answer": "C" }, { "question": "The Electronic Serial Number (ESN) is a unique _ recorded on a secure chip in a mobile phone by the manufacturer.", "options": { "A": "64-bit identifier", "B": "24-bit identifier", "C": "16-bit identifier", "D": "32-bit identifier" }, "answer": "D" }, { "question": "Dumpster Diving refers to:", "options": { "A": "Searching for sensitive information in the user's trash bins and printer trash bins, and searching the user's desk for sticky notes", "B": "Creating a set of dictionary words and names, and trying all the possible combinations to crack the password", "C": "Looking at either the user's keyboard or screen while he/she is logging in", "D": "Convincing people to reveal the confidential information" }, "answer": "A" }, { "question": "Quality of a raster Image is determined by the ____ and the amount of information in each pixel.", "options": { "A": "Image file size", "B": "Image file format", "C": "Compression method", "D": "Total number of pixels" }, "answer": "D" }, { "question": "Preparing an image drive to copy files to is the first step in Linux forensics. For this purpose, what would the following command accomplish? dcfldd if of=/dev/hda bs=4096 conv=noerror, sync", "options": { "A": "Low-level format", "B": "Fill the disk with 4096 zeros", "C": "Fill the disk with zeros", "D": "Copy files from the master disk to the slave disk on the secondary IDE controller" }, "answer": "C" }, { "question": "How will you categorize a cybercrime that took place within a CSP's cloud environment?", "options": { "A": "Cloud as an Audit", "B": "Cloud as a Tool", "C": "Cloud as a Subject", "D": "Cloud as an Object" }, "answer": "C" }, { "question": "Which tool is best for analyzing malicious PowerShell scripts?", "options": { "A": "PowerShell ISE", "B": "PEview", "C": "ProcMon", "D": "Wireshark" }, "answer": "A" }, { "question": "George is a senior security analyst working for a state agency in Florida. His state's congress just passed a bill mandating every state agency to undergo a security audit annually. After learning what will be required, George needs to implement an IDS as soon as possible before the first audit occurs. The state bill requires that an IDS with a 'time-based induction machine' be used. What IDS feature must George implement to meet this requirement?", "options": { "A": "Pattern matching", "B": "Real-time anomaly detection", "C": "Statistical-based anomaly detection", "D": "Signature-based anomaly detection" }, "answer": "B" }, { "question": "Which of the following Perl scripts will help an investigator to access the executable image of a process?", "options": { "A": "Lspi.pl", "B": "Lspd.pl", "C": "Lpsi.pl", "D": "process.pl" }, "answer": "A" }, { "question": "POP3 is an Internet protocol, which is used to retrieve emails from a mail server. Through which port does an email client connect with a POP3 server?", "options": { "A": "993", "B": "110", "C": "143", "D": "25" }, "answer": "B" }, { "question": "Which of the following examinations refers to the process of providing the opposing side in a trial the opportunity to question a witness?", "options": { "A": "Witness Examination", "B": "Indirect Examination", "C": "Cross Examination", "D": "Direct Examination" }, "answer": "C" }, { "question": "Pagefile.sys is a virtual memory file used to expand the physical memory of a computer. Select the registry path for the page file:", "options": { "A": "HKEY\\_LOCAL\\_MACHINE\\SYSTEM\\CurrentControlSet\\Control\\Session Manager\\System Management", "B": "HKEY\\_LOCAL\\_MACHINE\\SYSTEM\\CurrentControlSet\\Control\\Session Manager\\Device Management", "C": "HKEY\\_LOCAL\\_MACHINE\\SYSTEM\\CurrentControlSet\\Control\\Session Manager\\Memory Management", "D": "HKEY\\_LOCAL\\_MACHINE\\SYSTEM\\CurrentControlSet\\Control\\Session Manager\\Memory Management\\PrefetchParameters" }, "answer": "C" }, { "question": "A section of your forensics lab houses several electrical and electronic equipment. Which type of fire extinguisher you must install in this area to contain any fire incident?", "options": { "A": "Class C", "B": "Class A", "C": "Class B", "D": "Class D" }, "answer": "A" }, { "question": "Annie is searching for certain deleted files on a system running Windows 10 OS (NTFS). Where will she find the files if they were not completely deleted from the system?", "options": { "A": "C:\\RECYCLER", "B": "C: $Recycled.Bin", "C": "C: \\$Recycle.Bin", "D": "C:\\$RECYCLER" }, "answer": "C" }, { "question": "In an echo data hiding technique, the secret message is embedded into a ____ as an echo", "options": { "A": "Pseudo-random signal", "B": "Cover audio signal", "C": "Pseudo- spectrum signal", "D": "Phase spectrum of a digital signal" }, "answer": "B" }, { "question": "Which of the following files store the MySQL database data permanently, including the data that had been deleted, helping the forensic investigator in examining the case and finding the culprit?", "options": { "A": "mysql-bin", "B": "mysql-log", "C": "ibdata1", "D": "iblog" }, "answer": "C" }, { "question": "When making the preliminary investigations in a sexual harassment case, how many investigators are you recommended having?", "options": { "A": "Three", "B": "One", "C": "Two", "D": "Four" }, "answer": "C" }, { "question": "Which of the following files contains the traces of the applications installed, run, or uninstalled from a system?", "options": { "A": "Prefetch Files", "B": "Shortcut Files", "C": "Image Files", "D": "Virtual files" }, "answer": "A" }, { "question": "Which network attack is described by the following statement? \nA server have been PWNED due to a zero day exploit related to a memory corrution vulnerability.", "options": { "A": "Man-in-the-Middle Attack", "B": "Sniffer Attack", "C": "Buffer Overflow", "D": "DDoS" }, "answer": "C" }, { "question": "While working for a prosecutor, what do you think you should do if the evidence you found appears to be exculpatory and is not being released to the defense?", "options": { "A": "Destroy the evidence", "B": "Keep the information of file for later review", "C": "Bring the information to the attention of the prosecutor, his or her supervisor or finally to the judge", "D": "Present the evidence to the defense attorney" }, "answer": "C" }, { "question": "In Windows 7, when attackers attempt to disable auditing, modifications to the audit policy are recorded under which Event ID?", "options": { "A": "4902", "B": "3902", "C": "4904", "D": "3904" }, "answer": "A" }, { "question": "Which of the following is an iOS Jailbreaking tool?", "options": { "A": "Kingo Android ROOT", "B": "Towelroot", "C": "One Click Root", "D": "Redsn0w" }, "answer": "D" }, { "question": "What is the capacity of Recycle bin in a system running on Windows Vista?", "options": { "A": "10% of the partition space", "B": "2.99GB", "C": "Unlimited", "D": "3.99GB" }, "answer": "C" }, { "question": "Which wireless standard has bandwidth up to 54 Mbps and signals in a regulated frequency spectrum around 5 GHz?", "options": { "A": "802.11b", "B": "802.11i", "C": "802.11g", "D": "802.11a" }, "answer": "D" }, { "question": "Why is it Important to consider health and safety factors in the work carried out at all stages of the forensic process conducted by the forensic analyst?", "options": { "A": "Local law enforcement agencies compel them to wear latest gloves", "B": "All forensic teams should wear protective latex gloves which makes them look professional and cool", "C": "It is a part of ANSI 346 forensics standard", "D": "This is to protect the staff and preserve any fingerprints that may need to be recovered at a later date" }, "answer": "D" }, { "question": "When obtaining a warrant, it is important to:", "options": { "A": "particularly describe the place to be searched and particularly describe the items to be seized", "B": "particularly describe the place to be searched and generally describe the items to be seized", "C": "generally describe the place to be searched and particularly describe the items to be seized", "D": "generally describe the place to be searched and generally describe the items to be seized" }, "answer": "A" }, { "question": "Which of the following is a MAC-based File Recovery Tool?", "options": { "A": "VirtualLab", "B": "Cisdem DataRecovery 3", "C": "GetDataBack", "D": "Smart Undeleter" }, "answer": "B" }, { "question": "What is the primary purpose of a keylogger?", "options": { "A": "Encrypt files", "B": "Spread through networks", "C": "Disable antivirus", "D": "Steal credentials" }, "answer": "D" }, { "question": "When should an MD5 hash check be performed when processing evidence?", "options": { "A": "After the evidence examination has been completed", "B": "On an hourly basis during the evidence examination", "C": "Before and after evidence examination", "D": "Before the evidence examination has been completed" }, "answer": "C" }, { "question": "Under confession, an accused criminal admitted to encrypting child pornography pictures and then hiding them within other pictures. What technique did the accused criminal employ?", "options": { "A": "Typography", "B": "Steganography", "C": "Steganalysis", "D": "Picture encoding" }, "answer": "B" }, { "question": "Which part of the Windows Registry contains the user's password file?", "options": { "A": "HKEY\\_CURRENT\\_USER", "B": "HKEY\\_LOCAL\\_MACHINE", "C": "HKEY\\_CURRENT\\_CONFIGURATION", "D": "HKEY\\_USER" }, "answer": "B" }, { "question": "What is the primary purpose of 'process hollowing'?", "options": { "A": "Encrypt system files", "B": "Execute malicious code in legitimate process", "C": "Hide network traffic", "D": "Modify BIOS settings" }, "answer": "B" }, { "question": "During a workplace investigation, an employee was found to have deleted emails containing harassment sent to another employee. The organization is using Microsoft Exchange Server and has message tracking enabled. Where should an administrator look on the Exchange server to find the message tracking log files (default installation)?", "options": { "A": "C:\\Program Files\\Microsoft\\Exchange\\TransportRoles\\Logs\\MessageTracking\\", "B": "C:\\Windows\\Exchsrvr\\.log", "C": "D:\\Exchsrvr\\.log", "D": "C:\\Exchsrvr\\Message Tracking\\.log" }, "answer": "A" }, { "question": "In handling computer-related incidents, which IT role is primarily responsible for the technical execution of recovery and prevention measures?", "options": { "A": "Director of Information Technology", "B": "Network Administrator", "C": "Director of Administration", "D": "CEO" }, "answer": "B" }, { "question": "Which of the following Registry components include offsets to other cells as well as the LastWrite time for the key?", "options": { "A": "Value cell", "B": "Value list cell", "C": "Key cell", "D": "Security descriptor cell" }, "answer": "C" }, { "question": "Which of the following passwords are sent over the wire (and wireless) network, or stored on some media as it is typed without any alteration?", "options": { "A": "Hashed passwords", "B": "Hex passwords", "C": "Clear text passwords", "D": "Obfuscated passwords" }, "answer": "C" }, { "question": "What is the size value of a nibble?", "options": { "A": "0.5 byte", "B": "0.5 kilo byte", "C": "0.5 bit", "D": "2 bits" }, "answer": "A" }, { "question": "You are assisting a Department of Defense contract company to become compliant with the stringent security policies set by the DoD. One such strict rule is that firewalls must only allow incoming connections that were first initiated by internal computers. What type of firewall must you implement to abide by this policy?", "options": { "A": "Stateful firewall", "B": "Circuit-level proxy firewall", "C": "Application-level proxy firewall", "D": "Packet filtering firewall" }, "answer": "A" }, { "question": "The objective of this act was to protect consumers' personal financial information held by financial institutions and their service providers.", "options": { "A": "Sarbanes-Oxley 2002", "B": "Gramm-Leach-Bliley Act", "C": "HIPAA", "D": "California SB 1386" }, "answer": "B" }, { "question": "In Logical Block Addressing (LBA), data is addressed by assigning what to each sector on a hard disk", "options": { "A": "Sequential number", "B": "Index number", "C": "Operating system number", "D": "Sector number" }, "answer": "A" }, { "question": "When operating systems mark a cluster as used but not allocated, the cluster is considered as ____", "options": { "A": "Corrupt", "B": "Unallocated", "C": "Bad", "D": "Lost" }, "answer": "D" }, { "question": "Which of the following is a federal law enacted in the US to control the ways that financial institutions deal with the private information of individuals?", "options": { "A": "SOX", "B": "PCI DSS", "C": "HIPAA 1996", "D": "GLBA" }, "answer": "D" }, { "question": "Which ISO Standard enables laboratories to demonstrate that they comply with quality assurance and provide valid results?", "options": { "A": "ISO/IEC 18025", "B": "ISO/IEC 16025", "C": "ISO/IEC 19025", "D": "ISO/IEC 17025" }, "answer": "D" }, { "question": "Which of the following statements is not a part of securing and evaluating electronic crime scene checklist?", "options": { "A": "Locate and help the victim", "B": "Blog about the incident on the internet", "C": "Transmit additional flash messages to other responding units", "D": "Request additional help at the scene if needed" }, "answer": "B" }, { "question": "Which of the following does not describe the type of data density on a hard disk?", "options": { "A": "Volume density", "B": "Track density", "C": "Areal density", "D": "Linear or recording density" }, "answer": "A" }, { "question": "A state department site was recently attacked and all the servers had their disks erased. The incident response team sealed the area and commenced investigation. During evidence collection they came across a zip disks that did not have the standard labeling on it. The incident team ran the disk on system and found that the system disk was accidentally erased. They decided to call in the FBI for further investigation. Meanwhile, they short listed possible suspects including three summer interns. Where did the incident team go wrong?", "options": { "A": "They tampered with evidence by using it", "B": "They examined the actual evidence on an unrelated system", "C": "They attempted to implicate personnel without proof", "D": "They called in the FBI without correlating with the fingerprint data" }, "answer": "A" }, { "question": "Which of the following reports are delivered under oath to a board of directors/managers/panel of the jury?", "options": { "A": "Written Formal Report", "B": "Verbal Formal Report", "C": "Written Informal Report", "D": "Verbal Informal Report" }, "answer": "B" }, { "question": "Which legal principle requires obtaining proper authorization before seizing digital evidence?", "options": { "A": "GDPR", "B": "ISO 27001", "C": "Fourth Amendment", "D": "PCI DSS" }, "answer": "C" }, { "question": "What is the primary use of Wireshark in digital forensics?", "options": { "A": "Analyze network traffic", "B": "Create disk images", "C": "Recover deleted files", "D": "Analyze memory dumps" }, "answer": "A" }, { "question": "The _______ refers to handing over the results of private investigations to the authorities because of indications of criminal activity.", "options": { "A": "Kelly Policy", "B": "Locard Exchange Principle", "C": "Clark Standard", "D": "Silver-Platter Doctrine" }, "answer": "D" }, { "question": "Where does Encase search to recover NTFS files and folders?", "options": { "A": "HAL", "B": "MFT", "C": "MBR", "D": "Slack space" }, "answer": "B" }, { "question": "You are running through a series of tests on your network to check for any security vulnerabilities. After normal working hours, you initiate a DoS attack to your external firewall. The firewall Quickly freezes up and becomes unusable. You then initiate an FTP connection from an external IP into your internal network. The connection is successful even though you have FTP blocked at the external firewall. What has happened?", "options": { "A": "The firewall failed-bypass", "B": "The firewall failed-closed", "C": "The firewall ACL has been purged", "D": "The firewall failed-open" }, "answer": "D" }, { "question": "Which program is the bootloader when Windows XP starts up?", "options": { "A": "LOADER", "B": "KERNEL.EXE", "C": "NTLDR", "D": "LILO" }, "answer": "C" }, { "question": "After passing her CEH exam, Carol wants to ensure that her network is completely secure. She implements a DMZ, stateful firewall, NAT, IPSEC, and a packet filtering firewall. Since all security measures were taken, none of the hosts on her network can reach the Internet. Why is that?", "options": { "A": "NAT does not work with IPSEC", "B": "NAT does not work with stateful firewalls", "C": "Stateful firewalls do not work with packet filtering firewalls", "D": "IPSEC does not work with packet filtering firewalls" }, "answer": "A" }, { "question": "Harold is finishing up a report on a case of network intrusion, corporate spying, and embezzlement that he has been working on for over six months. He is trying to find the right term to use in his report to describe network-enabled spying. What term should Harold use?", "options": { "A": "Hackspionage", "B": "Spynet", "C": "Spycrack", "D": "Netspionage" }, "answer": "D" }, { "question": "Which Windows registry hive stores user-specific configuration information?", "options": { "A": "HKEY_CURRENT_USER", "B": "HKEY_CLASSES_ROOT", "C": "HKEY_LOCAL_MACHINE", "D": "HKEY_CURRENT_CONFIG" }, "answer": "A" }, { "question": "You are employed directly by an attorney to help investigate an alleged sexual harassment case at a large pharmaceutical manufacturer. While at the corp office of the company, the CEO demands to know the status of the investigation. What prevents you from discussing the case with the CEO?", "options": { "A": "the attorney-work-product rule", "B": "Trade secrets", "C": "ISO 17799", "D": "Good manners" }, "answer": "A" }, { "question": "Law enforcement officers are conducting a legal search for which a valid warrant was obtained. While conducting the search, officers observe an item of for an unrelated crime that was not included in the warrant. The item was clearly visible to the officers and immediately identified as evidence. What is used to describe how this evidence is admissible?", "options": { "A": "Locard Exchange Principle", "B": "Corpus delicti", "C": "Plain view doctrine", "D": "Ex Parte Order" }, "answer": "C" }, { "question": "Gary, a computer technician, is facing allegations of abusing children online by befriending them and sending them illicit adult images from his office. What type of investigation does this case require?", "options": { "A": "Criminal Investigation", "B": "Both Criminal and Administrative Investigation", "C": "Administrative Investigation", "D": "Civil Investigation" }, "answer": "B" }, { "question": "What is the primary purpose of maintaining a chain of custody?", "options": { "A": "Reduce storage requirements", "B": "Ensure evidence integrity in court", "C": "Automate evidence collection", "D": "Speed up forensic analysis" }, "answer": "B" }, { "question": "What is considered a grant of a property right given to an individual who discovers or invents a new machine, process, useful composition of matter or manufacture?", "options": { "A": "Copyright", "B": "Design patent", "C": "Trademark", "D": "Utility patent" }, "answer": "D" }, { "question": "If the partition size is 4 GB, each cluster will be 32 K. Even if a file needs only 10 K, the entire 32 K will be allocated, resulting in 22 K of ______", "options": { "A": "Deleted space", "B": "Sector space", "C": "Cluster space", "D": "Slack space" }, "answer": "D" }, { "question": "BMP (Bitmap) is a standard file format for computers running the Windows operating system. BMP images can range from black and white (1 bit per pixel) up to 24 bit color (16.7 million colors). Each bitmap file contains a header, the RGBQUAD array, information header, and image data. Which of the following element specifies the dimensions, compression type, and color format for the bitmap?", "options": { "A": "Header", "B": "The RGBQUAD array", "C": "Information header", "D": "Image data" }, "answer": "C" }, { "question": "What is a common method of a supply chain attack?", "options": { "A": "Phishing emails", "B": "Compromised software updates", "C": "Brute force attempts", "D": "Encrypted C2 traffic" }, "answer": "B" }, { "question": "Which phase of incident response involves isolating affected systems?", "options": { "A": "Preparation", "B": "Identification", "C": "Eradication", "D": "Containment" }, "answer": "D" }, { "question": "%3cscript%3ealert('XXXXXXXX')%3c/script%3e is a script obtained from a Cross-Site Scripting attack. What type of encoding has the attacker employed?", "options": { "A": "Double encoding", "B": "Unicode", "C": "Hex encoding", "D": "Base64" }, "answer": "B" }, { "question": "What is the location of a Protective MBR in a GPT disk layout?", "options": { "A": "Logical Block Address (LBA) 3", "B": "Logical Block Address (LBA) 1", "C": "Logical Block Address (LBA) 2", "D": "Logical Block Address (LBA) 0" }, "answer": "D" }, { "question": "MAC filtering is a security access control methodology, where a _______ is assigned to each network card to determine access to the network.", "options": { "A": "24-bit address", "B": "32-bit address", "C": "16-bit address", "D": "48-bit address" }, "answer": "D" }, { "question": "The Apache server saves diagnostic information and error messages that it encounters while processing requests. The default path of this file is usr/local/apache/logs/error.log in Linux. Identify the Apache error log from the following logs.", "options": { "A": "http://victim.com/scripts/..%c0%af../..%c0%af../..%c0%af../..%c0%af../..%c0%af../..%c0%af../..%c0%af../..%c0%af../winnt/system32/cmd.exe?/c+dir+C:\\Wi stem32\\Logfiles\\W3SVC1", "B": "127.0.0.1 - - [10/Apr/2007:10:39:11 +0300] ] [error] \"GET /apache\\_pb.gif HTTP/1.0\" 200 2326", "C": "[Wed Oct 11 14:32:52 2000] [error] [client 127.0.0.1] client denied by server configuration:/export/home/live/ap/htdocs/test", "D": "127.0.0.1 - frank [10/Oct/2000:13:55:36 -0700]\"GET /apache\\_pb.gif HTTP/1.0\" 200 2326" }, "answer": "C" }, { "question": "While searching through a computer under investigation, you discover numerous files that appear to have had the first letter of the file name replaced by the hex code 0xE5. What does this indicate on the computer?", "options": { "A": "The files have been marked for deletion", "B": "The files have been marked as hidden", "C": "The files have been marked as read-only", "D": "The files are corrupt and cannot be recovered" }, "answer": "A" }, { "question": "A(n) ____ is one that's performed by a computer program rather than the attacker manually performing the steps in the attack sequence.", "options": { "A": "central processing attack", "B": "blackout attack", "C": "automated attack", "D": "distributed attack" }, "answer": "C" }, { "question": "Julie is a college student majoring in Information Systems and Computer Science. She is currently writing an essay for her computer crimes class. Julie focuses on white-collar crimes in America and how forensics investigators investigate the cases. Julie would like to focus the subject. Julie would like subject of the essay on the most common type of crime found in corporates of America. What crime should Julie focus on?", "options": { "A": "Denial of Service attacks", "B": "Industrial espionage", "C": "Physical theft", "D": "Copyright infringement" }, "answer": "B" }, { "question": "Robert, a cloud architect, received a huge bill from the cloud service provider, which usually doesn't happen. After analyzing the bill, he found that the resource consumption was very high. He then examined the cloud server and discovered that a malicious code was running on the server, which was generating huge but harmless traffic from the server. This means that the server has been compromised by an attacker with the sole intention to hurt the cloud custumer financially. Which attack is described in the above scenario?", "options": { "A": "DDoS Attack (Distributed Denial of Service)", "B": "EDoS Attack (Economic Denial of Service)", "C": "XSS Attack", "D": "Man-in-the-cloud Attack" }, "answer": "B" }, { "question": "Wi-Fi Protected Access (WPA) is a data encryption method for WLANs based on 802.11 standards. Temporal Key Integrity Protocol (TKIP) enhances WEP by adding a rekeying mechanism to provide fresh encryption and integrity keys. Temporal keys are changed for every ____ .", "options": { "A": "15,000 packets", "B": "20.000 packets", "C": "5,000 packets", "D": "10.000 packets" }, "answer": "D" }, { "question": "Which Windows artifact tracks user file access?", "options": { "A": "Thumbs.db", "B": "Index.dat", "C": "Pagefile.sys", "D": "RecentDocs" }, "answer": "D" }, { "question": "When a user deletes a file or folder, the system stores the complete path including the original filename in a special hidden file called 'INFO2' in the Recycled folder. If the INFO2 file is deleted, it is recovered when you _______ .", "options": { "A": "Undo the last action performed on the system", "B": "Reboot Windows", "C": "Download the file from Microsoft website", "D": "It is not possible to recover the file after deletion" }, "answer": "A" }, { "question": "Which of the following is NOT a graphics file?", "options": { "A": "sample.nfo", "B": "sample.tga", "C": "sample.psd", "D": "sample.bmp" }, "answer": "A" }, { "question": "For what purpose do the investigators use tools like iPhoneBrowser, iFunBox, OpenSSHSSH, and iMazing?", "options": { "A": "Bypassing iPhone passcode", "B": "Copying contents of iPhone", "C": "Debugging iPhone", "D": "Rooting iPhone" }, "answer": "B" }, { "question": "Microsoft Outlook maintains email messages in a proprietary format in what type of file?", "options": { "A": ".mail", "B": ".doc", "C": ".email", "D": ".pst" }, "answer": "D" }, { "question": "Norbert is a computer forensics investigator working for Tyler & Company Consultants. Norbert has been called upon to help investigate a computer hacking ring broken up by the local police. Norbert begins to inventory the PCs found in the hackers hideout. Norbert then comes across a PDA left by them that is attached to a number of different peripheral devices. What is the first step that Norbert must take with the PDA to ensure the integrity of the investigation?", "options": { "A": "Photograph and document the peripheral devices", "B": "Unplug all connected devices", "C": "Place PDA, including all devices, in an antistatic bag", "D": "Power off all devices if currently on" }, "answer": "A" }, { "question": "Which technique hides data within the slack space of a file system?", "options": { "A": "Bad cluster marking", "B": "Data diddling", "C": "Pool allocation", "D": "Steganography" }, "answer": "D" }, { "question": "Select the tool appropriate for examining the dynamically linked libraries of an application or malware.", "options": { "A": "DependencyWalker", "B": "SysAnalyzer", "C": "PEiD", "D": "ResourcesExtract" }, "answer": "A" }, { "question": "Which command can provide the investigators with details of all the loaded modules on a Linux-based system?", "options": { "A": "plist mod -a", "B": "lsof -m", "C": "lsmod", "D": "list modules -a" }, "answer": "C" }, { "question": "What is the purpose of 'Reflective DLL Injection'?", "options": { "A": "Avoid writing DLL to disk", "B": "Bypass firewalls", "C": "Enhance encryption", "D": "Spread via email" }, "answer": "A" }, { "question": "What is the primary risk of shutting down a live system during evidence collection?", "options": { "A": "Losing volatile memory contents", "B": "Corrupting the file system", "C": "Generating excessive log entries", "D": "Triggering disk encryption" }, "answer": "A" }, { "question": "What must be obtained before an investigation is carried out at a location?", "options": { "A": "Modus operandi", "B": "Search warrant", "C": "Subpoena", "D": "Habeas corpus" }, "answer": "B" }, { "question": "Which of the following tool creates a bit-by-bit image of an evidence media?", "options": { "A": "FileMerlin", "B": "AccessData FTK Imager", "C": "Xplico", "D": "Recuva" }, "answer": "B" }, { "question": "You can interact with the Registry through intermediate programs. Graphical user interface (GUI) Registry editors such as Regedit.exe or Regedt32.exe are commonly used as intermediate programs in Windows 7. Which of the following is a root folder of the registry editor?", "options": { "A": "HKEY\\_CLASSES\\_SYSTEM", "B": "HKEY\\_USERS", "C": "HKEY\\_LOCAL\\_ADMIN", "D": "HKEY\\_CLASSES\\_ADMIN" }, "answer": "B" }, { "question": "Cylie is investigating a network breach at a state organization in Florida. She discovers that the intruders gained access to the company firewalls by overloading them with IP packets. Further investigation reveals that the intruders hacked into the company phone system and used the hard drives on their PBX system to store shared music files. What is this type of attack on the company PBX system called?", "options": { "A": "Squatting", "B": "Phreaking", "C": "Crunching", "D": "Pretexting" }, "answer": "B" }, { "question": "Which of the following tools can reverse machine code to assembly language?", "options": { "A": "IDA Pro", "B": "RAM Capturer", "C": "PEiD", "D": "Deep Log Analyzer" }, "answer": "A" }, { "question": "Which of the following attack uses HTML tags like ?", "options": { "A": "SQL injection", "B": "Spam", "C": "Phishing", "D": "XSS attack" }, "answer": "D" }, { "question": "What method of copying should always be performed first before carrying out an investigation?", "options": { "A": "System level copy", "B": "Parity-bit copy", "C": "Bit-stream copy", "D": "MS-DOS disc copy" }, "answer": "C" }, { "question": "You are the network administrator for a small bank in Dallas, Texas. To ensure network security, you enact a security policy that requires all users to have 14 character passwords. After giving your users 2 weeks notice, you change the Group Policy to force 14 character passwords. A week later you dump the SAM database from the standalone server and run a password-cracking tool against it. Over 99% of the passwords are broken within an hour. Why were these passwords cracked so Quickly?", "options": { "A": "The passwords that were cracked are local accounts on the Domain Controller", "B": "A password Group Policy change takes at least 3 weeks to completely replicate throughout a network", "C": "Networks using Active Directory never use SAM databases so the SAM database pulled was empty", "D": "Passwords of 14 characters or less are broken up into two 7-character hashes" }, "answer": "D" }, { "question": "What operating system would respond to the following command?\nc:\\> nmap -sW 10.10.145.65", "options": { "A": "Windows 95", "B": "FreeBSD", "C": "Windows XP", "D": "Mac OS X" }, "answer": "B" }, { "question": "Which of the following approaches checks and compares all the fields systematically and intentionally for positive and negative correlation with each other to determine the correlation across one or multiple fields?", "options": { "A": "Automated field correlation approach", "B": "Rule-based approach", "C": "Neural network-based approach", "D": "Graph-based approach" }, "answer": "A" }, { "question": "George was recently fired from his job as an IT analyst at Pitts and Company in Dallas Texas. His main duties as an analyst were to support the company Directory structure and to create network polices. George now wants to break into the company network by cracking some of the service accounts he knows about. Which password cracking technique should George use in this situation?", "options": { "A": "Syllable attack", "B": "Brute force attack", "C": "Rule-based attack", "D": "Active Directory passwords cannot be cracked" }, "answer": "C" }, { "question": "The MD5 program is used to:", "options": { "A": "verify that a disk is not altered when you examine it", "B": "wipe magnetic media before recycling it", "C": "view graphics files on an evidence drive", "D": "make directories on an evidence disk" }, "answer": "A" }, { "question": "Gill is a computer forensics investigator who has been called upon to examine a seized computer. This computer, according to the police, was used by a h who gained access to numerous banking institutions to steal customer information. After preliminary investigations, Gill finds in the computer's log fil hacker was able to gain access to these banks through the use of Trojan horses. The hacker then used these Trojan horses to obtain remote access to the companies' domain controllers. From this point, Gill found that the hacker pulled off the SAM files from the domain controllers to then attempt and crac passwords. What is the most likely password cracking technique used by this hacker to break the user passwords from the SAM files?", "options": { "A": "Syllable attack", "B": "Dictionary attack", "C": "Hybrid attack", "D": "Brute force attack" }, "answer": "B" }, { "question": "The newer Macintosh Operating System (MacOS X) is based on:", "options": { "A": "BSD Unix", "B": "OS/2", "C": "Microsoft Windows", "D": "Linux" }, "answer": "A" }, { "question": "While collecting Active Transaction Logs using SQL Server Management Studio, the query Select * from ::fn\\_dblog(NULL, NULL) displays the active portion of the transaction log file. Here, assigning NULL values implies?", "options": { "A": "Start and end points for log sequence numbers are specified", "B": "Start and end points for log sequence numbers are not specified", "C": "Start and end points for log files are specified", "D": "Start and end points for log files are not specified" }, "answer": "B" }, { "question": "What is the following command trying to accomplish?\nC:\\> nmap -sU -p1337 192.168.0.0/24", "options": { "A": "Verify that UDP port 1337 is closed for the 192.168.0.0 network", "B": "Verify that NETBIOS is running for the 192.168.0.0 network", "C": "Verify that UDP port 1337 is open for the 192.168.0.0 network", "D": "Verify that TCP port 1337 is open for the 192.168.0.0 network" }, "answer": "C" }, { "question": "When analyzing logs, it is important that the clocks of all the network devices are synchronized. Which protocol will help in synchronizing these clocks", "options": { "A": "PTP", "B": "NTP", "C": "UTC", "D": "Time Protocol" }, "answer": "B" }, { "question": "Which memory analysis technique detects API hooking?", "options": { "A": "Process listing", "B": "SSDT (System Service Descriptor Table) inspection", "C": "Network connection analysis", "D": "String extraction" }, "answer": "B" }, { "question": "What is the framework used for application development for iOS-based mobile devices?", "options": { "A": "AirPlay", "B": "Dalvik", "C": "Cocoa Touch", "D": "Zygote" }, "answer": "C" }, { "question": "Which file type is most likely to deliver macro malware?", "options": { "A": ".dll", "B": ".exe", "C": ".docm", "D": ".jpg" }, "answer": "C" }, { "question": "What does a sudden increase in failed login attempts indicate?", "options": { "A": "Ransomware activity", "B": "Data exfiltration", "C": "Brute force attack", "D": "Phishing campaign" }, "answer": "C" }, { "question": "While analyzing a hard disk, the investigator finds that the file system does not use UEFI-based interface. Which of the following operating systems is on the hard disk?", "options": { "A": "Windows 7", "B": "Windows 10", "C": "Windows 8.1", "D": "Windows 8" }, "answer": "A" }, { "question": "What does a domain generation algorithm (DGA) help malware avoid?", "options": { "A": "Network blacklisting", "B": "Antivirus detection", "C": "File encryption", "D": "Code analysis" }, "answer": "A" }, { "question": "What is the primary purpose of sandboxing in malware analysis?", "options": { "A": "Accelerate code execution", "B": "Encrypt malicious files", "C": "Identify malware behavior", "D": "Prevent system infection" }, "answer": "C" }, { "question": "Which technique modifies legitimate system binaries?", "options": { "A": "Process injection", "B": "MAC spoofing", "C": "DNS tunneling", "D": "Living-off-the-land (LOLBins)" }, "answer": "D" }, { "question": "This organization maintains a database of hash signatures for known software.", "options": { "A": "Institute of Electrical and Electronics Engineers", "B": "American National standards Institute", "C": "International Standards Organization", "D": "National Software Reference Library" }, "answer": "D" }, { "question": "Richard is extracting volatile data from a system and uses the command doskey/history. What is he trying to extract?", "options": { "A": "Events history", "B": "History of the browser", "C": "Passwords used across the system", "D": "Previously typed commands" }, "answer": "D" }, { "question": "Which code does the FAT file system use to mark the file as deleted?", "options": { "A": "ESh", "B": "h5E", "C": "E5h", "D": "5Eh" }, "answer": "C" }, { "question": "During forensics investigations, investigators tend to collect the system time at first and compare it with UTC. What does the abbreviation UTC stand for?", "options": { "A": "Coordinated Universal Time", "B": "Universal Computer Time", "C": "Correlated Universal Time", "D": "Universal Time for Computers" }, "answer": "A" }, { "question": "Which of the following filesystem is used by Mac OS X?", "options": { "A": "EXT2", "B": "HFS+", "C": "NFS", "D": "EFS" }, "answer": "B" }, { "question": "Which of the following ISO standard defines file systems and protocol for exchanging data between optical disks?", "options": { "A": "ISO/IEC 13940", "B": "ISO 9060", "C": "IEC 3490", "D": "ISO 9660" }, "answer": "D" }, { "question": "What is the primary purpose of timeline analysis?", "options": { "A": "Track user web browsing history", "B": "Establish sequence of events", "C": "Identify network bottlenecks", "D": "Measure system performance" }, "answer": "B" }, { "question": "Which MySQL log file contains information on server start and stop?", "options": { "A": "Slow query log file", "B": "Binary log", "C": "Error log file", "D": "General query log file" }, "answer": "C" }, { "question": "Volatile Memory is one of the leading problems for forensics. Worms such as code Red are memory resident and do write themselves to the hard drive, if you turn the system off they disappear. In a lab environment, which of the following options would you suggest as the most appropriate to overcome the problem of capturing volatile memory?", "options": { "A": "Create a Separate partition of several hundred megabytes and place the swap file there", "B": "Give the Operating System a minimal amount of memory, forcing it to use a swap file", "C": "Use VMware to be able to capture the data in memory and examine it", "D": "Use intrusion forensic techniques to study memory resident infections" }, "answer": "C" }, { "question": "Andie, a network administrator, suspects unusual network services running on a windows system. Which of the following commands should he use to verify unusual network services started on a Windows system?", "options": { "A": "net serv", "B": "lusrmgr", "C": "net start", "D": "netmgr" }, "answer": "C" }, { "question": "Which of the following tool enables a user to reset his/her lost admin password in a Windows system?", "options": { "A": "Advanced Office Password Recovery", "B": "Active@ Password Changer", "C": "Passware Kit Forensic", "D": "Smartkey Password Recovery Bundle Standard" }, "answer": "B" }, { "question": "During the course of a corporate investigation, you find that an Employee is committing a crime. Can the Employer file a criminal complaint with Police?", "options": { "A": "No, because the investigation was conducted without warrant", "B": "Yes, and all evidence can be turned over to the police", "C": "No, because the investigation was conducted without following standard police procedures", "D": "Yes, but only if you turn the evidence over to a federal law enforcement agency" }, "answer": "B" }, { "question": "During the trial, an investigator observes that one of the principal witnesses is severely ill and cannot be present for the hearing. He decides to record the evidence and present it to the court. Under which rule should he present such evidence?", "options": { "A": "Locard's Principle", "B": "Hearsay", "C": "Rule 1003: Admissibility of Duplicates", "D": "Limited admissibility" }, "answer": "D" }, { "question": "Which of the following is NOT a part of pre-investigation phase?", "options": { "A": "Gathering evidence data", "B": "Gathering information about the incident", "C": "Creating an investigation team", "D": "Building forensics workstation" }, "answer": "A" }, { "question": "Jacob is a computer forensics investigator with over 10 years experience in investigations and has written over 50 articles on computer forensics. He has been called upon as a qualified witness to testify the accuracy and integrity of the technical log files gathered in an investigation into computer fraud. What is the term used for Jacob testimony in this case?computer fraud. What is the term used for Jacob? testimony in this case?", "options": { "A": "Certification", "B": "Reiteration", "C": "Authentication", "D": "Justification" }, "answer": "C" }, { "question": "What type of attack is characterized by encrypting files and demanding payment for decryption?", "options": { "A": "Ransomware", "B": "SQL injection", "C": "Phishing", "D": "DDoS" }, "answer": "A" }, { "question": "What type of attack occurs when an attacker can force a router to stop forwarding packets by flooding the router with many open connections simultaneous that all the hosts behind the router are effectively disabled?", "options": { "A": "ARP redirect", "B": "Physical attack", "C": "Denial of service", "D": "Digital attack" }, "answer": "C" }, { "question": "Tamas has got an email from a well-reputed company stating in the subject line that she has won a prize money, whereas the email body says that she has a certain amount for being eligible for the contest.\nWhich of the following acts does the email breach?", "options": { "A": "GLBA", "B": "CAN-SPAM Act", "C": "SOX", "D": "HIPAA" }, "answer": "B" }, { "question": "Which of the following standard represents a legal precedent sent in 1993 by the Supreme Court of the United States regarding the admissibility of exper witnesses' testimony during federal legal proceedings?", "options": { "A": "SWGDE & SWGIT", "B": "IOCE", "C": "Daubert", "D": "Frye" }, "answer": "C" }, { "question": "Which of the following files stores information about a local Google Drive installation such as User email ID, Local Sync Root Path, and Client version installed?", "options": { "A": "config.db", "B": "filecache.db", "C": "sigstore.db", "D": "Sync\\_config.db" }, "answer": "D" }, { "question": "Microsoft Security IDs are available in Windows Registry Editor. The path to locate IDs in Windows 7 is:", "options": { "A": "HKEY\\_LOCAL\\_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\RegList", "B": "HKEY\\_LOCAL\\_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Regedit", "C": "HKEY\\_LOCAL\\_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\ProfileList", "D": "HKEY\\_LOCAL\\_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\ProfileList" }, "answer": "C" }, { "question": "Norbert is working on his company policies and guidelines. The section he is currently working on covers company documents; how they should be handled, stored and eventually destroyed. Norbert is concerned about the process whereby outdated documents are destroyed. What type of shredder should Norbert write in the guidelines to be used when destroying documents?", "options": { "A": "Cross-cut shredder", "B": "Strip-cut shredder", "C": "Cross-hatch shredder", "D": "Cris-cross shredder" }, "answer": "A" }, { "question": "Which file header information is crucial for analyzing Windows PE files?", "options": { "A": "Mach-O header", "B": "MZ header", "C": "ELF header", "D": "PDF header" }, "answer": "B" }, { "question": "You are working as a Computer forensics investigator for a corporation on a computer abuse case. You discover evidence that shows the subject of your investigation is also embezzling money from the company. The company CEO and the corporate legal counsel advise you to contact law enforcement and provide them with the evidence that you have found. The law enforcement officer that responds requests that you put a network sniffer on your network and monitor traffic to the subject's computer. You inform the officer that you will not be able to comply with that request because doing so would:", "options": { "A": "Violate your contract", "B": "Cause network congestion", "C": "Make you an agent of law enforcement", "D": "Write information to the subject's hard drive" }, "answer": "C" }, { "question": "Data acquisition system is a combination of tools or processes used to gather, analyze and record Information about some phenomenon. Different data acquisition system are used depends on the location, speed, cost. etc. Serial communication data acquisition system is used when the actual location of the data is at some distance from the computer. Which of the following communication standard is used in serial communication data acquisition system?", "options": { "A": "RS423", "B": "RS232", "C": "RS231", "D": "RS422" }, "answer": "B" }, { "question": "Which principle states that 'anyone or anything, entering a crime scene takes something of the scene with them, and leaves something of themselves behind when they leave'?", "options": { "A": "Enterprise Theory of Investigation", "B": "Locard's Exchange Principle", "C": "Locard's Evidence Principle", "D": "Evidence Theory of Investigation" }, "answer": "B" }, { "question": "Davidson Trucking is a small transportation company that has three local offices in Detroit Michigan. Ten female employees that work for the company have gone to an attorney reporting that male employees repeatedly harassed them and that management did nothing to stop the problem. Davidson has employee policies that outline all company guidelines, including awareness on harassment and how it will not be tolerated. When the case is brought to court, whom should the prosecuting attorney call upon for not upholding company policy?", "options": { "A": "Supervisors", "B": "Administrative assistant in charge of writing policies", "C": "Employees themselves", "D": "IT personnel" }, "answer": "A" }, { "question": "In which cloud crime do attackers try to compromise the security of the cloud environment in order to steal data or inject a malware?", "options": { "A": "Cloud as a Tool", "B": "Cloud as a Subject", "C": "Cloud as an Application", "D": "Cloud as an Object" }, "answer": "B" }, { "question": "Which tool is used to analyze malicious JavaScript?", "options": { "A": "Process Hacker", "B": "FTK Imager", "C": "JSDetox", "D": "Ghidra" }, "answer": "C" }, { "question": "An expert witness is a _______ who is normally appointed by a party to assist the formulation and preparation of a party's claim or defense.", "options": { "A": "Subject matter specialist", "B": "Expert in criminal investigation", "C": "Witness present at the crime scene", "D": "Expert law graduate appointed by attorney" }, "answer": "A" }, { "question": "The Recycle Bin is located on the Windows desktop. When you delete an item from the hard disk, Windows sends that deleted item to the Recycle Bin and the icon changes to full from empty, but items deleted from removable media, such as a floppy disk or network drive, are not stored in the Recycle Bin. What is the size limit for Recycle Bin in Vista and later versions of the Windows?", "options": { "A": "Maximum of 4.99 GB", "B": "Maximum of 5.99 GB", "C": "Maximum of 3.99 GB", "D": "No size limit" }, "answer": "D" }, { "question": "In a computer forensics investigation, what describes the route that evidence takes from the time you find it until the case is closed or goes to court?", "options": { "A": "law of probability", "B": "chain of custody", "C": "policy of separation", "D": "rules of evidence" }, "answer": "B" }, { "question": "Files stored in the Recycle Bin in its physical location are renamed as Dxy.ext, where 'x' represents the ________.", "options": { "A": "Original file name's extension", "B": "Sequential number", "C": "Drive name", "D": "Original file name" }, "answer": "C" }, { "question": "International Mobile Equipment Identifier (IMEI) is a 15-dlgit number that indicates the manufacturer, model type, and country of approval for GSM devices. The first eight digits of an IMEI number that provide information about the model and origin of the mobile device is also known as:", "options": { "A": "Manufacturer Identification Code (MIC)", "B": "Device Origin Code (DOC)", "C": "Type Allocation Code (TAC)", "D": "Integrated Circuit Code (ICC)" }, "answer": "C" }, { "question": "Which is a standard procedure to perform during all computer forensics investigations?", "options": { "A": "With the hard drive removed from the suspect PC, check the date and time in the system CMOS", "B": "With the hard drive in the suspect PC, check the date and time in the File Allocation Table", "C": "With the hard drive removed from the suspect PC, check the date and time in the system RAM", "D": "With the hard drive in the suspect PC, check the date and time in the system CMOS" }, "answer": "A" }, { "question": "What is a first sector (sector zero) of a hard disk that is used to boot the operating system?", "options": { "A": "System boot record", "B": "Master boot record", "C": "Hard disk boot record", "D": "Secondary boot record" }, "answer": "B" }, { "question": "What is the primary purpose of a Faraday bag in mobile forensics?", "options": { "A": "Protect against physical damage", "B": "Block wireless signals", "C": "Prevent data tampering", "D": "Enhance GPS tracking" }, "answer": "B" }, { "question": "Which of the following Event Correlation Approach is an advanced correlation method that assumes and predicts what an attacker can do next after the attack by studying the statistics and probability and uses only two variables?", "options": { "A": "Rule-Based Approach", "B": "Bayesian Correlation", "C": "Vulnerability-Based Approach", "D": "Route Correlation" }, "answer": "B" }, { "question": "When you are running a vulnerability scan on a network and the IDS cuts off your connection, what type of IDS is being used?", "options": { "A": "Progressive IDS", "B": "NIPS", "C": "Passive IDS", "D": "Active IDS" }, "answer": "D" }, { "question": "If a PDA is seized in an investigation while the device is turned on, what would be the proper procedure?", "options": { "A": "Turn off the device immediately", "B": "Remove any memory cards immediately", "C": "Keep the device powered on", "D": "Remove the battery immediately" }, "answer": "C" }, { "question": "An Expert witness gives an opinion if:", "options": { "A": "To deter the witness form expanding the scope of his or her investigation beyond the requirements of the case", "B": "To define the issues of the case for determination by the finder of fact", "C": "To stimulate discussion between the consulting expert and the expert witness", "D": "The Opinion, inferences or conclusions depend on special knowledge, skill or training not within the ordinary experience of lay jurors" }, "answer": "D" }, { "question": "What does TSK (The Sleuth Kit) primarily analyze?", "options": { "A": "Memory dumps", "B": "Malware samples", "C": "Network traffic", "D": "Disk images" }, "answer": "D" }, { "question": "In a forensic examination of hard drives for digital evidence, what type of user is most likely to have the most file slack to analyze?", "options": { "A": "one who has NTFS 4 or 5 partitions", "B": "one who uses dynamic swap file capability", "C": "one who has lots of allocation units per block or cluster", "D": "one who uses hard disk writes on IRQ 13 and 21" }, "answer": "C" }, { "question": "What is the location of the binary files required for the functioning of the OS in a Linux system?", "options": { "A": "/bin", "B": "/sbin", "C": "/root", "D": "/run" }, "answer": "A" }, { "question": "When using an iPod and the host computer is running Windows, what file system will be used?", "options": { "A": "HFS", "B": "FAT16", "C": "iPod+", "D": "FAT32" }, "answer": "D" }, { "question": "In which of these attacks will a steganalyst use a random message to generate a stego-object by using some steganography tool, to find the steganography algorithm used to hide the information?", "options": { "A": "Known-message attack", "B": "Chosen-message attack", "C": "Known-stego attack", "D": "Known-cover attack" }, "answer": "B" }, { "question": "What does the MFT (Master File Table) track in NTFS file systems?", "options": { "A": "Metadata for all files and directories", "B": "Network connections", "C": "System event logs", "D": "User account permissions" }, "answer": "A" }, { "question": "An 'idle' system is also referred to as what?", "options": { "A": "Bot", "B": "PC not being used", "C": "PC not connected to the Internet", "D": "Zombie" }, "answer": "B" }, { "question": "Which of the following is a list of recently used programs or opened files?", "options": { "A": "Most Recently Used (MRU)", "B": "GUID Partition Table (GPT)", "C": "Recently Used Programs (RUP)", "D": "Master File Table (MFT)" }, "answer": "A" }, { "question": "How many times can data be written to a DVD+R disk?", "options": { "A": "Infinite", "B": "Zero", "C": "Once", "D": "Twice" }, "answer": "C" }, { "question": "A packet is sent to a router that does not have the packet destination address in its route table. How will the packet get to its proper destination?", "options": { "A": "Gateway of last resort", "B": "Root Internet servers", "C": "Border Gateway Protocol", "D": "Reverse DNS" }, "answer": "A" }, { "question": "The rule of thumb when shutting down a system is to pull the power plug. However, it has certain drawbacks. Which of the following would that be?", "options": { "A": "All running processes will be lost", "B": "Any data not yet flushed to the system will be lost", "C": "The /tmp directory will be flushed", "D": "Power interruption will corrupt the pagefile" }, "answer": "B" }, { "question": "Which command line tool is used to determine active network connections?", "options": { "A": "nbstat", "B": "netstat", "C": "nslookup", "D": "netsh" }, "answer": "B" }, { "question": "What does 254 represent in ICCID 89254021520014515744?", "options": { "A": "Issuer Identifier Number", "B": "Industry Identifier Prefix", "C": "Individual Account Identification Number", "D": "Country Code" }, "answer": "D" }, { "question": "To make sure the evidence you recover and analyze with computer forensics software can be admitted in court, you must test and validate the software. What group is actively providing tools and creating procedures for testing and validating computer forensics software ?", "options": { "A": "National Institute of Standards and Technology (NIST)", "B": "Society for Valid Forensics Tools and Testing (SVFTT)", "C": "Computer Forensics Tools and Validation Committee (CFTVC)", "D": "Association of Computer Forensics Software Manufactures (ACFSM)" }, "answer": "A" }, { "question": "You are called in to assist the police in an investigation involving a suspected drug dealer. The police searched the suspect house after a warrant was obtained and they located a floppy disk in the suspect bedroom. The disk contains several files, but they appear to be password protected. What are two common methods used by password cracking software that you could use to obtain the password?", "options": { "A": "Brute force and dictionary attack", "B": "Minimum force and appendix attack", "C": "Maximum force and dictionary attack", "D": "Limited force and library attack" }, "answer": "A" }, { "question": "At what layer of the OSI model do routers function on?", "options": { "A": "4", "B": "3", "C": "1", "D": "5" }, "answer": "B" }, { "question": "A forensics investigator needs to copy data from a computer to some type of removable media so he can examine the information at another location. The problem is that the data is around 42GB in size. What type of removable media could the investigator use?", "options": { "A": "Blu-Ray dual-layer", "B": "DVD-18", "C": "HD-DVD", "D": "Blu-Ray single-layer" }, "answer": "A" }, { "question": "An on-site incident response team is called to investigate an alleged case of computer tampering within their company. Before proceeding with the investigation the CEO informs them that the incident will be classified as low level. How long will the team have to respond to the incident?", "options": { "A": "Immediately", "B": "Two working days", "C": "It depends on company policies, which can vary from one organization to another", "D": "One week" }, "answer": "C" }, { "question": "Which of the following technique creates a replica of an evidence media?", "options": { "A": "Data Deduplication", "B": "Bit Stream Imaging", "C": "Data Extraction", "D": "Backup" }, "answer": "B" }, { "question": "An executive has leaked the company trade secrets through an external drive. What process should the investigation team take if they could retrieve his system?", "options": { "A": "Real-Time Analysis", "B": "Postmortem Analysis", "C": "Malware Analysis", "D": "Packet Analysis" }, "answer": "B" }, { "question": "Which table is used to convert huge word lists (i .e. dictionary files and brute-force lists) into password hashes?", "options": { "A": "Hash tables", "B": "Master file tables", "C": "Rainbow tables", "D": "Database tables" }, "answer": "C" }, { "question": "Korey, a data mining specialist in a knowledge processing firm DataHub.com, reported his CISO that he has lost certain sensitive data stored on his laptop. The CISO wants his forensics investigation team to find if the data loss was accident or intentional. In which of the following category this case will fall?", "options": { "A": "Both Civil and Criminal Investigations", "B": "Civil Investigation", "C": "Administrative Investigation", "D": "Criminal Investigation" }, "answer": "C" }, { "question": "Which of the following are small pieces of data sent from a website and stored on the user's computer by the user's web browser to track, validate, and maintain specific user information?", "options": { "A": "Open files", "B": "Web Browser Cache", "C": "Temporary Files", "D": "Cookies" }, "answer": "D" }, { "question": "A forensic investigator is a person who handles the complete Investigation process, that is, the preservation, identification, extraction, and documenting evidence. The investigator has many roles and responsibilities relating to the cybercrime analysis. The role of the forensic investigator is to:", "options": { "A": "Take permission from all employees of the organization for investigation", "B": "Harden organization network security", "C": "Keep the evidence a highly confidential and hide the evidence from law enforcement agencies", "D": "Create an image backup of the original evidence without tampering with potential evidence" }, "answer": "D" }, { "question": "Your company's network just finished going through a SAS 70 audit. This audit reported that overall, your network is secure, but there are some areas for improvement. The major area was SNMP security. The audit company recommended turning off SNMP, but that is not an option since you have so many remote nodes to keep track of. What step could you take to help secure SNMP on your network?", "options": { "A": "Block access to UDP port 171", "B": "Block access to TCP port 171", "C": "Block all internal MAC address from using SNMP", "D": "Change the default community string names" }, "answer": "D" }, { "question": "Which tool allows dumping the contents of process memory without stopping the process?", "options": { "A": "pmdump.exe", "B": "pdump.exe", "C": "processdump.exe", "D": "psdump.exe" }, "answer": "A" }, { "question": "What is the primary purpose of the Sleuth Kit framework?", "options": { "A": "Disk image analysis", "B": "Memory forensics", "C": "Malware sandboxing", "D": "Network packet analysis" }, "answer": "A" }, { "question": "Which component of a forensic report is most critical for legal proceedings?", "options": { "A": "Technical specifications", "B": "Recommendations section", "C": "Methodology documentation", "D": "Executive summary" }, "answer": "C" }, { "question": "Tracks numbering on a hard disk begins at 0 from the outer edge and moves towards the center, typically reaching a value of _____.", "options": { "A": "2023", "B": "1024", "C": "1020", "D": "1023" }, "answer": "D" }, { "question": "After undergoing an external IT audit, George realizes his network is vulnerable to DDoS attacks. What countermeasures could he take to prevent DDoS attacks?", "options": { "A": "Enable direct broadcasts", "B": "Enable BGP", "C": "Disable direct broadcasts", "D": "Disable BGP" }, "answer": "C" }, { "question": "Which of the following tool is used to locate IP addresses?", "options": { "A": "Towelroot", "B": "XRY LOGICAL", "C": "SmartWhois", "D": "Deep Log Analyzer" }, "answer": "C" }, { "question": "Which of the following tools enables data acquisition and duplication?", "options": { "A": "DriveSpy", "B": "Wireshark", "C": "Xplico", "D": "Colasoft's Capsa" }, "answer": "A" }, { "question": "What is the role of Alloc.c in Apache core?", "options": { "A": "It handles allocation of resource pools", "B": "It takes care of all the data exchange and socket connections between the client and the server", "C": "It is useful for reading and handling of the configuration files", "D": "It handles server start-ups and timeouts" }, "answer": "A" }, { "question": "Randy has extracted data from an old version of a Windows-based system and discovered info file Dc5.txt in the system recycle bin. What does the file name denote?", "options": { "A": "A text file deleted from C drive in fifth sequential order", "B": "A text file deleted from C drive in sixth sequential order", "C": "A text file copied from D drive to C drive in fifth sequential order", "D": "A text file copied from C drive to D drive in fifth sequential order" }, "answer": "A" }, { "question": "Adam, a forensic analyst, is preparing VMs for analyzing a malware. Which of the following is NOT a best practice?", "options": { "A": "Using network simulation tools", "B": "Installing malware analysis tools", "C": "Enabling shared folders", "D": "Isolating the host device" }, "answer": "C" }, { "question": "CAN-SPAM act requires that you:", "options": { "A": "Don't tell the recipients where you are located", "B": "Don't use true header information", "C": "Don't use deceptive subject lines", "D": "Don't identify the message as an ad" }, "answer": "C" }, { "question": "Heather, a computer forensics investigator, is assisting a group of investigators working on a large computer fraud case involving over 20 people. These 20 people, working in different offices, allegedly siphoned off money from many different client accounts. Heather's responsibility is to find out how the accused people communicated between each other. She has searched their email and their computers and has not found any useful evidence. Heather then finds some possibly useful evidence under the desk of one of the accused. In an envelope she finds a piece of plastic with numerous holes cut out of it. Heather then finds the same exact piece of plastic with holes at many of the other accused peoples desks. Heather believes that the 20 people involved in the case were using a cipher to send secret messages in between each other. What type of cipher was used by the accused in this case?", "options": { "A": "Grill cipher", "B": "Visual semagram", "C": "Null cipher", "D": "Text semagram" }, "answer": "A" }, { "question": "A company's policy requires employees to perform file transfers using protocols which encrypt traffic. You suspect some employees are still performing file transfers using unencrypted protocols because the employees don't like changes. You have positioned a network sniffer to capture traffic from the laptop the employees in the data ingest department. Using Wireshark to examine the captured traffic, which command can be used as a display filter to find unencrypted transfers?", "options": { "A": "tcp.port != 21", "B": "tcp.port = 23", "C": "tcp.port == 21 || tcp.port == 22", "D": "tcp.port == 21" }, "answer": "D" }, { "question": "An employee is attempting to wipe out data stored on a couple of compact discs (CDs) and digital video discs (DVDs) by using a large magnet. You inform her this method will not be effective in wiping out the data because CDs and DVDs are ____ media used to store large amounts of data and are not affected by magnets.", "options": { "A": "Optical", "B": "Magnetic", "C": "Anti-Magnetic", "D": "Logical" }, "answer": "A" }, { "question": "What is the primary purpose of the NTFS $LogFile?", "options": { "A": "Track file system transactions", "B": "Store user activity logs", "C": "Maintain system backups", "D": "Record security events" }, "answer": "A" }, { "question": "What does a high number of NOP instructions (x90) in assembly code suggest?", "options": { "A": "Legitimate compiler output", "B": "Buffer overflow attempt", "C": "Network communication", "D": "Code optimization" }, "answer": "B" }, { "question": "Which of the following Windows-based tool displays who is logged onto a computer, either locally or remotely?", "options": { "A": "TCPView", "B": "PSLoggedon", "C": "Tokenmon", "D": "Process Monitor" }, "answer": "B" }, { "question": "Which timestamp is most likely to be altered by anti-forensic techniques?", "options": { "A": "Registry modification times", "B": "BIOS time", "C": "MAC times", "D": "Network log timestamps" }, "answer": "C" }, { "question": "Shortcuts are the files with the extension .Ink that are created and are accessed by the users. These files provide you with information about:", "options": { "A": "Application logs", "B": "Running application", "C": "System logs", "D": "Files or network shares" }, "answer": "D" }, { "question": "This type of testimony is presented by someone who does the actual fieldwork and does not offer a view in court.", "options": { "A": "Technical testimony", "B": "Expert testimony", "C": "Civil litigation testimony", "D": "Victim advocate testimony" }, "answer": "A" }, { "question": "You just passed your ECSA exam and are about to start your first consulting job running security audits for a financial institution in Los Angeles. The company you will be working for tries to see if you remember your ECSA class. He asks about the methodology you will be using to test the company's network. How would you answer?", "options": { "A": "IBM Methodology", "B": "LPT Methodology", "C": "Microsoft Methodology", "D": "Google Methodology" }, "answer": "B" }, { "question": "What does a large volume of ICMP traffic suggest?", "options": { "A": "DDoS preparation", "B": "SQL-injection", "C": "Data exfiltration", "D": "C2 communication" }, "answer": "A" }, { "question": "One technique for hiding information is to change the file extension from the correct one to one that might not be noticed by an investigator. For example a '.jpg' extension to a '.doc' extension so that a picture file appears to be a document. What can an investigator examine to verify that a file has the correct extension?", "options": { "A": "the File Allocation Table", "B": "the file footer", "C": "the sector map", "D": "the file header" }, "answer": "D" }, { "question": "Which of the following hashing algorithms is commonly used in digital evidence validation to create a binary or hexadecimal value representing the uniqueness of data such as a disk drive or file?", "options": { "A": "SHA3-512", "B": "SHA2-512", "C": "CRC-32", "D": "MD5" }, "answer": "D" }, { "question": "You are working in the Security Department of a law firm. One of the attorneys asks you about the topic of sending fake email because he has a client who has been charged with doing just that. His client alleges that he is innocent and that there is no way for a fake email to actually be sent. You inform the attorney that his client is mistaken and that fake email is a possibility and that you can prove it. You return to your desk and craft a fake email to the attorney that appears to come from his boss. What port do you send the email to on the company SMTP server?fake email to the attorney that appears to come from his boss. What port do you send the email to on the company? SMTP server?", "options": { "A": "10", "B": "110", "C": "135", "D": "25" }, "answer": "D" }, { "question": "Which legal document allows law enforcement to search an office, place of business, or other locale for evidence relating to an alleged crime?", "options": { "A": "search warrant", "B": "wire tap", "C": "subpoena", "D": "bench warrant" }, "answer": "A" }, { "question": "Graphics Interchange Format (GIF) is a _____ RGB bitmap image format for images with up to 256 distinct colors per frame.", "options": { "A": "16-bit", "B": "32-bit", "C": "24-bit", "D": "8-bit" }, "answer": "D" }, { "question": "Which technique is used to detect sandbox analysis environments?", "options": { "A": "Domain generation algorithms", "B": "Code obfuscation", "C": "Port scanning", "D": "Human interaction checks" }, "answer": "D" }, { "question": "What does the Rule 101 of Federal Rules of Evidence states?", "options": { "A": "Rulings on Evidence", "B": "Scope of the Rules, where they can be applied", "C": "Limited Admissibility of the Evidence", "D": "Purpose of the Rules" }, "answer": "B" }, { "question": "Attackers can manipulate variables that reference files with \"dot-dot-slash (./)\" sequences and their variations such as https://www.dfbench-dataset.com/GET/process.php./././././././././etc/passwd.", "options": { "A": "File injection", "B": "XSS attack", "C": "Directory traversal", "D": "SQL Injection" }, "answer": "C" }, { "question": "Which attribute verifies the integrity of a forensic image?", "options": { "A": "Hash value", "B": "Compression ratio", "C": "Write blocker", "D": "Creation timestamp" }, "answer": "A" }, { "question": "When the operating system marks cluster as used, but does not allocate them to any file, such clusters are known as ____.", "options": { "A": "Empty clusters", "B": "Bad clusters", "C": "Unused clusters", "D": "Lost clusters" }, "answer": "D" }, { "question": "Which registry key stores Windows service configurations?", "options": { "A": "HKEY_USERS\\.DEFAULT", "B": "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services", "C": "HKEY_CLASSES_ROOT\\CLSID", "D": "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows" }, "answer": "B" }, { "question": "Why would a company issue a dongle with the software they sell?", "options": { "A": "To provide source code protection", "B": "To provide wireless functionality with the software", "C": "To provide copyright protection", "D": "To ensure that keyloggers cannot be used" }, "answer": "C" }, { "question": "Which is not a part of environmental conditions of a forensics lab?", "options": { "A": "Good cooling system to overcome excess heat generated by the work station", "B": "Open windows facing the public road", "C": "Large dimensions of the room", "D": "Allocation of workstations as per the room dimensions" }, "answer": "B" }, { "question": "As a security analyst conducting a phishing simulation, you create a fake survey website that asks employees to enter a username and a strong password. After distributing the link company-wide, what type of useful information are you most likely to collect from employees who interact with the site?", "options": { "A": "The usernames and passwords submitted through the fake website", "B": "Employees' bank account and routing numbers", "C": "An attacker cannot obtain any meaningful or useful information by simply using a fake website", "D": "The IP addresses and MAC addresses of the employees' devices" }, "answer": "A" }, { "question": "You are working for a large clothing manufacturer as a computer forensics investigator and are called in to investigate an unusual case of an employee possibly stealing clothing designs from the company and selling them under a different brand name for a different company. What you discover during the course of the investigation is that the clothing designs are actually original products of the employee and the company has no policy against an employee selling his own designs on his own time. The only thing that you can find that the employee is doing wrong is that his clothing design incorporates the same graphic symbol as that of the company with only the wording in the graphic being different. What area of the law is the employee violating?", "options": { "A": "printright law", "B": "copyright law", "C": "trademark law", "D": "brandmark law" }, "answer": "C" }, { "question": "Gary is checking for the devices connected to USB ports of a suspect system during an investigation. Select the appropriate tool that will help him document all the connected devices.", "options": { "A": "fsutil", "B": "Reg.exe", "C": "Devcon", "D": "DevScan" }, "answer": "C" }, { "question": "What is the primary purpose of the dd command in Linux forensics?", "options": { "A": "Create disk images", "B": "Analyze memory dumps", "C": "Decrypt encrypted volumes", "D": "Recover deleted files" }, "answer": "A" }, { "question": "Which of the following Wi-Fi chalking methods refers to drawing symbols in public places to advertise open Wi-Fi networks?", "options": { "A": "WarChalking", "B": "WarDhving", "C": "WarFlying", "D": "WarWalking" }, "answer": "A" }, { "question": "NTFS sets a flag for the file once you encrypt it and creates an EFS attribute where it stores Data Decryption Field (DDF) and Data Recovery Field (DDR). Which of the following is not a part of DDF?", "options": { "A": "Container Name", "B": "EFS Certificate Hash", "C": "Encrypted FEK", "D": "Checksum" }, "answer": "D" }, { "question": "When using Windows acquisitions tools to acquire digital evidence, it is important to use a well-tested hardware write-blocking device to:", "options": { "A": "Avoiding copying data from the boot partition", "B": "Automate Collection from image files", "C": "Acquire data from host-protected area on a disk", "D": "Prevent Contamination to the evidence drive" }, "answer": "D" }, { "question": "Which of the following is a device monitoring tool?", "options": { "A": "Capsa", "B": "Driver Detective", "C": "RAM Capturer", "D": "Regshot" }, "answer": "A" }, { "question": "Your company uses Cisco routers exclusively throughout the network. After securing the routers to the best of your knowledge, an outside security firm is brought in to assess the network security. Although they found very few issues, they enumerate the model, OS version, and capabilities for all your Cisco routers with very little effort. Which feature will you disable to eliminate the ab enumerate this information on your Cisco routers?", "options": { "A": "Broadcast System Protocol", "B": "Simple Network Management Protocol", "C": "Border Gateway Protocol", "D": "Cisco Discovery Protocol" }, "answer": "D" }, { "question": "Which log would contain failed login attempts on a Linux system?", "options": { "A": "/var/log/kern.log", "B": "/var/log/dmesg", "C": "/var/log/syslog", "D": "/var/log/auth.log" }, "answer": "D" }, { "question": "What layer of the OSI model do TCP and UDP utilize?", "options": { "A": "Session", "B": "Network", "C": "Data Link", "D": "Transport" }, "answer": "D" }, { "question": "Which of the following information is displayed when Netstat is used with -ano switch?", "options": { "A": "Contents of IP routing table", "B": "Details of routing table", "C": "Details of TCP and UDP connections", "D": "Ethernet statistics" }, "answer": "C" }, { "question": "Which of the following stand true for BIOS Parameter Block?", "options": { "A": "The BIOS Partition Block always refers to the 512-byte boot sector", "B": "The length of BIOS Partition Block remains the same across all the file systems", "C": "The BIOS Partition Block is the first sector of a data storage device", "D": "The BIOS Partition Block describes the physical layout of a data storage volume" }, "answer": "D" }, { "question": "Which of the following file system uses Master File Table (MFT) database to store information about every file and directory on a volume?", "options": { "A": "exFAT", "B": "FAT File System", "C": "ReFS", "D": "NTFS File System" }, "answer": "D" }, { "question": "What does the 'Live Response' phase in incident handling typically involve?", "options": { "A": "Collecting volatile data", "B": "Writing final reports", "C": "Employee training", "D": "Long-term system monitoring" }, "answer": "A" }, { "question": "You have used a newly released forensic investigation tool, which doesn't meet the Daubert Test, during a case. The case has ended-up in court. What argument could the defense make to weaken your case?", "options": { "A": "Only the local law enforcement should use the tool", "B": "You are not certified for using the tool", "C": "The total has not been reviewed and accepted by your peers", "D": "The tool hasn't been tested by the International Standards Organization (ISO)" }, "answer": "C" }, { "question": "Hard disk data addressing is a method of allotting addresses to each ___ of data on a hard disk", "options": { "A": "Logical block", "B": "Hard disk block", "C": "Operating system block", "D": "Physical block" }, "answer": "D" }, { "question": "Which of the following is a responsibility of the first responder?", "options": { "A": "Collect as much information about the incident as possible", "B": "Share the collected information to determine the root cause", "C": "Determine the severity of the incident", "D": "Document the findings" }, "answer": "A" }, { "question": "Which network protocol is commonly abused by malware for C2 communication?", "options": { "A": "HTTP/HTTPS", "B": "FTP", "C": "SMTP", "D": "SSH" }, "answer": "A" }, { "question": "Click on the Exhibit Button To test your website for vulnerabilities, you type in a Quotation mark (?) for the username field. After you click Ok, you received an error message window from the database: What can you infer from this error window?", "options": { "A": "The user for line 3306 in the SQL database has a weak password", "B": "The Quotation mark (?) is a valid username", "C": "SQL injection is possible", "D": "SQL injection is not possible" }, "answer": "C" }, { "question": "Rusty, a computer forensics apprentice, uses the command nbtstat -c while analyzing the network information in a suspect system. What information is he looking for?", "options": { "A": "Contents of the network routing table", "B": "Status of the network carrier", "C": "Network connections", "D": "Contents of the NetBIOS name cache" }, "answer": "D" }, { "question": "As a CHFI professional, which of the following is the most important to your professional reputation?", "options": { "A": "Your Certifications", "B": "The free that you charge", "C": "The friendship of local law enforcement officers", "D": "The correct, successful management of each and every case" }, "answer": "D" }, { "question": "You have compromised a lower-level administrator account on an Active Directory network of a small company in Dallas, Texas. You discover Domain Control through enumeration. You connect to one of the Domain Controllers on port 389 using ldp.exe. What are you trying to accomplish here?", "options": { "A": "Establish a remote connection to the Domain Controller", "B": "Enumerate domain user accounts and built-in groups", "C": "Enumerate MX and A records from DNS", "D": "Poison the DNS records with false records" }, "answer": "B" }, { "question": "You setup SNMP in multiple offices of your company. Your SNMP software manager is not receiving data from other offices like it is for your main office. You suspect that firewall changes are to blame. What ports should you open for SNMP to work through Firewalls?", "options": { "A": "163,164", "B": "161,163", "C": "161,162", "D": "443,8080" }, "answer": "C" }, { "question": "What is the purpose of anti-debugging techniques in malware?", "options": { "A": "Prevent reverse engineering", "B": "Enhance encryption", "C": "Avoid network detection", "D": "Improve performance" }, "answer": "A" }, { "question": "An Expert witness gives an opinion if:", "options": { "A": "To deter the witness from expanding the scope of his or her investigation beyond the requirements of the case", "B": "The Opinion, inferences or conclusions depend on special knowledge, skill or training not within the ordinary experience of lay jurors", "C": "To define the issues of the case for determination by the finder of fact", "D": "To stimulate discussion between the consulting expert and the expert witness" }, "answer": "B" }, { "question": "What does the presence of 'GetProcAddress' and 'LoadLibrary' APIs indicate?", "options": { "A": "File compression", "B": "Network communication", "C": "Legitimate program", "D": "Dynamic API resolution" }, "answer": "D" }, { "question": "Jessica works as systems administrator for a large electronics firm. She wants to scan her network quickly to detect live hosts by using ICMP ECHO Requests. What type of scan is Jessica going to perform?", "options": { "A": "Ping trace", "B": "ICMP ping sweep", "C": "Smurf scan", "D": "Tracert" }, "answer": "B" }, { "question": "An investigator enters the command sqlcmd -S WIN-CQQMK62867E -e -s\",\" -E as part of collecting the primary data file and logs from a database. What does 'WIN-CQQMK62867E' represent?", "options": { "A": "Operating system of the system", "B": "Name of the Database", "C": "Name of SQL Server", "D": "Network credentials of the database" }, "answer": "C" }, { "question": "Which of the following Linux command searches through the current processes and lists the process IDs those match the selection criteria to stdout?", "options": { "A": "pstree", "B": "grep", "C": "pgrep", "D": "ps" }, "answer": "C" }, { "question": "Norbert is setting up a wireless network for his business that he runs out of his home. He has followed all the directions from the ISP as well as the wirless router manual. He does not have any encryption set and the SSID is being broadcast. On his laptop, he can pick up the wireless signal for short periods of time the connection drops and the signal goes away. Eventually the wireless signal shows back up, but drops intermittently. What could be Norbert's issue with his wireless network?", "options": { "A": "CB radio", "B": "Computers on his wired network", "C": "2.4Ghz Cordless phones", "D": "Satellite television" }, "answer": "C" }, { "question": "What type of attack sends spoofed UDP packets (instead of ping packets) with a fake source address to the IP broadcast address of a large network?", "options": { "A": "Smurf scan", "B": "Fraggle", "C": "SYN flood", "D": "Teardrop" }, "answer": "B" }, { "question": "Which tool is primarily used for memory forensics analysis?", "options": { "A": "Autopsy", "B": "Volatility", "C": "FTK Imager", "D": "Wireshark" }, "answer": "B" }, { "question": "Which Is a Linux journaling file system?", "options": { "A": "HFS", "B": "BFS", "C": "Ext3", "D": "FAT" }, "answer": "C" }, { "question": "What is the primary purpose of the 'PhotoRec' tool?", "options": { "A": "Recover deleted photos", "B": "Analyze camera metadata", "C": "Decrypt image files", "D": "Carve files from raw data" }, "answer": "D" }, { "question": "How many characters long is the fixed-length MD5 algorithm checksum of a critical system file?", "options": { "A": "16", "B": "32", "C": "128", "D": "64" }, "answer": "B" }, { "question": "When investigating a wireless attack, what information can be obtained from the DHCP logs?", "options": { "A": "The operating system of the attacker and victim computers", "B": "MAC address of the attacker", "C": "IP traffic between the attacker and the victim", "D": "If any computers on the network are running in promiscuous mode" }, "answer": "B" }, { "question": "The offset in a hexadecimal code is:", "options": { "A": "The 0x at the end of the code", "B": "The first byte after the colon", "C": "The last byte after the colon", "D": "The 0x at the beginning of the code" }, "answer": "B" }, { "question": "What feature of Decryption Collection allows an investigator to crack a password as quickly as possible?", "options": { "A": "Cracks every password in 10 minutes", "B": "Support for MD5 hash verification", "C": "Support for Encrypted File System", "D": "Distribute processing over 16 or fewer computers" }, "answer": "D" }, { "question": "Which tool is used to unpack malware?", "options": { "A": "md5sum", "B": "OllyDbg", "C": "Autopsy", "D": "Snort" }, "answer": "B" }, { "question": "Robert is a regional manager working in a reputed organization. One day, he suspected malware attack after unwanted programs started to popup after logging into his computer. The network administrator was called upon to trace out any intrusion on the computer and they finds that suspicious activity has taken place within Autostart locations. In this situation, which of the following tools is used by the network administrator to detect any intrusion on a system?", "options": { "A": "Process Monitor", "B": "Internet Evidence Finder", "C": "Report Viewer", "D": "Hex Editor" }, "answer": "A" }, { "question": "Charles has accidentally deleted an important file while working on his Mac computer. He wants to recover the deleted file as it contains some of his critical business secrets. Which of the following tool will help Charles?", "options": { "A": "Xplico", "B": "Colasoft's Capsa", "C": "DriveSpy", "D": "FileSalvage" }, "answer": "D" }, { "question": "An investigator has acquired packed software and needed to analyze it for the presence of malice. Which of the following tools can help in finding the packaging software used?", "options": { "A": "SysAnalyzer", "B": "Dependency Walker", "C": "PEiD", "D": "Comodo Programs Manager" }, "answer": "C" }, { "question": "Which of the following stages in a Linux boot process involve initialization of the system's hardware?", "options": { "A": "Bootloader Stage", "B": "BootROM Stage", "C": "Kernel Stage", "D": "BIOS Stage" }, "answer": "D" }, { "question": "The need for computer forensics is highlighted by an exponential increase in the number of cybercrimes and litigations where large organizations were in Computer forensics plays an important role in tracking the cyber criminals. The main role of computer forensics is to:", "options": { "A": "Extract, process, and interpret the factual evidence so that it proves the attacker's actions in the court", "B": "Document monitoring processes of employees of the organization", "C": "Harden organization perimeter security", "D": "Maximize the investigative potential by maximizing the costs" }, "answer": "A" }, { "question": "Which US law does the interstate or international transportation and receiving of child pornography fall under?", "options": { "A": "Both A and B", "B": "18 U.S. Code \u00a7 2521A", "C": "18 U.S. Code \u00a7 1466A", "D": "None of the above" }, "answer": "C" }, { "question": "Chong-lee, a forensics executive, suspects that a malware is continuously making copies of files and folders on a victim system to consume the available space. What type of test would confirm his claim?", "options": { "A": "Dynamic analysis", "B": "Identifying file obfuscation", "C": "Static analysis", "D": "File fingerprinting" }, "answer": "A" }, { "question": "Norbert discovered a file named $RIYG6VR.doc in the C:\\$Recycle.Bin\\\\ while analyzing a hard disk image for the deleted data. What inferences can he make from the file name?", "options": { "A": "RIYG6VR.doc is the name of the doc file deleted from the system", "B": "It is a deleted doc file", "C": "It is a doc file deleted in seventh sequential order", "D": "It is file deleted from R drive" }, "answer": "B" }, { "question": "What is one method of bypassing a system BIOS password?", "options": { "A": "Remove all the system memory", "B": "Removing the CMOS battery", "C": "Removing the processor", "D": "Login to Windows and disable the BIOS password" }, "answer": "B" }, { "question": "What is the primary purpose of an incident response playbook?", "options": { "A": "Generate reports", "B": "Analyze malware", "C": "Store evidence", "D": "Document standard procedures" }, "answer": "D" }, { "question": "Checkpoint Firewall logs can be viewed through a Check Point Log viewer that uses icons and colors in the log table to represent different security event severity. What does the icon in the checkpoint logs represent?", "options": { "A": "The firewall dropped a connection", "B": "An email was marked as potential spam", "C": "The firewall rejected a connection", "D": "A virus was detected in an email" }, "answer": "A" }, { "question": "Event correlation is the process of finding relevance between the events that produce a final result. What type of correlation will help an organization to correlate events across a set of servers, systems, routers and network?", "options": { "A": "Same-platform correlation", "B": "Cross-platform correlation", "C": "Network-platform correlation", "D": "Multiple-platform correlation" }, "answer": "B" }, { "question": "Which technique attempts to hide network traffic within allowed protocols?", "options": { "A": "Packet fragmentation", "B": "MAC spoofing", "C": "Port scanning", "D": "DNS tunneling" }, "answer": "D" }, { "question": "What will the following command accomplish? C:\\> nmap -v -sS -Po 172.16.28.251 - data\\_length 66000 - packet\\_trace", "options": { "A": "Test the ability of a WLAN to handle fragmented packets", "B": "Test the ability of a router to handle under-sized packets", "C": "Test the ability of a router to handle fragmented packets", "D": "Test ability of a router to handle over-sized packets" }, "answer": "D" }, { "question": "Where should the investigator look for the Edge browser's browsing records, including history, cache, and cookies?", "options": { "A": "Virtual Memory", "B": "Sparse files", "C": "ESE Database", "D": "Slack Space" }, "answer": "C" }, { "question": "What is the purpose of 'mimikatz' in attacker toolkits?", "options": { "A": "Credential dumping", "B": "File encryption", "C": "Registry modification", "D": "Network sniffing" }, "answer": "A" }, { "question": "During the course of an investigation, you locate evidence that may prove the innocence of the suspect of the investigation. You must maintain an unbiased opinion and be objective in your entire fact finding process. Therefore, you report this evidence. This type of evidence is known as:", "options": { "A": "Terrible evidence", "B": "Exculpatory evidence", "C": "Mandatory evidence", "D": "Inculpatory evidence" }, "answer": "B" }, { "question": "Which of the following commands shows you the names of all open shared files on a server and the number of file locks on each file?", "options": { "A": "Net file", "B": "Net sessions", "C": "Net config", "D": "Net share" }, "answer": "A" }, { "question": "Norbert's company is in the process of undergoing a complete security audit including logical and physical security testing. After all logical tests were performed; it is now time for the physical round to begin. None of the employees are made aware of this round of testing. The security-auditing firm sends in a technician dressed as an electrician. He waits outside in the lobby for some employees to get to work and follows behind them when they access the restricted areas. After entering the main office, he is able to get into the server room telling the IT manager that there is a problem with the outlets in that room. What type of attack has the technician performed?", "options": { "A": "Man trap attack", "B": "Backtrapping", "C": "Fuzzing", "D": "Tailgating" }, "answer": "D" }, { "question": "What information do you need to recover when searching a victim's computer for a crime committed with specific e-mail message?", "options": { "A": "Firewall log", "B": "E-mail header", "C": "Username and password", "D": "Internet service provider information" }, "answer": "B" }, { "question": "What malware analysis operation can the investigator perform using the jv16 tool?", "options": { "A": "Registry Analysis/Monitoring", "B": "Network Traffic Monitoring/Analysis", "C": "Files and Folder Monitor", "D": "Installation Monitor" }, "answer": "A" }, { "question": "What is the primary purpose of a hex editor in digital forensics?", "options": { "A": "View and edit binary data", "B": "Generate forensic reports", "C": "Analyze network packets", "D": "Recover deleted partitions" }, "answer": "A" }, { "question": "Which type of wireless access control attack involves an attacker creating a fake access point outside an organization's premises to trick employees into connecting to it, potentially exposing sensitive data?", "options": { "A": "Fake-install method", "B": "Rogue access points", "C": "MAC spoofing", "D": "Ad hoc associations" }, "answer": "B" }, { "question": "Which technique is used to bypass heuristic analysis?", "options": { "A": "Polymorphic code", "B": "Code signing", "C": "Large file size", "D": "Clear text C2" }, "answer": "A" }, { "question": "Which technique hides malicious code in legitimate processes?", "options": { "A": "Phishing", "B": "ARP poisoning", "C": "MAC spoofing", "D": "DLL injection" }, "answer": "D" }, { "question": "A suspect is accused of violating the acceptable use of computing resources, as he has visited adult websites and downloaded images. The investigator wants to demonstrate that the suspect did indeed visit these sites. However, the suspect has cleared the search history and emptied the cookie cache. Moreover, he removed any images he might have downloaded. What can the investigator do to prove the violation?", "options": { "A": "Seek the help of co-workers who are eye-witnesses", "B": "Check the Windows registry for connection data (you may or may not recover)", "C": "Image the disk and try to recover deleted files", "D": "Approach the websites for evidence" }, "answer": "C" }, { "question": "Norbert and Tamas work at the same department in the company. Norbert wants to find out Tamas's network password so he can take a look at his documents on the file server. He enables Lophtcrack program to sniffing mode. Norbert sends Tamas an email with a link to 'Error! Reference source not found'. What information will he be able to gather from this?", "options": { "A": "The SAM file from Tamas computer", "B": "Tamas network username and password hash", "C": "The SID of Tamas network account", "D": "The network shares that Tamas has permissions" }, "answer": "B" }, { "question": "Before you are called to testify as an expert, what must an attorney do first?", "options": { "A": "qualify you as an expert witness", "B": "prove that the tools you used to conduct your examination are perfect", "C": "read your curriculum vitae to the jury", "D": "engage in damage control" }, "answer": "A" }, { "question": "Which of the following data structures stores attributes of a process, as well as pointers to other attributes and data structures?", "options": { "A": "EProcess", "B": "RegEdit", "C": "DumpChk", "D": "Lsproc" }, "answer": "A" }, { "question": "What is the purpose of using Obfuscator in malware?", "options": { "A": "Execute malicious code in the system", "B": "Avoid detection by security mechanisms", "C": "Propagate malware to other connected devices", "D": "Avoid encryption while passing through a VPN" }, "answer": "B" }, { "question": "Which part of Metasploit framework helps users to hide the data related to a previously deleted file or currently unused by the allocated file.", "options": { "A": "RuneFS", "B": "FragFS", "C": "Waffen FS", "D": "Slacker" }, "answer": "D" }, { "question": "In both pharming and phishing attacks an attacker can create websites that look similar to legitimate sites with the intent of collecting personal identity information from its victims. What is the difference between pharming and phishing attacks?", "options": { "A": "In a pharming attack a victim is redirected to a fake website by modifying their host configuration file or by exploiting vulnerabilities in DN", "B": "In a phishing attack a victim is redirected to a fake website by modifying their host configuration file or by exploiting vulnerabilities in DN", "C": "Both pharming and phishing attacks are purely technical and are not considered forms of social engineering", "D": "In a phishing attack an attacker provides the victim with a URL that is either misspelled or looks similar to the actual websites domain name" }, "answer": "A" }, { "question": "If a suspect computer is located in an area that may have toxic chemicals, you must:", "options": { "A": "assume the suspect machine is contaminated", "B": "determine a way to obtain the suspect computer", "C": "coordinate with the HAZMAT team", "D": "do not enter alone" }, "answer": "C" }, { "question": "What is the goal of forensic science?", "options": { "A": "Save the good will of the investigating organization", "B": "Mitigate the effects of the information security breach", "C": "To determine the evidential value of the crime scene and related evidence", "D": "It is a disciple to deal with the legal processes" }, "answer": "C" }, { "question": "Stephen is checking an image using Compare Files by The Wizard, and he sees the file signature is shown as FF D8 FF E1. What is the file type of the image?", "options": { "A": "jpeg", "B": "gif", "C": "png", "D": "bmp" }, "answer": "A" }, { "question": "If you come across a sheepdip machine at your client site, what would you infer?", "options": { "A": "A sheepdip coordinates several honeypots", "B": "A sheepdip computer is another name for a honeypot", "C": "A sheepdip computer defers a denial of service attack", "D": "A sheepdip computer is used only for virus-checking." }, "answer": "D" }, { "question": "Which of the following refers to the process of the witness being questioned by the attorney who called the latter to the stand?", "options": { "A": "Direct Examination", "B": "Expert Witness", "C": "Witness Authentication", "D": "Cross Questioning" }, "answer": "A" }, { "question": "Which of the following attacks allows an attacker to access restricted directories, including application source code, configuration and critical system execute commands outside of the web server's root directory?", "options": { "A": "Security misconfiguration", "B": "Directory traversal", "C": "Parameter/form tampering", "D": "Unvalidated input" }, "answer": "B" }, { "question": "In conducting a computer abuse investigation you become aware that the suspect of the investigation is using ABC Company as his Internet Service Provide (ISP). You contact the ISP and request that they provide you assistance with your investigation. What assistance can the ISP provide?", "options": { "A": "The ISP cannot conduct any type of investigations on anyone and therefore cannot assist you", "B": "ISPs never maintain log files so they would be of no use to your investigation", "C": "The ISP can investigate computer abuse committed by their employees, but must preserve the privacy of their customers and therefore cannot assist you without a warrant", "D": "The ISP can investigate anyone using their service and can provide you with assistance" }, "answer": "C" }, { "question": "What is the primary purpose of creating a forensic image?", "options": { "A": "Encrypt sensitive information", "B": "Remove irrelevant data from evidence", "C": "Create an exact copy of original media", "D": "Compress evidence for storage" }, "answer": "C" }, { "question": "Why is it still possible to recover files that have been emptied from the Recycle Bin on a Windows computer?", "options": { "A": "The data is still present until the original location of the file is overwritten", "B": "The data will reside in the L2 cache on a Windows computer until it is manually deleted", "C": "It is not possible to recover data that has been emptied from the Recycle Bin", "D": "The data is moved to the Restore directory and is kept there indefinitely" }, "answer": "A" }, { "question": "When a file is deleted by Windows Explorer or through the MS-DOS delete command, the operating system inserts ______ in the first letter position of the filename in the FAT database.", "options": { "A": "The lowercase Greek Letter Sigma (s)", "B": "The Underscore Symbol", "C": "A Blank Space", "D": "A Capital X" }, "answer": "A" }, { "question": "Jonathan is a network administrator who is currently testing the internal security of his network. He is attempting to hijack a session, using Ettercap, of a userconnected to his Web server. Why will Jonathan not succeed?", "options": { "A": "Only DNS traffic can be hijacked", "B": "HTTP protocol does not maintain session", "C": "Only FTP traffic can be hijacked", "D": "Only an HTTPS session can be hijacked" }, "answer": "B" }, { "question": "Why are Linux/Unix based computers better to use than Windows computers for idle scanning?", "options": { "A": "Windows computers are constantly talking", "B": "Windows computers will not respond to idle scans", "C": "Linux/Unix computers are constantly talking", "D": "Linux/Unix computers are easier to compromise" }, "answer": "A" }, { "question": "Which factor is most important when collecting evidence from IoT devices?", "options": { "A": "Wireless range", "B": "Physical size", "C": "Data volatility", "D": "Device processing power" }, "answer": "C" }, { "question": "WPA2 enhances security for both enterprise and Wi-Fi users by offering stronger data encryption and improved network access control. Which of the following encryption algorithms is used by WPA2??", "options": { "A": "AES-TKIP", "B": "RC4-CCMP", "C": "AES-CCMP", "D": "RC4-TKIP" }, "answer": "C" }, { "question": "Which Windows feature is abused by fileless malware?", "options": { "A": "Disk Defragmenter", "B": "Windows Script Host", "C": "Recycle Bin", "D": "Prefetch" }, "answer": "B" }, { "question": "Which log reveals PowerShell malicious activity?", "options": { "A": "PowerShell Operational log", "B": "Windows Defender logs", "C": "DNS server logs", "D": "System event log" }, "answer": "A" }, { "question": "What is the slave device connected to the secondary IDE controller on a Linux OS referred to?", "options": { "A": "hdd", "B": "hdb", "C": "hdc", "D": "hda" }, "answer": "A" }, { "question": "What is the following command trying to accomplish? \nC:\\> nmap -sU -p445 192.168.0.0/24", "options": { "A": "Verify that UDP port 445 is closed for the 192.168.0.0 network", "B": "Verify that UDP port 445 is open for the 192.168.0.0 network", "C": "Verify that NETBIOS is running for the 192.168.0.0 network", "D": "Verify that TCP port 445 is open for the 192.168.0.0 network" }, "answer": "B" }, { "question": "Which of the following statements is TRUE with respect to the Registry settings in the user start-up folder HKEY\\_CURRENT\\_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\RunOnce\\.", "options": { "A": "All the values in this key are executed at system start-up", "B": "The string specified in the value run executes when user logs on", "C": "All the values in this subkey run when specific user logs on, as this setting is user-specific", "D": "All values in this subkey run when specific user logs on and then the values are deleted" }, "answer": "D" }, { "question": "As part of a forensic investigation, Caroline, a forensic analyst, was tasked with examining the transaction logs of a database named Transfers. Using SQL Server Management Studio, she accessed the active transaction log files. Caroline needs to extract detailed information, including values such as AllocUnitId, Page ID, and Slot ID. Which of the following commands should she execute to retrieve at least the minimum level of detail required for this analysis?", "options": { "A": "DBCC LOG(Transfers, 0)", "B": "DBCC LOG(Transfers, 2)", "C": "DBCC LOG(Transfers, 3)", "D": "DBCC LOG(Transfers, 1)" }, "answer": "B" }, { "question": "Identify the term that refers to individuals who, by virtue of their knowledge and expertise, express an independent opinion on a matter related to a case based on the information that is provided", "options": { "A": "Forensic Examiner", "B": "Defense Witness", "C": "Evidence Examiner", "D": "Expert Witness" }, "answer": "D" }, { "question": "When needing to search for a website that is no longer present on the Internet today but was online few years back, what site can be used to view the we collection of pages?", "options": { "A": "Archive.org", "B": "Dnsstuff.com", "C": "Proxify.net", "D": "Samspade.org" }, "answer": "A" }, { "question": "Which among the following is an act passed by the U.S. Congress in 2002 to protect investors from the possibility of fraudulent accounting activities by corporations?", "options": { "A": "SOX", "B": "HIPAA", "C": "GLBA", "D": "FISMA" }, "answer": "A" }, { "question": "What feature of Windows is the following command trying to utilize?\nC:\\>type c:\\discovery.doc > c:\\windows\\system32\\sol.exe:discovery.doc", "options": { "A": "White space", "B": "ADS", "C": "Slack file", "D": "AFS" }, "answer": "B" }, { "question": "Which of the following attacks allows the attacker to acquire access to the communication channels between the victim and server to extract the information?", "options": { "A": "Rainbow attack", "B": "Man-in-the-middle (MITM) attack", "C": "Distributed network attack", "D": "Replay attack" }, "answer": "B" }, { "question": "How many bits is Source Port Number in TCP Header packet?", "options": { "A": "32", "B": "48", "C": "64", "D": "16" }, "answer": "D" }, { "question": "Tasklist command displays a list of applications and services with their Process ID (PID) for all tasks running on either a local or a remote computer. Which of the following tasklist commands provides information about the listed processes, including the image name, PID, name, and number of the session for the process?", "options": { "A": "tasklist/s", "B": "tasklist/u", "C": "tasklist/v", "D": "tasklist/p" }, "answer": "C" }, { "question": "What type of equipment would a forensics investigator store in a StrongHold bag?", "options": { "A": "Hard drives", "B": "PDA mobile device", "C": "Wireless cards", "D": "Backup tapes" }, "answer": "B" }, { "question": "You are a computer forensics investigator working with local police department and you are called to assist in an investigation of threatening emails. The complainant has printed out 27 email messages from the suspect and gives the printouts to you. You informed her that you will need to examine her computer because you need access to the ________ in order to track the emails back to the suspect.", "options": { "A": "Routing Table", "B": "Configuration files", "C": "Email Header", "D": "Firewall log" }, "answer": "C" }, { "question": "Which of the following Steganography techniques allows you to encode information that ensures creation of cover for secret communication?", "options": { "A": "Spread spectrum techniques", "B": "Transform domain techniques", "C": "Cover generation techniques", "D": "Substitution techniques" }, "answer": "C" }, { "question": "Linux operating system has two types of typical bootloaders namely LILO (Linux Loader) and GRUB (Grand Unified Bootloader). In which stage of the booting process do the bootloaders become active?", "options": { "A": "BIOS Stage", "B": "Bootloader Stage", "C": "Kernel Stage", "D": "BootROM Stage" }, "answer": "B" }, { "question": "Smith, as a part his forensic investigation assignment, seized a mobile device. He was asked to recover the Subscriber Identity Module (SIM card) data in the mobile device. Smith found that the SIM was protected by a Personal Identification Number (PIN) code, but he was also aware that people generally leave numbers to the defaults or use easily guessable numbers such as 1234. He made three unsuccessful attempts, which blocked the SIM card. What can Norbert do in this scenario to reset the PIN and access SIM data?", "options": { "A": "He should contact the network operator for Personal Unlock Number (PUK)", "B": "He should contact the network operator for a Temporary Unlock Code (TUK)", "C": "He can attempt PIN guesses after 24 hours", "D": "Use system and hardware tools to gain access" }, "answer": "A" }, { "question": "Shane has started the static analysis of a malware and is using the tool ResourcesExtract to find more details of the malicious program. What part of the analysis is he performing?", "options": { "A": "Strings search", "B": "File obfuscation", "C": "Dynamic analysis", "D": "Identifying File Dependencies" }, "answer": "A" }, { "question": "Which method is used to bypass passcodes on mobile devices?", "options": { "A": "Brute force attack", "B": "JTAG extraction", "C": "Social engineering", "D": "Network sniffing" }, "answer": "B" }, { "question": "What does the acronym POST mean as it relates to a PC?", "options": { "A": "Pre Operational Situation Test", "B": "Primary Operating System Test", "C": "Power On Self Test", "D": "Primary Operations Short Test" }, "answer": "C" }, { "question": "If you are concerned about a high level of compression but not concerned about any possible data loss, what type of compression would you use?", "options": { "A": "Lossy compression", "B": "Lossful compression", "C": "Lossless compression", "D": "Time-loss compression" }, "answer": "A" }, { "question": "When monitoring for both intrusion and security events between multiple computers, it is essential that the computers' clocks are synchronized. Synchronization allows an administrator to reconstruct what took place during an attack against multiple computers. Without synchronized time, it is very difficult to determine exactly when specific events took place, and how events interlace. What is the name of the service used to synchronize time among multiple computers?", "options": { "A": "Network Time Protocol", "B": "SyncTime Service", "C": "Time-Sync Protocol", "D": "Universal Time Set" }, "answer": "A" }, { "question": "Why is it a good idea to perform a penetration test from the internal network?", "options": { "A": "Because most of the attacks are from inside the organization", "B": "It is never a good idea to perform a penetration test from the inside", "C": "It is easier to hack from the inside", "D": "To attack a network from a hacker's perspective" }, "answer": "A" }, { "question": "What operating system would respond to the following command? C:\\> nmap -sW 10.10.145.65", "options": { "A": "Mac OS X", "B": "Windows XP", "C": "Windows 95", "D": "FreeBSD" }, "answer": "D" }, { "question": "Which of the following tools can the investigator use to analyze the network to detect Trojan activities?", "options": { "A": "RAM Computer", "B": "TRIPWIRE", "C": "Regshot", "D": "Capsa" }, "answer": "D" }, { "question": "Which of the following statements is TRUE about SQL Server error logs?", "options": { "A": "Trace files record, user-defined events, and specific system events", "B": "Forensic investigator uses SQL Server Profiler to view error log files", "C": "None of the above", "D": "SQL Server error logs record user-defined and specific system events" }, "answer": "D" }, { "question": "What binary coding is used most often for e-mail purposes?", "options": { "A": "MIME", "B": "Uuencode", "C": "SMTP", "D": "IMAP" }, "answer": "A" }, { "question": "You are a security analyst performing a penetration tests for a company in the Midwest. After some initial reconnaissance, you discover the IP addresses Cisco routers used by the company. You type in the following URL that includes the IP address of one of the routers: \nhttp://172.168.4.131/level/99/exec/show/config\nAfter typing in this URL, you are presented with the entire configuration file for that router. What have you discovered?", "options": { "A": "Cisco IOS HTTP Configuration Arbitrary Administrative Access Vulnerability", "B": "Cisco SQL-injection Offline Vulnerability", "C": "URL Obfuscation Arbitrary Administrative Access Vulnerability", "D": "Cisco Configuration Arbitrary Administrative Remote Code Execution Vulnerability" }, "answer": "A" }, { "question": "What does the command 'C:\\>wevtutil gl ' display?", "options": { "A": "Event log record structure", "B": "Configuration information of a specific Event Log", "C": "List of available Event Logs", "D": "Event logs are saved in .xml format" }, "answer": "B" }, { "question": "Printing under a Windows Computer normally requires which one of the following files types to be created?", "options": { "A": "CME", "B": "EME", "C": "MEM", "D": "EMF" }, "answer": "D" }, { "question": "When a user deletes a file, the system creates a $I file to store its details. What detail does the $I file not contain?", "options": { "A": "File origin and modification", "B": "File Name", "C": "File Size", "D": "Time and date of deletion" }, "answer": "A" }, { "question": "An intrusion detection system (IDS) gathers and analyzes information from within a computer or a network to identify any possible violations of security including unauthorized access, as well as misuse.", "options": { "A": "File integrity checking", "B": "Host-based intrusion detection", "C": "Network-based intrusion detection", "D": "Log file monitoring" }, "answer": "B" }, { "question": "The police believe that Melvin Matthew has been obtaining unauthorized access to computers belonging to numerous computer software and computer operatin systems manufacturers, cellular telephone manufacturers, Internet Service Providers and Educational Institutions. They also suspect that he has been stealing copying and misappropriating proprietary computer software belonging to the several victim companies. What is preventing the police from breaking down the suspects door and searching his home and seizing all of his computer equipment if they have not yet obtained a warrant?", "options": { "A": "The Good Samaritan Laws", "B": "The USA patriot Act", "C": "The Federal Rules of Evidence", "D": "The Fourth Amendment" }, "answer": "D" }, { "question": "File deletion is a way of removing a file from a computer's file system. What happens when a file is deleted in windows7?", "options": { "A": "Corresponding clusters in FAT are marked as used", "B": "The computer looks at the clusters occupied by that file and does not avails space to store a new file", "C": "The last letter of a file name is replaced by a hex byte code E5h", "D": "The operating system marks the file's name in the MFT with a special character that indicates that the file has been deleted" }, "answer": "D" }, { "question": "Harold is a security analyst who has just run the rdisk /s command to grab the backup SAM file on a computer. Where should Harold navigate on the computer to find the file?", "options": { "A": "%systemroot%\\repair", "B": "%systemroot%\\system32\\LSA", "C": "%systemroot%\\LSA", "D": "%systemroot%\\system32\\drivers\\etc" }, "answer": "A" }, { "question": "Which of the following options will help users to enable or disable the last access time on a system running Windows 10 OS?", "options": { "A": "Reg.exe", "B": "wmic service", "C": "fsutil", "D": "Devcon" }, "answer": "C" }, { "question": "Tamas, a black hat hacker, has embedded malware into a small enticing advertisement and posted it on a popular ad-network that displays across various websites. What is she doing?", "options": { "A": "Click-jacking", "B": "Spearphishing", "C": "Malvertising", "D": "Compromising a legitimate site" }, "answer": "C" }, { "question": "What does the presence of 'kernel32.dll!CreateRemoteThread' suggest?", "options": { "A": "Registry modification", "B": "File deletion", "C": "Network scanning", "D": "Process injection" }, "answer": "D" }, { "question": "Which of the following statements is true regarding SMTP Server?", "options": { "A": "SMTP Server breaks the recipient's address into Recipient's name and his/her designation before passing it to the DNS Server", "B": "SMTP Server breaks the recipient's address into Recipient's name and recipient's address before passing it to the DNS Server", "C": "SMTP Server breaks the recipient's address into Recipient's name and domain name before passing it to the DNS Server", "D": "SMTP Server breaks the recipient's address into Recipient's name and his/her initial before passing it to the DNS Server" }, "answer": "C" }, { "question": "Which of the following log injection attacks uses white space padding to create unusual log entries?", "options": { "A": "Terminal injection attack", "B": "Timestamp injection attack", "C": "HTML injection attack", "D": "Word wrap abuse attack" }, "answer": "D" }, { "question": "Computer security logs contain information about the events occurring within an organization's systems and networks. Application and Web server log files ae useful in detecting web attacks. The source, nature, and time of the attack can be determined by ____ of the compromised system.", "options": { "A": "Analyzing log files", "B": "Analyzing rainbow tables", "C": "Analyzing hard disk boot records", "D": "Analyzing SAM file" }, "answer": "A" }, { "question": "Hackers can gain access to Windows Registry and manipulate user passwords, DNS settings, access rights or others features that they may need in order to accomplish their objectives. One simple method for loading an application at startup is to add an entry (Key) to the following Registry Hive:", "options": { "A": "HKEY\\_CURRENT\\_USER\\Microsoft\\Default", "B": "HKEY\\_LOCAL\\_MACHINE\\hardware\\windows\\start", "C": "HKEY\\_LOCAL\\_MACHINE\\Software\\Microsoft\\CurrentVersion\\Run", "D": "HKEY\\_LOCAL\\_USERS\\Software\\Microsoft\\old\\Version\\Load" }, "answer": "C" }, { "question": "The efforts to obtain information before a trial by demanding documents, depositions, questions and answers written under oath, written requests for admissions of fact, and examination of the scene is a description of what legal term?", "options": { "A": "Discovery", "B": "Detection", "C": "Spoliation", "D": "Hearsay" }, "answer": "A" }, { "question": "Windows identifies which application to open a file with by examining which of the following?", "options": { "A": "The file Signature at the end of the file", "B": "The file signature at the beginning of the file", "C": "The file attributes", "D": "The File extension" }, "answer": "D" }, { "question": "What will the following Linux command accomplish? dd if=/dev/mem of=/home/sam/mem.bin bs=1024", "options": { "A": "Copy the master boot record to a file", "B": "Copy the contents of the system folder em?to a fileCopy the contents of the system folder ?em?to a file", "C": "Copy the running memory to a file", "D": "Copy the memory dump file to an image file" }, "answer": "C" }, { "question": "Which response organization tracks hoaxes as well as viruses?", "options": { "A": "NIPC", "B": "CIAC", "C": "NIST", "D": "FEDCIRC" }, "answer": "B" }, { "question": "Which of the following file formats allows the user to compress the acquired data as well as keep it randomly accessible?", "options": { "A": "No such format exist ", "B": "Advanced Forensic Framework 4", "C": "Proprietary Format", "D": "Advanced Forensics Format (AFF)" }, "answer": "D" }, { "question": "You are the security analyst working for a private company out of France. Your current assignment is to obtain credit card information from a Swiss bank that company. After initial reconnaissance, you discover that the bank security defenses are very strong and would take too long to penetrate. You decid the information by monitoring the traffic between the bank and one of its subsidiaries in London. After monitoring some of the traffic, you see a lot of traveling back and forth. You want to sniff the traffic and extract usernames and passwords. What tool could you use to get this information?", "options": { "A": "Snort", "B": "Airsnort", "C": "RaidSniff", "D": "Ettercap" }, "answer": "D" }, { "question": "How many sectors will a 125 KB file use in a FAT32 file system?", "options": { "A": "16", "B": "256", "C": "32", "D": "250" }, "answer": "D" }, { "question": "In a virtual test environment, Michael is testing the strength and security of BGP using multiple routers to mimic the backbone of the Internet. This project will help him write his doctoral thesis on \"bringing down the Internet\". Without sniffing the traffic between the routers, Michael sends millions of RESET packets routers in an attempt to shut one or all of them down. After a few hours, one of the routers finally shuts itself down. What will the other routers communicate between themselves?", "options": { "A": "The change in the routing fabric to bypass the affected router", "B": "More RESET packets to the affected router to get it to power back up", "C": "STOP packets to all other routers warning of where the attack originated", "D": "RESTART packets to the affected router to get it to power back up" }, "answer": "A" }, { "question": "In FAT32, where are the metadata and deletion status of files stored before and after deletion?", "options": { "A": "Directory entries", "B": "MFT", "C": "Cluster bitmap", "D": "FAT table" }, "answer": "A" }, { "question": "At what layer does a cross-site scripting (XSS) attack occur?", "options": { "A": "Data Link", "B": "Application", "C": "Presentation", "D": "Session" }, "answer": "B" }, { "question": "What do you call the process in which an attacker uses magnetic field over the digital media device to delete any previously stored data?", "options": { "A": "Disk degaussing", "B": "Disk cleaning", "C": "Disk magnetization", "D": "Disk deletion" }, "answer": "A" }, { "question": "What does the part of the log, '% SEC-6-IPACCESSLOGP', extracted from a Cisco router represent?", "options": { "A": "A packet matching the log criteria for the given access list has been detected (TCP or UDP)", "B": "Immediate action required messages", "C": "Some packet-matching logs were missed because the access list log messages were rate limited, or no access list log buffers were available", "D": "The system was not able to process the packet because there was not enough room for all of the desired IP header options" }, "answer": "A" }, { "question": "Which network attack is described by the following statement?\nAt least five Russian major banks came under a continuous hacker attack, although online client services were not disrupted. The attack came from a wide-scale botnet involving at least 24,000 computers, located in 30 countries.", "options": { "A": "Sniffer Attack", "B": "Man-in-the-Middle Attack", "C": "Buffer Overflow", "D": "DDoS" }, "answer": "D" }, { "question": "Buffer overflow vulnerability of a web application occurs when it fails to guard its buffer properly and allows writing beyond its maximum size. Thus, it overwrites the_________. There are multiple forms of buffer overflow, including a Heap Buffer Overflow and a Format String Attack.", "options": { "A": "Adjacent buffer locations", "B": "Adjacent string locations", "C": "Adjacent memory locations", "D": "Adjacent bit blocks" }, "answer": "C" }, { "question": "When investigating a Windows System, it is important to view the contents of the page or swap file because:", "options": { "A": "This is the file that windows use to store the history of the last 100 commands that were run from the command line", "B": "This is file that windows use to communicate directly with Registry", "C": "Windows stores all of the systems configuration information in this file", "D": "A Large volume of data can exist within the swap file of which the computer user has no knowledge" }, "answer": "D" }, { "question": "In which implementation of RAID will the image of a Hardware RAID volume be different from the image taken separately from the disks?", "options": { "A": "RAID 0", "B": "RAID 1", "C": "It will always be different", "D": "The images will always be identical because data is mirrored for redundancy" }, "answer": "A" }, { "question": "You have been asked to investigate after a user has reported a threatening e-mail they have received from an external source. Which of the following are you most interested in when trying to trace the source of the message?", "options": { "A": "The E-mail Header", "B": "The X509 Address", "C": "The Host Domain Name", "D": "The SMTP reply Address" }, "answer": "A" }, { "question": "You need to deploy a new web-based software package for your organization. The package requires three separate servers and needs to be available on the Internet. What is the recommended architecture in terms of server placement?", "options": { "A": "All three servers need to be placed internally", "B": "All three servers need to face the Internet so that they can communicate between themselves", "C": "A web server and the database server facing the Internet, an application server on the internal network", "D": "A web server facing the Internet, an application server on the internal network, a database server on the internal network" }, "answer": "D" }, { "question": "Deposition enables opposing counsel to preview an expert witness's testimony at trial. Which of the following deposition is not a standard practice?", "options": { "A": "Both attorneys are present", "B": "No jury or judge", "C": "Only one attorney is present", "D": "Opposing counsel asks questions" }, "answer": "C" }, { "question": "Corporate investigations are typically easier than public investigations because:", "options": { "A": "the investigator has to get a warrant", "B": "the users can load whatever they want on their machines", "C": "the users have standard corporate equipment and software", "D": "the investigator does not have to get a warrant" }, "answer": "D" }, { "question": "Which of the following is a record of the characteristics of a file system, including its size, the block size, the empty and the filled blocks and their respective counts, the size and location of the inode tables, the disk block map and usage information, and the size of the block groups?", "options": { "A": "Superblock", "B": "Inode bitmap block", "C": "Block bitmap block", "D": "Data block" }, "answer": "A" }, { "question": "Which type of attack is possible when attackers know some credible information about the victim's password, such as the password length, algorithms involved, or the strings and characters used in its creation?", "options": { "A": "Guess-the-password attack", "B": "Brute-Force Attack", "C": "Hybrid Password Guessing Attack", "D": "Dictionary Attack" }, "answer": "C" }, { "question": "Which file is a sequence of bytes organized into blocks understandable by the system's linker?", "options": { "A": "Object file", "B": "source file", "C": "None of these", "D": "executable file" }, "answer": "A" }, { "question": "What computer forensics technique can be used to identify all user accounts that have ever been created on a Windows 2000 server throughout its entire operational history?", "options": { "A": "review of SIDs in the Registry", "B": "forensic duplication of hard drive", "C": "analysis of volatile data", "D": "comparison of MD5 checksums" }, "answer": "A" }, { "question": "Norbert is the security administrator of ACMA Metal Corporation. One day he notices the company's Oracle database server has been compromised and the customer information along with financial data has been stolen. The financial loss will be in millions of dollars if the database gets into the hands of the competitors. Norbert wants to report this crime to the law enforcement agencies immediately. Which organization coordinates computer crimes investigations throughout the United States? (2025)", "options": { "A": "National Infrastructure Protection Center", "B": "Secret Service", "C": "Internet Fraud Complaint Center", "D": "Local or national office of the U.S. Secret Service" }, "answer": "A" }, { "question": "Event correlation is a procedure that is assigned with a new meaning for a set of events that occur in a predefined interval of time. Which type of correlation will you use if your organization wants to use different OS and network hardware platforms throughout the network?", "options": { "A": "Cross-platform correlation", "B": "Multiple-platform correlation", "C": "Network-platform correlation", "D": "Same-platform correlation" }, "answer": "A" }, { "question": "What is the primary challenge in cryptocurrency forensics?", "options": { "A": "Encryption standards", "B": "Large transaction volumes", "C": "Data volatility", "D": "Pseudo-anonymity" }, "answer": "D" }, { "question": "Norbert is using Firewalk to test the security of his Cisco PIX firewall. He is also utilizing a sniffer located on a subnet that resides deep inside his network. After analyzing the sniffer log files, he does not see any of the traffic produced by Firewalk. Why is that?", "options": { "A": "Firewalk sets all packets with a TTL of one", "B": "Firewalk cannot be detected by network sniffers", "C": "Firewalk sets all packets with a TTL of zero", "D": "Firewalk cannot pass through Cisco firewalls" }, "answer": "A" }, { "question": "Which root folder (hive) of registry editor contains a vast array of configuration information for the system, including hardware settings and software", "options": { "A": "HKEY\\_CURRENT\\_USER", "B": "HKEY\\_LOCAL\\_MACHINE", "C": "HKEY\\_USERS", "D": "HKEY-CURRENT\\_CONFIG" }, "answer": "B" }, { "question": "Which of the following is a tool to reset Windows admin password?", "options": { "A": "TestDisk for Windows", "B": "R-Studio", "C": "Windows Password Recovery Bootdisk", "D": "Windows Data Recovery Software" }, "answer": "C" }, { "question": "To which phase of the Computer Forensics Investigation Process does the Planning and Budgeting of a Forensics Lab belong?", "options": { "A": "Reporting Phase", "B": "Investigation Phase", "C": "Post-investigation Phase", "D": "Pre-investigation Phase" }, "answer": "D" }, { "question": "What does mactime, an essential part of the coroner's toolkit do?", "options": { "A": "It can recover deleted file space and search it for data. However, it does not allow the investigator to preview them", "B": "The tools scans for i-node information, which is used by other tools in the tool kit", "C": "It traverses the file system and produces a listing of all files based on the modification, access and change timestamps", "D": "However, it does not allow the investigator to preview them" }, "answer": "C" }, { "question": "You have been given the task to investigate web attacks on a Windows-based server. Which of the following commands will you use to view active sessions that other systems have established with the local machine?", "options": { "A": "net config", "B": "net use", "C": "net share", "D": "net session" }, "answer": "D" }, { "question": "In General, _______ involves the investigation of data that can be retrieved from the hard disk or other disks of a computer by applying scientific method to retrieve the data.", "options": { "A": "Disaster Recovery", "B": "Data Recovery", "C": "Computer Forensics", "D": "Network Forensics" }, "answer": "C" }, { "question": "You are running known exploits against your network to test for possible vulnerabilities. To test the strength of your virus software, you load a test network to mimic your production network. Your software successfully blocks some simple macro and encrypted viruses. You decide to really test the software by using virus code where the code rewrites itself entirely and the signatures change from child to child, but the functionality stays the same. What type of virus is this testing?", "options": { "A": "Oligomorhic", "B": "Transmorphic", "C": "Polymorphic", "D": "Metamorphic" }, "answer": "D" }, { "question": "When performing a forensics analysis, what device is used to prevent the system from recording data on an evidence disk?", "options": { "A": "Disk editor", "B": "Write-blocker", "C": "Protocol analyzer", "D": "Firewall" }, "answer": "B" }, { "question": "Simon is a former employee of Trinitron XML Inc. He feels he was wrongly terminated and wants to hack into his former company's network. Since Simon remembers some of the server names, he attempts to run the axfr and ixfr commands using DIG. What is Simon trying to accomplish here?", "options": { "A": "Enumerate all the users in the domain", "B": "Perform a zone transfer", "C": "Perform DNS poisoning", "D": "Send DOS commands to crash the DNS servers" }, "answer": "B" }, { "question": "When marking evidence that has been collected with the aa/ddmmyy/nnnn/zz format, what does the nnn denote?", "options": { "A": "The sequential number of the exhibits seized", "B": "The year the evidence was taken", "C": "The initials of the forensics analyst", "D": "The sequence number for the parts of the same exhibit" }, "answer": "A" }, { "question": "Madison is on trial for allegedly breaking into her university's internal network. The police raided her dorm room and seized all of her computer equipment. Madison's lawyer is trying to convince the judge that the seizure was unfounded and baseless. Under which US Amendment is Madison's lawyer trying to prove the police violated?", "options": { "A": "The 5th Amendment", "B": "The 4th Amendment", "C": "The 10th Amendment", "D": "The 1st Amendment" }, "answer": "B" }, { "question": "_____ is simply the application of Computer Investigation and analysis techniques in the interests of determining potential legal evidence.", "options": { "A": "Event Reaction", "B": "Incident Response", "C": "Network Forensics", "D": "Computer Forensics" }, "answer": "D" }, { "question": "When searching through file headers for picture file formats, what should be searched to find a JPEG file in hexadecimal format?", "options": { "A": "FF 00 FF 00 FF 00", "B": "FF D8 FF E0 00 10", "C": "FF FF FF FF FF FF", "D": "EF 00 EF 00 EF 00" }, "answer": "B" }, { "question": "In the context of file deletion process, which of the following statement holds true?", "options": { "A": "The longer a disk is in use, the less likely it is that deleted files will be overwritten", "B": "When files are deleted, the data is overwritten and the cluster marked as available", "C": "While booting, the machine may create temporary files that can delete evidence", "D": "Secure delete programs work by completely overwriting the file in one go" }, "answer": "C" }, { "question": "In a computer that has Dropbox client installed, which of the following files related to the Dropbox client store information about local Dropbox installation and the Dropbox user account, along with email IDs linked with the account?", "options": { "A": "sigstore.db", "B": "install.db", "C": "config.db", "D": "filecache.db" }, "answer": "C" }, { "question": "Meyer Electronics Systems just recently had a number of laptops stolen out of their office. On these laptops contained sensitive corporate information regarding patents and company strategies. A month after the laptops were stolen, a competing company was found to have just developed products that almost exactly duplicated products that Meyer produces. What could have prevented this information from being stolen from the laptops?", "options": { "A": "EFS Encryption", "B": "IPS Encryption", "C": "SDW Encryption", "D": "DFS Encryption" }, "answer": "A" }, { "question": "After passively scanning the network of Department of Defense (DoD), you switch over to active scanning to identify live hosts on their network. DoD is organization and should respond to any number of scans. You start an ICMP ping sweep by sending an IP packet to the broadcast address. Only five hosts respond to your ICMP pings; definitely not the number of hosts you were expecting. Why did this ping sweep only produce a few responses?", "options": { "A": "Only Unix and Unix-like systems will reply to this scan", "B": "A switched network will not respond to packets sent to the broadcast address", "C": "Only Windows systems will reply to this scan", "D": "Only IBM AS/400 will reply to this scan" }, "answer": "A" }, { "question": "Norbert has set up a honeypot environment by creating a DMZ that has no physical or logical access to his production network. In this honeypot, he has placed a server running Windows Active Directory. He has also placed a Web server in the DMZ that services a number of web pages that offer visitors a chance to download sensitive information by clicking on a button. A week later, Norbert finds in his network logs how an intruder accessed the honeypot and download sensitive information. Norbert uses the logs to try and prosecute the intruder for stealing sensitive corporate information. Why will this not be viable?", "options": { "A": "Enticement", "B": "Entrapment", "C": "Intruding into a DMZ is not illegal", "D": "Intruding into a honeypot is not illegal" }, "answer": "B" }, { "question": "When conducting computer forensic analysis, you must guard against _______ So that you remain focused on the primary job and ensure that the level of work does not increase beyond what was originally expected.", "options": { "A": "Unauthorized expenses", "B": "Scope Creep", "C": "Overzealous marketing", "D": "Hard Drive Failure" }, "answer": "B" }, { "question": "NTFS has reduced slack space than FAT, thus having lesser potential to hide data in the slack space. This is because:", "options": { "A": "FAT is an older and inefficient file system", "B": "NTFS is a journaling file system", "C": "FAT does not index files", "D": "NTFS has lower cluster size space" }, "answer": "D" }, { "question": "You are working as an independent computer forensics investigator and receive a call from a systems administrator for a local school system requesting your assistance. One of the students at the local high school is suspected of downloading inappropriate images from the Internet to a PC in the Computer lab. When you arrive at the school, the systems administrator hands you a hard drive and tells you that he made a simple backup copy of the hard drive in the PC and put it on this drive and requests that you examine that drive for evidence of the suspected images. You inform him that a simple backup copy will not provide deleted files or recover file fragments. What type of copy do you need to make to ensure that the evidence found is complete and admissible in future proceedings?", "options": { "A": "Incremental backup copy", "B": "Full backup copy", "C": "Bit-stream copy", "D": "Robust copy" }, "answer": "C" }, { "question": "Peter has encountered a system crash and has lost vital data stored on the hard drive of his Windows computer. He has no cloud storage or backup hard drive. He wants to recover all those data, which includes his personal photos, music, documents, videos, official email, etc. Which of the following tools shall resolve Peter purpose?", "options": { "A": "Cain & Abel", "B": "Colasoft's Capsa", "C": "Recuva", "D": "Xplico" }, "answer": "C" }, { "question": "A system with a simple logging mechanism has not been given much attention during development, this system is now being targeted by attackers. If the attacker wants to perform a new line injection attack, what will he/she inject into the log file?", "options": { "A": "Single pipe character", "B": "Multiple pipe characters", "C": "Plaintext with appended '\\n'", "D": "HTML tags" }, "answer": "C" }, { "question": "What does the 'C' in IOC (Indicator of Compromise) stand for?", "options": { "A": "Critical", "B": "Cyber", "C": "Compromise", "D": "Computer" }, "answer": "C" }, { "question": "Which file format represents a raw disk image?", "options": { "A": ".E01", "B": ".DD", "C": ".AFF", "D": ".PDF" }, "answer": "B" }, { "question": "Select the tool appropriate for finding the dynamically linked lists of an application or malware.", "options": { "A": "PEiD", "B": "ResourcesExtract", "C": "SysAnalyzer", "D": "Dependency Walker" }, "answer": "D" }, { "question": "Which of these rootkit detection techniques function by comparing a snapshot of the file system, boot records, or memory with a known and trusted baseline ?", "options": { "A": "Cross View-Based Detection", "B": "Signature-Based Detection", "C": "Heuristic/Behavior-Based Detection", "D": "Integrity-Based Detection" }, "answer": "D" }, { "question": "Sheila is a forensics trainee and is searching for hidden image files on a hard disk. She used a forensic investigation tool to view the media in hexade for simplifying the search process. Which of the following hex codes should she look for to identify image files?", "options": { "A": "ff d8 ff", "B": "d0 0f 11 e0", "C": "50 41 03 04", "D": "25 50 44 46" }, "answer": "A" }, { "question": "What type of file is represented by a colon (:) with a name following it in the Master File Table of NTFS disk?", "options": { "A": "A Data stream file", "B": "An encrypted file", "C": "A compressed file", "D": "A reserved file" }, "answer": "A" }, { "question": "What is the primary purpose of steganography?", "options": { "A": "Accelerate data transfer", "B": "Encrypt data for secure transmission", "C": "Prevent unauthorized access", "D": "Hide data within other files" }, "answer": "D" }, { "question": "Terri works for a security consulting firm that is currently performing a penetration test on First National Bank in Tokyo. Terri's duties include bypassing firewalls and switches to gain access to the network. Terri sends an IP packet to one of the company's switches with an ACK bit and the source address of her machine. What is Terri trying to accomplish by sending this IP packet?", "options": { "A": "Trick the switch into thinking it already has a session with Terri's computer", "B": "Enable tunneling feature on the switch", "C": "Poison the switch's MAC address table by flooding it with ACK bits", "D": "Crash the switch with a DoS attack since switches cannot send ACK bits" }, "answer": "A" }, { "question": "Damaged portions of a disk on which no read/Write operation can be performed is known as ____ .", "options": { "A": "Lost sector", "B": "Empty sector", "C": "Unused sector", "D": "Bad sector" }, "answer": "D" }, { "question": "What does the presence of 'CreateServiceA' API call indicate?", "options": { "A": "User account creation", "B": "Network connection", "C": "Persistence mechanism", "D": "File creation" }, "answer": "C" }, { "question": "Netstat is a tool for collecting information regarding network connections. It provides a simple view of TCP and UDP connections, and their state and network traffic statistics. Which of the following commands shows you the TCP and UDP network connections, listening ports, and the identifiers?", "options": { "A": "netstat -b", "B": "netstat -ano", "C": "netstat -s", "D": "netstat -r" }, "answer": "B" }, { "question": "When investigating a computer forensics case where Microsoft Exchange and Blackberry Enterprise server are used, where would investigator need to search to find email sent from a Blackberry device?", "options": { "A": "Blackberry desktop redirector", "B": "RIM Messaging center", "C": "Blackberry Enterprise server", "D": "Microsoft Exchange server" }, "answer": "D" }, { "question": "Which legal document is required for cross-border data transfers in EU investigations?", "options": { "A": "Affidavit", "B": "Subpoena", "C": "Mutual Legal Assistance Treaty", "D": "Search warrant" }, "answer": "C" }, { "question": "The Recycle Bin exists as a metaphor for throwing files away, but it also allows a user to retrieve and restore files. Once the file is moved to the recycle bin, a record is added to the log file that exists in the Recycle Bin. Which of the following files contains records that correspond to each deleted file in the Recycle Bin?", "options": { "A": "INFO1", "B": "LOGINFO2", "C": "INFO2", "D": "LOGINFO1" }, "answer": "C" }, { "question": "Smith, a network administrator with a large MNC, was the first to arrive at a suspected crime scene involving criminal use of compromised computers. What would be his first response while maintaining the integrity of evidence?", "options": { "A": "Record the system state by taking photographs of physical system and the display", "B": "Open the systems, remove the hard disk and secure it", "C": "Perform data acquisition without disturbing the state of the systems", "D": "Switch off the systems and carry them to the laboratory" }, "answer": "A" }, { "question": "Jim's company regularly performs backups of their critical servers. But the company can't afford to send backup tapes to an off-site vendor for long term storage and archiving. Instead Jim's company keeps the backup tapes in a safe in the office. Jim's company is audited each year, and the results from this year' show a risk because backup tapes aren't stored off-site. The Manager of Information Technology has a plan to take the backup tapes home with him and wants to know what two things he can do to secure the backup tapes while in transit?", "options": { "A": "Encrypt the backup tapes and use a courier to transport them.", "B": "Degauss the backup tapes and transport them in a lock box.", "C": "Encrypt the backup tapes and transport them in a lock box", "D": "Hash the backup tapes and transport them in a lock box." }, "answer": "C" }, { "question": "Raw data acquisition format creates ____ of a data set or suspect drive.", "options": { "A": "Segmented image files", "B": "Simple sequential flat files", "C": "Compressed image files", "D": "Segmented files" }, "answer": "B" }, { "question": "Which registry value tracks UserAssist executed programs?", "options": { "A": "HKCU\\Software\\Microsoft\\Windows\\CurrentVersion\\Explorer\\UserAssist", "B": "HKCR\\*\\shell\\open\\command", "C": "HKU\\.DEFAULT\\Environment", "D": "HKLM\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion" }, "answer": "A" }, { "question": "Netstat is a tool for collecting information regarding network connections. It provides a simple view of TCP and UDP connections, and their state and network traffic statistics. Which of the following commands shows you the TCP and UDP network connections, listening ports, and the identifiers?", "options": { "A": "netstat -r", "B": "netstat -b", "C": "netstat -ano", "D": "netstat -s" }, "answer": "C" }, { "question": "You are assisting in the investigation of a possible Web Server Hack. The company who called you stated that customers reported to them that whenever they entered the web address of the company in their browser, what they received was a porno graphic web site. The company checked the web server and nothing appears wrong. When you type in the IP address of the web site in your browser everything appears normal. What is the name of the attack that affects the DNS cache of the name resolution servers, resulting in those servers directing users to the wrong web site?", "options": { "A": "ARP Poisoning", "B": "HTTP redirect attack", "C": "IP Spoofing", "D": "DNS Poisoning" }, "answer": "D" }, { "question": "What is the primary indicator of a worm?", "options": { "A": "Browser hijacking", "B": "Credential theft", "C": "File encryption", "D": "Self-replication through networks" }, "answer": "D" }, { "question": "Norbert is dealing with a case regarding a cybercrime that has taken place in Arizona, USA. Norbert needs to lawfully seize the evidence from an electronic device without affecting the user's anonymity. Which of the following law should he comply with, before retrieving the evidence?", "options": { "A": "Third Amendment of the U.S constitution", "B": "First Amendment of the U.S constitution", "C": "Fifth Amendment of the U.S constitution", "D": "Fourth Amendment of the U.S constitution" }, "answer": "D" }, { "question": "What do you call the process of studying the changes that have taken place across a system or a machine after a series of actions or incidents?", "options": { "A": "System Baselining", "B": "Windows Services Monitoring", "C": "Start-up Programs Monitoring", "D": "Host integrity Monitoring" }, "answer": "D" }, { "question": "Ever-changing advancement or mobile devices increases the complexity of mobile device examinations. Which of the following is an appropriate action for mobile forensic investigation?", "options": { "A": "Turn on any wireless interfaces such as Bluetooth and Wi-Fi radios", "B": "Do not wear gloves while handling cell phone evidence to maintain integrity of physical evidence", "C": "If the device\u2019s display is ON the screen\u2019s contents should be photographed and, if necessary, recorded manually, capturing the time, service status, battery level, and other displayed icons", "D": "If the phone is in a cradle or connected to a PC with a cable, then unplug the device from the computer" }, "answer": "C" }, { "question": "The investigator wants to examine changes made to the system's registry by the suspect program. Which of the following tool can help the investigator?", "options": { "A": "RAM Capturer", "B": "What's Running", "C": "TRIPWIRE", "D": "Regshot" }, "answer": "D" }, { "question": "What TCP/UDP port does the toolkit program netstat use?", "options": { "A": "Port 8", "B": "Port 15", "C": "Port 69", "D": "Port 23" }, "answer": "B" }, { "question": "Which technique hides malicious code in NTFS alternate data streams?", "options": { "A": "Fileless malware", "B": "ADS exploitation", "C": "Steganography", "D": "Sector sparing" }, "answer": "B" }, { "question": "Paraben Lockdown device uses which operating system to write hard drive data?", "options": { "A": "Windows", "B": "Unix", "C": "Mac OS", "D": "Red Hat" }, "answer": "A" }, { "question": "As part of extracting the system data, Jenifer has used the netstat command. What does this tool reveal?", "options": { "A": "Net status of computer usage", "B": "Status of users connected to the internet", "C": "Information about network connections", "D": "Status of network hardware" }, "answer": "C" }, { "question": "Billy, a computer forensics expert, has recovered a large number of DBX files during the forensic investigation of a laptop. Which of the following email clients can he use to analyze the DBX files?", "options": { "A": "Mozilla Thunderbird", "B": "Microsoft Outlook Express", "C": "Microsoft Outlook", "D": "Eudora" }, "answer": "B" }, { "question": "Which Event Correlation approach assumes and predicts what an attacker can do next after the attack by studying statistics and probability?", "options": { "A": "Time (Clock Time) or Role-Based Approach", "B": "Bayesian Correlation", "C": "Automated Field Correlation", "D": "Profile/Fingerprint-Based Approach" }, "answer": "B" }, { "question": "Which of the following is a non-zero data that an application allocates on a hard disk cluster in systems running on Windows OS?", "options": { "A": "Master File Table", "B": "Meta Block Group", "C": "Slack Space", "D": "Sparse File" }, "answer": "D" }, { "question": "Using Linux to carry out a forensics investigation, what would the following command accomplish? dd if=/usr/home/partition.image of=/dev/sdb2 bs=4096 conv=notrunc,noerror", "options": { "A": "Backup a disk to an image file", "B": "Restore a disk from an image file", "C": "Copy a partition to an image file", "D": "Search for disk errors within an image file" }, "answer": "B" }, { "question": "Which tool is used to analyze malicious Word documents?", "options": { "A": "Radare2", "B": "Binwalk", "C": "tcpdump", "D": "olevba" }, "answer": "D" }, { "question": "A mobile operating system is the operating system that operates a mobile device like a mobile phone, smartphone, PDA, etc. It determines the functions a features available on mobile devices such as keyboards, applications, email, text messaging, etc. Which of the following mobile operating systems is free and open source?", "options": { "A": "Symbian OS", "B": "Android", "C": "Apple IOS", "D": "Web OS" }, "answer": "B" }, { "question": "Bob has been trying to penetrate a remote production system for the past two weeks. This time however, he is able to get into the system. He was able to use the system for a period of three weeks. However, law enforcement agencies were recoding his every activity and this was later presented as evidence. The organization had used a Virtual Environment to trap Bob. What is a Virtual Environment?", "options": { "A": "A system using Trojaned commands", "B": "An environment set up before an user logs in", "C": "An environment set up after the user logs in", "D": "A honeypot that traps hackers" }, "answer": "D" }, { "question": "Which proprietary mechanism operated by RIM is used to send and receive all BlackBerry email?", "options": { "A": "Blackberry WAP gateway", "B": "Microsoft Exchange", "C": "Blackberry Message Center", "D": "Blackberry WEP gateway" }, "answer": "C" }, { "question": "Which rule requires an original recording to be provided to prove the content of a recording?", "options": { "A": "1003", "B": "1005", "C": "1004", "D": "1002" }, "answer": "D" }, { "question": "Ivanovich, a forensics investigator, is trying to extract complete information about running processes from a system. Where should he look apart from the virtual memory?", "options": { "A": "Files and documents", "B": "Slack space", "C": "Application data", "D": "Swap space" }, "answer": "D" }, { "question": "What happens when a file is deleted by a Microsoft operating system using the FAT file system?", "options": { "A": "A copy of the file is stored and the original file is erased", "B": "The file is erased but can be recovered partially", "C": "The file is erased and cannot be recovered", "D": "Only the reference to the file is removed from the FAT and can be recovered" }, "answer": "D" }, { "question": "Joshua is analyzing an MSSQL database for finding the attack evidence and other details, where should he look for the database logs?", "options": { "A": "Model.ldf", "B": "Model.lgf", "C": "Model.log", "D": "Model.txt" }, "answer": "A" }, { "question": "What should you do when approached by a reporter about a case that you are working on or have worked on?", "options": { "A": "All of the above", "B": "Answer only the questions that help your case", "C": "Refer the reporter to the attorney that retained you", "D": "Answer all the reporter questions as completely as possibleAnswer all the reporter? questions as completely as possible" }, "answer": "C" }, { "question": "A master boot record (MBR) is the first sector ('sector zero') of a data storage device. What is the size of MBR?", "options": { "A": "1048 Bytes", "B": "512 Bytes", "C": "4092 Bytes", "D": "Depends on the capacity of the storage device" }, "answer": "B" }, { "question": "What does a sudden spike in CPU usage by 'svchost.exe' indicate?", "options": { "A": "Normal system operation", "B": "Hardware failure", "C": "Legitimate Windows update", "D": "Possible malware masquerading" }, "answer": "D" }, { "question": "Where are files temporarily written in Unix when printing?", "options": { "A": "/var/print", "B": "/spool", "C": "/usr/spool", "D": "/var/spool" }, "answer": "D" }, { "question": "What is the primary use of YARA rules in malware analysis?", "options": { "A": "Classify and identify malware", "B": "Analyze network patterns", "C": "Decrypt malicious payloads", "D": "Reverse engineer code" }, "answer": "A" }, { "question": "What is the first step that needs to be carried out to investigate wireless attacks?", "options": { "A": "Detect the wireless connections", "B": "Identify wireless devices at crime scene", "C": "Document the scene and maintain a chain of custody", "D": "Obtain a search warrant" }, "answer": "D" }, { "question": "George is the network administrator of a large Internet company on the west coast. Per corporate policy, none of the employees in the company are allowed FTP or SFTP programs without obtaining approval from the IT department. Few managers are using SFTP program on their computers. Before talking to his boss George wants to have some proof of their activity. George wants to use Ethereal to monitor network traffic, but only SFTP traffic to and from his network filter should George use ?", "options": { "A": "src port 23 and dst port 23", "B": "udp port 22 and host 172.16.28.1/24", "C": "src port 22 and dst port 22", "D": "net port 22" }, "answer": "C" }, { "question": "An investigator is searching through the firewall logs of a company and notices ICMP packets that are larger than 65,536 bytes. What type of activity is investigator seeing?", "options": { "A": "Ping of death", "B": "Nmap scan", "C": "Fraggle", "D": "Smurf" }, "answer": "A" }, { "question": "Which of these Windows utility help you to repair logical file system errors?", "options": { "A": "Resource Monitor", "B": "Disk defragmenter", "C": "Disk cleanup", "D": "CHKDSK" }, "answer": "D" }, { "question": "Which of the following refers to the data that might still exist in a cluster even though the original file has been overwritten by another file?", "options": { "A": "Sector", "B": "MFT", "C": "Metadata", "D": "Slack Space" }, "answer": "D" }, { "question": "What encryption technology is used on Blackberry devices Password Keeper?", "options": { "A": "AES", "B": "Blowfish", "C": "RC5", "D": "3DES" }, "answer": "A" }, { "question": "An investigator has extracted the device descriptor for a 1GB thumb drive that looks like: Disk&Ven\\_Best\\_Buy&Prod\\_Geek\\_Squad\\_U3&Rev\\_6.15. What does the 'Geek\\_Squad' part represent?", "options": { "A": "Product description", "B": "Software or OS used", "C": "Developer description", "D": "Manufacturer Details" }, "answer": "A" }, { "question": "In Windows, prefetching is done to improve system performance. There are two types of prefetching: boot prefetching and application prefetching. During prefetching, what does the Cache Manager do?", "options": { "A": "Determines the data associated with value EnablePrefetcher", "B": "Checks hard page faults and soft page faults", "C": "Monitors the first 10 seconds after the process is started", "D": "Checks whether the data is processed" }, "answer": "D" }, { "question": "What does the 'LNK' file in Windows typically contain?", "options": { "A": "System configuration", "B": "Shortcut information", "C": "User credentials", "D": "Network settings" }, "answer": "B" }, { "question": "Jim performed a vulnerability analysis on his network and found no potential problems. He runs another utility that executes exploits against his system to verify the results of the vulnerability test. The second utility exploits five known vulnerabilities against his network in which the vulnerability analysis said were not exploitable. What kind of results did Jim receive from his vulnerability analysis?", "options": { "A": "False negatives", "B": "True positives", "C": "False positives", "D": "True negatives" }, "answer": "A" }, { "question": "Which type of analysis examines malware behavior in a controlled environment?", "options": { "A": "Hashing", "B": "Code review", "C": "Static analysis", "D": "Dynamic analysis" }, "answer": "D" }, { "question": "Report writing is a crucial stage in the outcome of an investigation. Which information should not be included in the report section?", "options": { "A": "Incident summary", "B": "Author of the report", "C": "Speculation or opinion as to the cause of the incident", "D": "Purpose of the report" }, "answer": "C" }, { "question": "Which of the following acts as a network intrusion detection system as well as network intrusion prevention system?", "options": { "A": "Kismet", "B": "Accunetix", "C": "Snort", "D": "Nikto" }, "answer": "C" }, { "question": "If a file (readme.txt) on a hard disk has a size of 2600 bytes, how many sectors are normally allocated to this file?", "options": { "A": "5 Sectors", "B": "4 Sectors", "C": "6 Sectors", "D": "7 Sectors" }, "answer": "C" }, { "question": "Which of the following email headers specifies an address for mailer-generated errors, like \"no such user\" bounce messages, to go to (instead of the sender'saddress)?", "options": { "A": "Mime-Version header", "B": "Errors-To header", "C": "Content-Type header", "D": "Content-Transfer-Encoding header" }, "answer": "B" }, { "question": "Lynne receives the following email: Dear Lynne, we are sorry to inform you that your ID has been temporarily frozen due to incorrect or missing information saved at 2016/11/10. You have 24 hours to fix this problem or risk to be closed permanently! To proceed Please Connect >> My Apple ID Thank You The link to My Apple ID shows http://apple.secure-login.hu/backup/signon/ What type of attack is this?", "options": { "A": "Phishing", "B": "Email Spamming", "C": "Mail Bombing", "D": "Email Spoofing" }, "answer": "A" }, { "question": "Shane, a forensic specialist, is investigating an ongoing attack on a MySQL database server hosted on a Windows machine with SID 'WIN-ABCDE12345F.' Which of the following log file will help Shane in tracking all the client connections and activities performed on the database server?", "options": { "A": "WIN-ABCDE12345F-bin.n", "B": "WIN-ABCDE12345F.err", "C": "WIN-ABCDE12345F.pid", "D": "WIN-ABCDE12345F.log" }, "answer": "D" }, { "question": "Which of the following web browser uses the Extensible Storage Engine (ESE) database format to store browsing records, including history, cache, and cookies?", "options": { "A": "Safari", "B": "Microsoft Edge", "C": "Mozilla Firefox", "D": "Google Chrome" }, "answer": "B" }, { "question": "Norbert, a renowned forensic investigator, is investigating a network attack that resulted in the compromise of several systems in a reputed multinational's network. He started Wireshark to capture the network traffic. Upon investigation, he found that the DNS packets travelling across the network belonged to a non-company configured IP. Which of the following attack Norbert can infer from his findings?", "options": { "A": "Session poisoning", "B": "DNS Poisoning", "C": "Cookie Poisoning Attack", "D": "TCP-layer posioning" }, "answer": "B" }, { "question": "Julia is a senior security analyst for Berber Consulting group. She is currently working on a contract for a small accounting firm in Florida. They have permission to perform social engineering attacks on the company to see if their in-house training did any good. Julia calls the main number for the accounting firm and talks to the receptionist. Julia says that she is an IT technician from the company's main office in Iowa. She states that she needs the receptionist username and password to troubleshoot a problem they are having. Julia says that Bill Hammond, the CEO of the company, requested this information. After hearing the name of the CEO, the receptionist gave Julia all the information she asked for. What principal of social engineering did Julia use?", "options": { "A": "Friendship/Liking", "B": "Social Validation", "C": "Scarcity", "D": "Authority/Intimidation" }, "answer": "D" }, { "question": "In Microsoft file structures, sectors are grouped together to form:", "options": { "A": "Drives", "B": "Clusters", "C": "Partitions", "D": "Bitstreams" }, "answer": "B" }, { "question": "Which type of malware resides exclusively in RAM?", "options": { "A": "Trojan horse", "B": "Ransomware", "C": "Adware", "D": "Fileless malware" }, "answer": "D" }, { "question": "What is the name of the Standard Linux Command that is also available as windows application that can be used to create bit-stream images?", "options": { "A": "image", "B": "dd", "C": "mcopy", "D": "MD5" }, "answer": "B" }, { "question": "In which registry does the system store the Microsoft security IDs?", "options": { "A": "HKEY\\_LOCAL\\_MACHINE (HKLM)", "B": "HKEY\\_CURRENT\\_CONFIG (HKCC)", "C": "HKEY\\_CLASSES\\_ROOT (HKCR)", "D": "HKEY\\_CURRENT\\_USER (HKCU)" }, "answer": "A" }, { "question": "What is the primary indicator of a dropper malware?", "options": { "A": "Encrypting files", "B": "Downloading additional payloads", "C": "Self-replication", "D": "Spamming emails" }, "answer": "B" }, { "question": "Peter has been trying to penetrate a remote production system for the past two weeks. This time however, he is able to get into the system. He was able to use the System for a period of three weeks. However, law enforcement agencies were recoding his every activity and this was later presented as evidence. The organization had used a Virtual Environment to trap Peter. What is a Virtual Environment?", "options": { "A": "An environment set up after the user logs in", "B": "An environment set up before a user logs in", "C": "A Honeypot that traps hackers", "D": "A system Using Trojaned commands" }, "answer": "C" }, { "question": "How do you define forensic computing?", "options": { "A": "It is the administrative and legal proceeding in the process of forensic investigation", "B": "It Is a preliminary and mandatory course necessary to pursue and understand fundamental principles of ethical hacking", "C": "It is the science of capturing, processing, and investigating data security incidents and making it acceptable to a court of law.", "D": "It is a methodology of guidelines that deals with the process of cyber investigation" }, "answer": "C" }, { "question": "What hashing method is used to password protect Blackberry devices?", "options": { "A": "AES", "B": "SHA-1", "C": "RC5", "D": "MD5" }, "answer": "B" }, { "question": "You are trying to locate Microsoft Outlook Web Access Default Portal using Google search on the Internet. What search string will you use to locate them?", "options": { "A": "outlook:\"search\"", "B": "locate:\"logon page\"", "C": "intitle:\"exchange server\"", "D": "allinurl:\"exchange/logon.asp\"" }, "answer": "D" }, { "question": "What stage of the incident handling process involves reporting events?", "options": { "A": "Follow-up", "B": "Recovery", "C": "Identification", "D": "Containment" }, "answer": "C" }, { "question": "What is the primary purpose of a rootkit?", "options": { "A": "Generate cryptocurrency", "B": "Encrypt user data", "C": "Spread through email", "D": "Hide malicious activities" }, "answer": "D" }, { "question": "What potential vulnerabilities exist in this example? : \n#include #include int main(int argc, char *argv[]) { char buffer[10]; if (argc < 2) { fprintf (stderr, \"USAGE: %s string\n\", argv[0]); return 1; } strcpy(buffer, argv[1]); return 0; }", "options": { "A": "SQL injection", "B": "Kernel injection", "C": "Buffer overflow", "D": "XSS" }, "answer": "C" }, { "question": "On Linux/Unix based Web servers, what privilege should the daemon service be run under?", "options": { "A": "Something other than root", "B": "Guest", "C": "You cannot determine what privilege runs the daemon service", "D": "Root" }, "answer": "A" }, { "question": "Which technique is used to recover deleted files without file system metadata?", "options": { "A": "File carving", "B": "Timeline analysis", "C": "Registry analysis", "D": "Index searching" }, "answer": "A" }, { "question": "What will the following command accomplish? dd if=/dev/xxx of=mbr.backup bs=512 count=1", "options": { "A": "Restore the master boot record", "B": "Restore the first 512 bytes of the first partition of the hard drive", "C": "Mount the master boot record on the first partition of the hard drive", "D": "Back up the master boot record" }, "answer": "D" }, { "question": "Which list contains the most recent actions performed by a Windows User?", "options": { "A": "Windows Error Log", "B": "Activity", "C": "Recents", "D": "MRU" }, "answer": "D" }, { "question": "Investigators can use the Type Allocation Code (TAC) to find the model and origin of a mobile device. Where is TAC located in mobile devices?", "options": { "A": "Equipment Identity Register (EIR)", "B": "International Mobile Equipment Identifier (IMEI)", "C": "Integrated circuit card identifier (ICCID)", "D": "International mobile subscriber identity (IMSI)" }, "answer": "B" }, { "question": "As a Certified Ethical Hacker, you were contracted by a private firm to conduct an external security assessment through penetration testing. What document describes the specifics of the testing, the associated violations, and essentially protects both the organization's interest and your liabilities as a tester?", "options": { "A": "Rules of Engagement", "B": "Non-Disclosure Agreement", "C": "Service Level Agreement", "D": "Project Scope" }, "answer": "A" }, { "question": "You work as an IT security auditor hired by a law firm in Boston to test whether you can gain access to sensitive information about the company clients. You have rummaged through their trash and found very little information. You do not want to set off any alarms on their network, so you plan on performing passive footprinting against their Web servers. What tool should you use?", "options": { "A": "Netcraft", "B": "Dig", "C": "Ping sweep", "D": "Nmap" }, "answer": "A" }, { "question": "In which step of the computer forensics investigation methodology would you run SHA2-256 checksum on the evidence?", "options": { "A": "Obtain search warrant", "B": "Acquire the data", "C": "Evaluate and secure the scene", "D": "Collect the evidence" }, "answer": "B" }, { "question": "Smith, an employee of a reputed forensic Investigation firm, has been hired by a private organization to investigate a laptop that is suspected to be in hacking of organization DC server. Smith wants to find all the values typed into the Run box in the Start menu. Which of the following registry key Smit to find the above information?", "options": { "A": "MountedDevices key", "B": "UserAssist Key", "C": "TypedURLs key", "D": "RunMRU key" }, "answer": "D" }, { "question": "From the following spam mail header, identify the host IP that sent this spam ?\nFrom jie02@netvigator.com jie02@netvigator.com Tue Nov 27 17:27:11 2001\nReceived: from viruswall.ie.cuhk.edu.hk (viruswall [137.189.96.52]) by eng.\nie.cuhk.edu.hk (8.11.6/8.11.6) with ESMTP id\nfAR9RAP23061 for ; Tue, 27 Nov 2001 17:27:10 +0800 (HKT)\nReceived: from mydomain.com (pcd249020.netvigator.com [203.218.39.20]) by \nviruswall.ie.cuhk.edu.hk (8.12.1/8.12.1) with SMTP id fAR9QXwZ018431 for ; \nTue, 27 Nov 2001 17:26:36 +0800 (HKT)\n Message-Id: >200111270926.fAR9QXwZ018431@viruswall.ie.cuhk.edu.hk From: \"china hotel web\"\nTo: \"Shlam\"\nSubject: SHANGHAI (HILTON HOTEL) PACKAGE Date: Tue, 27 Nov 2001 17:25:58 +0800 MIME-Version: 1.0\nX-Priority: 3 X-MSMail- Priority: Normal\nReply-To: \"china hotel web\"", "options": { "A": "137.189.96.52", "B": "8.12.1.0", "C": "203.218.39.20", "D": "203.218.39.50" }, "answer": "C" }, { "question": "Smith is an IT technician that has been appointed to his company's network vulnerability assessment team. He is the only IT employee on the team. The ot team members include employees from Accounting, Management, Shipping, and Marketing. Smith and the team members are having their first meeting to discuss how they will proceed. What is the step they should do to create the network vulnerability assessment plan?", "options": { "A": "Their first step is to analyze the data they have currently gathered from the company or interviews.", "B": "Their first step is to create an initial Executive report to show the management team.", "C": "Their first step is to make a hypothesis of what their final findings will be.", "D": "Their first step is the acquisition of required documents, reviewing of security policies and compliance." }, "answer": "D" }, { "question": "What is the primary purpose of a write blocker in digital forensics?", "options": { "A": "Prevent modification of the original evidence", "B": "Encrypt forensic data during acquisition", "C": "Automatically analyze disk contents", "D": "Accelerate data transfer during imaging" }, "answer": "A" }, { "question": "Norbert, a hacker, identifies a vulnerability in a website. To exploit the vulnerability, he visits the login page and notes down the session ID that is created. He appends this session ID to the login URL and shares the link with a victim. Once the victim logs into the website using the shared URL, Norbert reloads the webpage (containing the URL with the session ID appended) and now, he can browse the active session of the victim. Which attack did Norbert successfully execute?", "options": { "A": "Cross Site Request Forgery", "B": "Session Fixation Attack", "C": "Cookie Tampering", "D": "Parameter Tampering" }, "answer": "B" }, { "question": "What will the following URL produce in an unpatched IIS Web Server? http://www.thetargetsite.com/scripts/..% co%af../..%co%af../windows/system32/cmd.exe?c+dir+c:\\", "options": { "A": "Directory listing of the C:\\windows\\system32 folder on the web server", "B": "Directory listing of C: drive on the web server", "C": "Insert a Trojan horse into the C: drive of the web server", "D": "Execute a buffer flow in the C: drive of the web server" }, "answer": "B" }, { "question": "Which of the following Event Correlation Approach checks and compares all the fields systematically and intentionally for positive and negative correlations with each other to determine the correlation across one or multiple fields?", "options": { "A": "Rule-Based Approach", "B": "Field-Based Approach", "C": "Automated Field Correlation", "D": "Graph-Based Approach" }, "answer": "C" }, { "question": "Which of the following tools will help the investigator to analyze web server logs?", "options": { "A": "Deep Log Analyzer", "B": "XRY LOGICAL", "C": "LanWhois", "D": "Deep Log Monitor" }, "answer": "A" }, { "question": "You are a security analyst performing reconnaissance on a company you will be carrying out a penetration test for.You conduct a search for IT jobs on Dice.com and find the following information for an open position: 7+ years experience in Windows Server environment 5+ years experience in Exchange 2000/2003 environment Experience with Cisco Pix Firewall, Linksys 1376 router, Oracle 11i and MYOB v3.4 Accounting software are required MCSA desired, MCSE, CEH preferred No Unix/Linux Experience needed What is this information posted on the job website considered?", "options": { "A": "Social engineering exploit", "B": "Trade secret", "C": "Competitive exploit", "D": "Information vulnerability" }, "answer": "D" }, { "question": "Which among the following laws emphasizes the need for each Federal agency to develop, document, and implement an organization-wide program to provide information security for the information systems that support its operations and assets?", "options": { "A": "GLBA", "B": "FISMA", "C": "HIPAA", "D": "SOX" }, "answer": "B" }, { "question": "Which of the following network attacks refers to sending huge volumes of email to an address in an attempt to overflow the mailbox or overwhelm the server where the email address is hosted so as to cause a denial-of-service attack?", "options": { "A": "Phishing", "B": "Email spamming", "C": "Email spoofing", "D": "Mail bombing" }, "answer": "D" }, { "question": "What is the First Step required in preparing a computer for forensics investigation?", "options": { "A": "Secure any relevant media", "B": "Do not turn the computer off or on, run any programs, or attempt to access data on a computer", "C": "Identify the type of data you are seeking, the Information you are looking for, and the urgency level of the examination", "D": "Suspend automated document destruction and recycling policies that may pertain to any relevant media or users at Issue" }, "answer": "B" }, { "question": "Which of the following is NOT an anti-forensics technique?", "options": { "A": "Data Deduplication", "B": "Steganography", "C": "Encryption", "D": "Password Protection" }, "answer": "A" }, { "question": "Which of the following does Microsoft Exchange E-mail Server use for collaboration of various e-mail applications?", "options": { "A": "Simple Mail Transfer Protocol (SMTP)", "B": "Internet Message Access Protocol (IMAP)", "C": "Post Office Protocol version 3 (POP3)", "D": "Messaging Application Programming Interface (MAPI)" }, "answer": "D" }, { "question": "When investigating a potential e-mail crime, what is your first step in the investigation?", "options": { "A": "Recover the evidence", "B": "Trace the IP address to its origin", "C": "Write a report", "D": "Determine whether a crime was actually committed" }, "answer": "B" }, { "question": "What is the name of the first reserved sector in File allocation table?", "options": { "A": "Partition Boot Sector", "B": "Volume Boot Record", "C": "Master Boot Record", "D": "BIOS Parameter Block" }, "answer": "C" }, { "question": "The IIS log file format is a fixed (cannot be customized) ASCII text-based format. The IIS format includes basic items, such as client IP address, user name, date and time, service and instance, server name and IP address, request type, target of operation, etc. Identify the service status code from the following IIS log: \n 192.168.100.150, -, 03/6/11, 8:45:30, W3SVC2, SERVER, 172.15.10.30, 4210, 125, 3524, 100, 0, GET, /dollerlogo.gif,", "options": { "A": "100", "B": "3524", "C": "4210", "D": "W3SVC2" }, "answer": "A" }, { "question": "Which among the following files provides email header information in the Microsoft Exchange server?", "options": { "A": "PRIV.STM", "B": "PUB.EDB", "C": "PRIV.EDB", "D": "gwcheck.db" }, "answer": "C" }, { "question": "You have completed a forensic investigation case. You would like to destroy the data contained in various disks at the forensics lab due to sensitivity. How would you permanently erase the data on the hard disk?", "options": { "A": "Dispose of the hard disk in the trash bin", "B": "None of the above methods are completely secure", "C": "Overwrite the entire hard disk with zeros (0)", "D": "Use the 'format C:' command on the hard disk" }, "answer": "B" }, { "question": "The police believe that Melvin Matthew has been obtaining unauthorized access to computers belonging to numerous computer software and computer operating systems manufacturers, cellular telephone manufacturers, Internet Service Providers and Educational Institutions. They also suspect that he has been stealing, copying and misappropriating proprietary computer software belonging to the several victim companies. What is preventing the police in the U.S from breaking down the suspects door and searching his home and seizing all of his computer equipment if they have not yet obtained a warrant?", "options": { "A": "The Fourth Amendment", "B": "The Federal Rules of Evidence", "C": "The USA Patriot Act", "D": "The Good Samaritan Laws" }, "answer": "A" }, { "question": "Which of the following statements is incorrect when preserving digital evidence?", "options": { "A": "Verify if the monitor is on, off, or in sleep mode", "B": "Turn on the computer and extract Windows event viewer log files", "C": "Document the actions and changes that you observe in the monitor, computer, printer, or in other peripherals", "D": "Remove the plug from the power router or modem" }, "answer": "B" }, { "question": "First response to an incident may involve three different groups of people, and each will have differing skills and need to carry out differing tasks ba incident. Who is responsible for collecting, preserving, and packaging electronic evidence?", "options": { "A": "Local managers or other non-forensic staff", "B": "System administrators", "C": "Forensic laboratory staff", "D": "Lawyers" }, "answer": "C" }, { "question": "What does a packed malware binary typically exhibit?", "options": { "A": "Multiple resource sections", "B": "Low entropy in code section", "C": "High entropy in code section", "D": "Clear text strings" }, "answer": "C" }, { "question": "You have been given the task to investigate web attacks on a Windows-based server. Which of the following commands will you use to look at which sessions the machine has opened with other systems?", "options": { "A": "Net config", "B": "Net sessions", "C": "Net share", "D": "Net use" }, "answer": "D" }, { "question": "Task list command displays a list of applications and services with their Process ID (PID) for all tasks running on either a local or a remote computer. Which of the following task list commands provides information about the listed processes, including the image name, PID, name, and number of the session for the process?", "options": { "A": "tasklist/s", "B": "tasklist/u", "C": "tasklist/p", "D": "tasklist/V" }, "answer": "D" }, { "question": "Consider that you are investigating a machine running an Windows OS released prior to Windows Vista. You are trying to gather information about the deleted files by examining the master database file named INFO2 located at C:\\Recycler\\\\. You read an entry named \"Dd5.exe\". What does Dd5.exe mean?", "options": { "A": "D drive", "B": "D drive, fourth file restored, a .exe file", "C": "fifth file deleted, a .exe file", "D": "D drive, fourth file deleted, a .exe file" }, "answer": "C" }, { "question": "What does the $I30 stream track in NTFS?", "options": { "A": "System logs", "B": "User permissions", "C": "Directory entries", "D": "File content" }, "answer": "C" }, { "question": "What file structure database would you expect to find on floppy disks?", "options": { "A": "FAT12", "B": "FAT16", "C": "FAT32", "D": "NTFS" }, "answer": "A" }, { "question": "Which among the following search warrants allows the first responder to get the victim's computer information such as service records, billing records, subscriber information from the service provider?", "options": { "A": "Service Provider Search Warrant", "B": "Norbert Doe Search Warrant", "C": "Electronic Storage Device Search Warrant", "D": "Citizen Informant Search Warrant" }, "answer": "C" }, { "question": "To check for POP3 traffic using Ethereal, what port should an investigator search by?", "options": { "A": "143", "B": "25", "C": "110", "D": "125" }, "answer": "C" }, { "question": "What does the bytes 0x0B-0x53 represent in the boot sector of NTFS volume on Windows 2000?", "options": { "A": "Bootstrap code and the end of the sector marker", "B": "BIOS Parameter Block (BPB) and the extended BPB", "C": "Jump instruction and the OEM ID", "D": "BIOS Parameter Block (BPB) and the OEM ID" }, "answer": "B" }, { "question": "After attending a CEH security seminar, you make a list of changes you would like to perform on your network to increase its security. One of the first change is to switch the RestrictAnonymous setting from 0 to 1 on your servers. This, as you were told, would prevent anonymous users from establishing a session on the server. Using Userinfo tool mentioned at the seminar, you succeed in establishing a null session with one of the servers. Why is that?", "options": { "A": "There is no way to always prevent an anonymous null session from establishing", "B": "RestrictAnonymous must be set to \"2\" for complete security", "C": "RestrictAnonymous must be set to \"3\" for complete security", "D": "RestrictAnonymous must be set to \"10\" for complete security" }, "answer": "B" }, { "question": "A law enforcement officer may only search for and seize criminal evidence with _______, which are facts or circumstances that would lead a reasonable person believe a crime has been committed or is about to be committed, evidence of the specific crime exists and the evidence of the specific crime exists at the to be searched.", "options": { "A": "Beyond a reasonable doubt", "B": "Mere Suspicion", "C": "A preponderance of the evidence", "D": "Probable cause" }, "answer": "D" }, { "question": "You should make at least how many bit-stream copies of a suspect drive?", "options": { "A": "1", "B": "4", "C": "3", "D": "2" }, "answer": "D" }, { "question": "Which Windows feature tracks file access times?", "options": { "A": "Prefetch", "B": "Windows Search Index", "C": "Volume Shadow Copy", "D": "USN Journal" }, "answer": "D" }, { "question": "Which of the following files stores information about local Dropbox installation and account, email IDs linked with the account, current version/build f application, the host\\_id, and local path information?", "options": { "A": "host.db", "B": "filecache.db", "C": "config.db", "D": "sigstore.db" }, "answer": "C" }, { "question": "Peter works as information security analyst for a big finance company. One day, the anomaly-based intrusion detection system alerted that a volumetric DDoS targeting the main IP of the main web server was occurring. What kind of attack is it?", "options": { "A": "IDS attack", "B": "Web application attack", "C": "Network attack", "D": "APT" }, "answer": "C" }, { "question": "A small law firm located in the Midwest has possibly been breached by a computer hacker looking to obtain information on their clientele. The law firm does not have any on-site IT employees, but wants to search for evidence of the breach themselves to prevent any possible media attention. Why would this not be recommended?", "options": { "A": "Searching for evidence themselves would not have any ill effects", "B": "Searching could possibly crash the machine or device", "C": "Searching creates cache files, which would hinder the investigation", "D": "Searching can change date/time stamps" }, "answer": "D" }, { "question": "Which tool analyzes malware network traffic in isolation?", "options": { "A": "IDA Pro", "B": "INetSim", "C": "Wireshark", "D": "RegShot" }, "answer": "B" }, { "question": "Router log files provide detailed Information about the network traffic on the Internet. It gives information about the attacks to and from the networks stores log files in the ____ .", "options": { "A": "IDS logs", "B": "Application logs", "C": "Router cache", "D": "Audit logs" }, "answer": "C" }, { "question": "Davidson Trucking is a small transportation company that has three local offices in Detroit Michigan. Ten female employees that work for the company have gone to an attorney reporting that male employees repeatedly harassed them and that management did nothi to stop the problem. Davidson has employee policies that outline all company guidelines, including awareness on harassment and how it will not be tolera When the case is brought to court, whom should the prosecuting attorney call upon for not upholding company policy?", "options": { "A": "Employees themselves", "B": "Administrative assistant in charge of writing policies", "C": "Supervisors", "D": "IT personnel" }, "answer": "C" }, { "question": "Which of the following tasks DOES NOT come under the investigation phase of a cybercrime forensics investigation case?", "options": { "A": "Data analysis", "B": "Data collection", "C": "Secure the evidence", "D": "First response" }, "answer": "D" }, { "question": "You are working as Computer Forensics investigator and are called by the owner of an accounting firm to investigate possible computer abuse by one of th employees. You meet with the owner of the firm and discover that the company has never published a policy stating that they reserve the right to inspect computing assets at will. What do you do?", "options": { "A": "Inform the owner that conducting an investigation without a policy is a violation of the 4th amendment", "B": "Inform the owner that conducting an investigation without a policy is not a problem because the company is privately owned", "C": "Inform the owner that conducting an investigation without a policy is not a problem because a policy is only necessary for government agencies", "D": "Inform the owner that conducting an investigation without a policy is a violation of the employees' expectation of privacy" }, "answer": "D" }, { "question": "What is the smallest physical storage unit on a hard drive?", "options": { "A": "Sector", "B": "Platter", "C": "Cluster", "D": "Track" }, "answer": "A" }, { "question": "Which of the following tool captures and allows you to interactively browse the traffic on a network?", "options": { "A": "RegScanner", "B": "Wireshark", "C": "Security Task Manager", "D": "ThumbsDisplay" }, "answer": "B" }, { "question": "What is the first step taken in an investigation for laboratory forensic staff members?", "options": { "A": "Securing and evaluating the electronic crime scene", "B": "Packaging the electronic evidence", "C": "Conducting preliminary interviews", "D": "Transporting the electronic evidence" }, "answer": "A" }, { "question": "What does API hooking typically indicate in malware behavior?", "options": { "A": "Process injection", "B": "System function interception", "C": "Network scanning", "D": "File encryption" }, "answer": "B" }, { "question": "This is the original file system database that Microsoft designed for floppy disks. It is written to the outermost track of a disk and contains information about each file stored on the drive.", "options": { "A": "Disk Operating System (DOS)", "B": "Master File Table (MFT)", "C": "File Allocation Table (FAT)", "D": "Master Boot Record (MBR)" }, "answer": "C" }, { "question": "When setting up a wireless network with multiple access points, why is it important to set each access point on a different channel?", "options": { "A": "Avoid over-saturation of wireless signals", "B": "Avoid cross talk", "C": "So that the access points will work on different frequencies", "D": "Multiple access points can be set up on the same channel without any issues" }, "answer": "B" }, { "question": "What technique used by Encase makes it virtually impossible to tamper with evidence once it has been acquired?", "options": { "A": "Every byte of the file(s) is encrypted using three different methods", "B": "Every byte of the file(s) is given an MD5 hash to match against a master file", "C": "Every byte of the file(s) is verified using 32-bit CRC", "D": "Every byte of the file(s) is copied to three different hard drives" }, "answer": "C" }, { "question": "Which component in the hard disk moves over the platter to read and write information?", "options": { "A": "Spindle", "B": "Actuator", "C": "Actuator Axis", "D": "Head" }, "answer": "D" }, { "question": "Which Intrusion Detection System (IDS) usually produces the most false alarms due to the unpredictable behaviors of users and networks?", "options": { "A": "anomaly detection", "B": "host-based IDS systems (HIDS)", "C": "network-based IDS systems (NIDS)", "D": "signature recognition" }, "answer": "A" }, { "question": "Brian needs to acquire data from RAID storage. Which of the following acquisition methods is recommended to retrieve only the data relevant to the investigation?", "options": { "A": "Bit-stream disk-to-disk Acquisition", "B": "Bit-by-bit Acquisition", "C": "Static Acquisition", "D": "Sparse or Logical Acquisition" }, "answer": "D" }, { "question": "Harold is a web designer who has completed a website for ghttech.net. As part of the maintenance agreement he signed with the client, Harold is performing research online and seeing how much exposure the site has received so far. Harold navigates to google.com and types in the following search: 'link:www.ghttech.net'. What will this search produce?", "options": { "A": "All sites that link to ghttech.net", "B": "Sites that contain the code: link:www.ghttech.net", "C": "All sites that ghttech.net links to", "D": "All search engines that link to .net domains" }, "answer": "A" }, { "question": "Depending upon the jurisdictional areas, different laws apply to different incidents. Which of the following law is related to fraud and related activities with computers?", "options": { "A": "18 USC \u00a71030", "B": "18 USC \u00a71371", "C": "18 USC \u00a71361", "D": "18 USC \u00a71029" }, "answer": "A" }, { "question": "Which mobile forensic method provides the most complete data extraction?", "options": { "A": "Cloud backup extraction", "B": "Physical extraction", "C": "Logical extraction", "D": "File system extraction" }, "answer": "B" }, { "question": "Study the log given below and answer the following question:\nApr 24 14:46:46 [4663]: spp\\_portscan: portscan detected from 194.222.156.169\n\nApr 24 14:46:46 [4663]: IDS27/FIN Scan: 194.222.156.169:56693 -> 172.16.1.107:482\nApr 24 18:01:05 [4663]: IDS/DNS-version-query: 212.244.97.121:3485 -> 172.16.1.107:53\nApr 24 19:04:01 [4663]: IDS213/ftp-passwd-retrieval: 194.222.156.169:1425 -> 172.16.1.107:21\nApr 25 08:02:41 [5875]: spp\\_portscan: PORTSCAN DETECTED from 24.9.255.53\nApr 25 02:08:07 [5875]: IDS277/DNS-version-query: 63.226.81.13:4499 -> 172.16.1.107:53\nApr 25 02:08:07 [5875]: IDS277/DNS-version-query: 63.226.81.13:4630 ->172.16.1.101:53\nApr 25 02:38:17 [5875]: IDS/RPC-rpcinfo-query: 212.251.1.94:642 -> 172.16.1.107:111\nApr 25 19:37:32 [5875]: IDS230/web-cgi-space-wildcard: 198.173.35.164:4221 -> 172.16.1.107:80\nApr 26 05:45:12 [6283]: IDS212/dns-zone-transfer: 38.31.107.87:2291 -> 172.16.1.101:53\nApr 26 06:43:05 [6283]: IDS181/nops-x86: 63.226.81.13:1351 -> 172.16.1.107:53\nApr 26 06:44:25 victim7 PAM\\_pwdb[12509]: (login) session opened for user simple by (uid=0)\nApr 26 06:44:36 victim7 PAM\\_pwdb[12521]: (su) session opened for user simon \nby simple(uid=506) Apr 26 06:45:34 [6283]: IDS175/socks-probe: 24.112.167.35:20 -> 172.16.1.107:1080\nApr 26 06:52:10 [6283]: IDS127/telnet-login-incorrect: 172.16.1.107:23 -> 213.28.22.189:4558\n\nPrecautionary measures to prevent this attack would include writing firewall rules. Among these firewall rules, which one would be appropriate?", "options": { "A": "Block all UDP traffic", "B": "Allow UDP53 in from DNS server to outside", "C": "Disallow TCP53 in from secondaries or ISP server to DNS server", "D": "Disallow UDP53 in from outside to DNS server" }, "answer": "D" }, { "question": "What is the purpose of a C2 (Command and Control) server in malware operations?", "options": { "A": "Distribute spam emails", "B": "Spread through removable drives", "C": "Exfiltrate data and receive commands", "D": "Encrypt victim files" }, "answer": "C" }, { "question": "Which protocol is commonly analyzed in network forensics for email investigations?", "options": { "A": "HTTP", "B": "DNS", "C": "FTP", "D": "SMTP" }, "answer": "D" }, { "question": "One way to identify the presence of hidden partitions on a suspect's hard drive is to:", "options": { "A": "Add up the total size of all known partitions and compare it to the total size of the hard drive", "B": "It is not possible to have hidden partitions on a hard drive", "C": "Examine the FAT and identify hidden partitions by noting an H in the partition Type field", "D": "Examine the LILO and note an H in the partition Type field" }, "answer": "A" }, { "question": "Which forensic investigation methodology believes that criminals commit crimes solely to benefit their criminal enterprises?", "options": { "A": "Daubert Standard", "B": "Fyre Standard", "C": "Enterprise Theory of Investigation", "D": "Scientific Working Group on Digital Evidence" }, "answer": "C" }, { "question": "A honey pot deployed with the IP 172.16.1.108 was compromised by an attacker. Given below is an excerpt from a Snort binary capture of the attack. Decide the activity carried out by the attacker by studying the log. Please note that you are required to infer only what is explicit in the excerpt.\n03/15-20:21:24.107053 211.185.125.124:3500 -> 172.16.1.108:111\nTCP TTL:43 TOS:0x0 ID:29726 IpLen:20 DgmLen:52 DF\n***A**** Seq: 0x9B6338C5 Ack: 0x5820ADD0 Win: 0x7D78 TcpLen: 32 TCP Options (3) => NOP NOP TS: 23678634 2878772\n=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+= 03/15-20:21:24.452051 211.185.125.124:789 -> 172.16.1.103:111\nUDP TTL:43 TOS:0x0 ID:29733 IpLen:20 DgmLen:84\nLen: 64\n01 0A 8A 0A 00 00 00 00 00 00 00 02 00 01 86 A0 ................\n00 00 00 02 00 00 00 03 00 00 00 00 00 00 00 00 ................\n00 00 00 00 00 00 00 00 00 01 86 B8 00 00 00 01 ................\n00 00 00 11 00 00 00 00 ........\n=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+= 03/15-20:21:24.730436 211.185.125.124:790 ->\n172.16.1.103:32773\nUDP TTL:43 TOS:0x0 ID:29781 IpLen:20 DgmLen:1104 Len: 1084\n47 F7 9F 63 00 00 00 00 00 00 00 02 00 01 86 B8", "options": { "A": "The attacker has installed a backdoor", "B": "The attacker has conducted a network sweep on port 111", "C": "The attacker has used a Trojan on port 32773", "D": "The attacker has scanned and exploited the system using Buffer Overflow" }, "answer": "B" }, { "question": "In Windows Security Event Log, what does an event id of 530 imply?", "options": { "A": "Logon Failure - Unknown user name or bad password", "B": "Logon Failure - Account logon time restriction violation", "C": "Logon Failure - User not allowed to logon at this computer", "D": "Logon Failure - Account currently disabled" }, "answer": "B" }, { "question": "What will the following command accomplish in Linux? fdisk /dev/hda", "options": { "A": "Partition the hard drive", "B": "Format the hard drive", "C": "Delete all files under the /dev/hda folder", "D": "Fill the disk with zeros" }, "answer": "A" }, { "question": "UEFI is a specification that defines a software interface between an OS and platform firmware. Where does this interface store information about files present on a disk?", "options": { "A": "Master Boot Record (MBR)", "B": "BIOS Parameter Block", "C": "GUID Partition Table (GPT)", "D": "BIOS-MBR" }, "answer": "C" }, { "question": "Before performing a logical or physical search of a drive in Encase, what must be added to the program?", "options": { "A": "File signatures", "B": "Bookmarks", "C": "Keywords", "D": "Hash sets" }, "answer": "C" }, { "question": "What type of attack sends SYN requests to a target system with spoofed IP addresses?", "options": { "A": "Land", "B": "Ping of death", "C": "SYN flood", "D": "Cross site scripting" }, "answer": "C" }, { "question": "Centralized binary logging is a process in which many websites write binary and unformatted log data to a single log file. What extension should the investigator look to find its log file?", "options": { "A": ".log", "B": ".txt", "C": ".ibl", "D": ".cbl" }, "answer": "C" }, { "question": "What term is used to describe a cryptographic technique for embedding information into something else for the sole purpose of hiding that information from a casual observer?", "options": { "A": "key escrow", "B": "Offset", "C": "rootkit", "D": "steganography" }, "answer": "D" }, { "question": "Which of the following files contains the traces of the applications installed, run, or uninstalled from a system?", "options": { "A": "Image Files", "B": "Prefetch Files", "C": "Virtual Files", "D": "Shortcut Files" }, "answer": "B" }, { "question": "Raw data acquisition format creates ______ of a data set or suspect drive.", "options": { "A": "Simple sequential flat files", "B": "Segmented image files", "C": "Segmented files", "D": "Compressed image files" }, "answer": "A" }, { "question": "What does a XOR-based payload typically indicate?", "options": { "A": "Network tunneling", "B": "Data compression", "C": "Basic obfuscation", "D": "Legitimate encryption" }, "answer": "C" }, { "question": "Which of the following tools is NOT a data collection/acquisition tool?", "options": { "A": "FTK Imager", "B": "Autopsy", "C": "Redline", "D": "EnCase" }, "answer": "C" }, { "question": "Given the drive dimensions as follows and assuming a sector has 512 bytes, what is the capacity of the described hard drive? (22,164 cylinders/disk , 80 heads/cylinder, 63 sectors/track)", "options": { "A": "53.26 GB", "B": "57.19 GB", "C": "11.17 GB", "D": "10 GB" }, "answer": "A" }, { "question": "In Steganalysis, which of the following describes a Known-stego attack?", "options": { "A": "Only the steganography medium is available for analysis", "B": "During the communication process, active attackers can change cover", "C": "Original and stego-object are available and the steganography algorithm is known", "D": "The hidden message and the corresponding stego-image are known" }, "answer": "C" }, { "question": "Pick the statement which does NOT belong to the Rule 804. Hearsay Exceptions; Declarant Unavailable.", "options": { "A": "Statement against interest", "B": "Statement under belief of impending death", "C": "Statement of personal or family history", "D": "Prior statement by witness" }, "answer": "D" }, { "question": "What is the primary purpose of static malware analysis?", "options": { "A": "Examine code without execution", "B": "Observe runtime behavior", "C": "Monitor network traffic", "D": "Analyze memory dumps" }, "answer": "A" }, { "question": "Which tool is commonly used to detect packers and cryptors?", "options": { "A": "PEiD", "B": "IDA Pro", "C": "Wireshark", "D": "Volatility" }, "answer": "A" }, { "question": "Select the data that a virtual memory would store in a Windows-based system.", "options": { "A": "Documents and other files", "B": "Information or metadata of the files", "C": "Running processes", "D": "Application data" }, "answer": "C" }, { "question": "If an attacker's computer sends an IPID of 31400 to a zombie computer on an open port in IDLE scanning, what will be the response?", "options": { "A": "The zombie will not send a response", "B": "31401", "C": "31399", "D": "31402" }, "answer": "D" }, { "question": "If you see the files Zer0.tar.gz and copy.tar.gz on a Linux system while doing an investigation, what can you conclude?", "options": { "A": "The system has been compromised using a t0rnrootkit", "B": "Nothing in particular as these can be operational files", "C": "The system files have been copied by a remote attacker", "D": "The system administrator has created an incremental backup" }, "answer": "B" }, { "question": "What must an investigator do before disconnecting a pendrive from any type of computer?", "options": { "A": "Unmount the pendrive", "B": "Join the pendrive", "C": "Mount the pendrive", "D": "Disjoin the pendrive" }, "answer": "A" }, { "question": "Approximately how many possible sequence number combinations are there in TCP/IP protocol?", "options": { "A": "4 billion", "B": "32 million", "C": "320 billion", "D": "1 billion" }, "answer": "A" }, { "question": "Paul's company is in the process of undergoing a complete security audit including logical and physical security testing. After all logical tests were performed; it is now time for the physical round to begin. None of the employees are made aware of this round of testing. The security-auditing firm sends in a technician dressed as an electrician. He waits outside in the lobby for some employees to get to work and follows behind them when they access the restricted areas. After entering the main office, he is able to get into the server room telling the IT manager that there is a problem with the outlets in that room. What type of attack has the technician performed?", "options": { "A": "Tailgating", "B": "Man trap attack", "C": "Backtrapping", "D": "Fuzzing" }, "answer": "A" }, { "question": "Which Windows registry key is commonly modified for persistence?", "options": { "A": "HKEY_CLASSES_ROOT\\*\\shell", "B": "HKEY_CURRENT_USER\\Control Panel\\Desktop", "C": "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run", "D": "HKEY_LOCAL_MACHINE\\HARDWARE" }, "answer": "C" }, { "question": "Under which Federal Statutes does FBI investigate for computer crimes involving e-mail scams and mail fraud?", "options": { "A": "18 U.S. Code \u00a7 1361 Injuty to Government Property", "B": "None of the above", "C": "18 U.S. Code \u00a7 1030 Fraud and related activity in connection with computers", "D": "18 U.S. Code \u00a7 1029 Possession of Access Devices" }, "answer": "C" }, { "question": "An attacker successfully gained access to a remote Windows system and plans to install persistent backdoors on it. Before that, to avoid getting detected he wants to cover his tracks by disabling the last-accessed timestamps of the machine. What would he do to achieve this?", "options": { "A": "Set the registry value of HKLM\\SYSTEM\\CurrentControlSet\\Control\\FileSystem\\NtfsDisableLastAccessUpdate to 0", "B": "Set the registry value of HKLM\\SYSTEM\\CurrentControlSet\\Control\\FileSystem\\NtfsDisableLastAccessUpdate to 1", "C": "Run the command fsutil behavior set enablelastaccess 0", "D": "Run the command fsutil behavior set disablelastaccess 0" }, "answer": "B" }, { "question": "When a router receives an update for its routing table, what is the metric value change to that path?", "options": { "A": "Decreased by 2", "B": "Decreased by 1", "C": "Increased by 1", "D": "Increased by 2" }, "answer": "C" }, { "question": "You are using DriveSpy, a forensic tool and want to copy 150 sectors where the starting sector is 1709 on the primary hard drive. Which of the following correctly specifies these sectors?", "options": { "A": "0:1000, 150", "B": "0:1709-1858", "C": "0:1709, 150", "D": "1:1709, 150" }, "answer": "C" }, { "question": "Which of the following files DOES NOT use Object Linking and Embedding (OLE) technology to embed and link to other objects?", "options": { "A": "MS-office Word PowerPoint", "B": "MS-office Word Document", "C": "Portable Document Format", "D": "MS-office Word OneNote" }, "answer": "C" }, { "question": "George is performing security analysis for Hammond and Sons LLC. He is testing security vulnerabilities of their wireless network. He plans on remaining \"stealthy\" as possible during the scan. Why would a scanner like Nessus is not recommended in this situation?", "options": { "A": "There are no ways of performing a \"stealthy\" wireless scan", "B": "Nessus is too loud", "C": "Nessus is not a network scanner", "D": "Nessus cannot perform wireless testing" }, "answer": "B" }, { "question": "Data is striped at a byte level across multiple drives, and parity information is distributed among all member drives. What RAID level is represented here?", "options": { "A": "RAID Level 5", "B": "RAID Level 3", "C": "RAID Level 0", "D": "RAID Level 1" }, "answer": "A" }, { "question": "In a FAT32 system, a 123 KB file will use how many sectors?", "options": { "A": "11", "B": "25", "C": "246", "D": "123" }, "answer": "C" }, { "question": "JPEG is a commonly used method of compressing photographic images. It uses a compression algorithm to minimize the size of the natural image, without affecting the percieved quality of the image. The JPEG lossy algorithm divides the image in separate blocks of ____.", "options": { "A": "8x8 pixels", "B": "16x16 pixels", "C": "32x32 pixels", "D": "4x4 pixels" }, "answer": "A" }, { "question": "When examining the log files from a Windows IIS Web Server, how often is a new log file created?", "options": { "A": "a new log is created each time the Web Server is started", "B": "a new log file is created everyday", "C": "a new log file is created each week", "D": "the same log is used at all times" }, "answer": "B" }, { "question": "What type of analysis helps to identify the time and sequence of events in an investigation?", "options": { "A": "Functional", "B": "Relational", "C": "Time-based", "D": "Temporal" }, "answer": "D" }, { "question": "What is the investigator trying to analyze if the system gives the following image as output? \nMicrosoft windows [Version10.0.10586]\n(c) 2015 Microsoft Corporation. All rights reserved.\nC:\\WINDOWS\\system32> C:\\Users\\admin\\Desktop\\logonSessions\\logonsessions.exe\nLogonsessions v1.3\nCopyright (C) 2004-2015 Mark Russinovich\nSysinternals - www.sysinternals.com\n\n[0] Logon session 00000000:000003e7:\nUser name: WORKGROUP\\RD- 006$\nAuth package: NTLM\nLogon type: (none)\nSession: 0\nSid: 5-1-5-18\nLogon time: 3/10/2016 3:32:46 AM\nLogon server:\nDNS Domain:\nUPN:\n\n[1] Logon session 00000000:00009209:\nUser name:\nAuth package: NTLM\nLogon type: (none)\nSession: 0\nSid: (none)\nLogon time: 3/10/2016 3:32:46 AM\nLogon server:\nDNS Domain:\nUPN:\n\n[2] Logon session 00000000:00000304:\nUser name: WORKGROUP\\ RD- 006$\nAuth package: Negotiate\nLogon type: Service\nSession: 0\nSid: 5-1-5-20\nLogon time: 3/10/2016 3:32:46 AM\nLogon server:\nDNS Domain:\nUPN:\n", "options": { "A": "Inactive logon sessions", "B": "Currently active logon sessions", "C": "Details of users who can logon", "D": "All the logon sessions" }, "answer": "D" }, { "question": "Data Files contain Multiple Data Pages, which are further divided into Page Header, Data Rows, and Offset Table. Which of the following is true for Data Rows?", "options": { "A": "Data Rows point to the location of actual data", "B": "Data Rows store the actual data", "C": "Page ID, and so on", "D": "Data Rows present Page type, Page ID, and so on" }, "answer": "B" }, { "question": "Which of the following is not an example of a cyber-crime?", "options": { "A": "Fraud achieved by the manipulation of the computer records", "B": "Firing an employee for misconduct", "C": "Intellectual property theft, including software piracy", "D": "Deliberate circumvention of the computer security systems" }, "answer": "B" }, { "question": "Where is the default location for Apache access logs on a Debian-based Linux computer (e.g., Ubuntu)?", "options": { "A": "/logs/usr/apache/access_log", "B": "/var/log/apache2/access.log", "C": "/usr/local/apache-debian/logs/access_log", "D": "/usr/share_logs/acces.log" }, "answer": "B" }, { "question": "Which of the following protocols allows non-ASCII files, such as video, graphics, and audio, to be sent through the email messages?", "options": { "A": "UUCODE", "B": "UT-16", "C": "MIME", "D": "BINHEX" }, "answer": "C" }, { "question": "Which U.S. law sets the rules for sending emails for commercial purposes, establishes the minimum requirements for commercial messaging, gives the recipient of emails the right to ask the senders to stop emailing them, and spells out the penalties in case the above said rules are violated?", "options": { "A": "American: DoD 5220.22-M", "B": "CAN-SPAM Act", "C": "NO-SPAM Act", "D": "American: NAVSO P-5239-26 (RLL)" }, "answer": "B" }, { "question": "What is the most appropriate type of attack when the password is known to be 6 characters long and includes uppercase letters, lowercase letters, and digits?", "options": { "A": "Brute force attack", "B": "Dictionary attack", "C": "Man in the middle attack", "D": "Rule-based attack" }, "answer": "A" }, { "question": "Sectors are pie-shaped regions on a hard disk that store data. Which of the following parts of a hard disk do not contribute in determining the addresses of data?", "options": { "A": "Heads", "B": "Sectors", "C": "Cylinder", "D": "Interface" }, "answer": "D" }, { "question": "Where is the startup configuration located on a router?", "options": { "A": "Dynamic RAM", "B": "NVRAM", "C": "Static RAM", "D": "BootROM" }, "answer": "B" }, { "question": "What does the presence of 'meterpreter' in traffic indicate?", "options": { "A": "Phishing attack", "B": "Metasploit framework usage", "C": "Ransomware infection", "D": "Cryptojacking" }, "answer": "B" }, { "question": "Sniffers that place NICs in promiscuous mode work at what layer of the OSI model?", "options": { "A": "Transport", "B": "Physical", "C": "Network", "D": "Data Link" }, "answer": "D" }, { "question": "Identify the file system that uses $BitMap file to keep track of all used and unused clusters on a volume.", "options": { "A": "EXT", "B": "NTFS", "C": "FAT32", "D": "FAT" }, "answer": "B" }, { "question": "During an investigation, Noel found the following SIM card from the suspect's mobile.\n 89 44 245252 001451548\n What does the code 89 44 represent?", "options": { "A": "Issuer Identifier Number and TAC", "B": "Individual Account Identification Number and Country Code", "C": "TAC and Industry Identifier", "D": "Industry Identifier and Country code" }, "answer": "D" }, { "question": "An Employee is suspected of stealing proprietary information belonging to your company that he had no rights to possess. The information was stored on the Employees Computer that was protected with the NTFS Encrypted File System (EFS) and you had observed him copy the files to a floppy disk just before leaving work for the weekend. You detain the Employee before he leaves the building and recover the floppy disks and secure his computer. Will you be able to break the encryption so that you can verify that that the employee was in possession of the proprietary information?", "options": { "A": "The EFS Revoked Key Agent can be used on the Computer to recover the information", "B": "When the encrypted file was copied to the floppy disk, it was automatically unencrypted, so you can recover the information", "C": "When the encrypted file was copied to the floppy disk, the EFS private key was also copied to the floppy disk, so you can recover the information", "D": "EFS uses a 128-bit key that can't be cracked, so you will not be able to recover the information" }, "answer": "B" }, { "question": "You are asked to build a forensic lab and your manager has specifically informed you to use copper for lining the walls, ceilings, and floor. What is the purpose of lining the walls, ceilings, and floor with copper?", "options": { "A": "To strengthen the walls, ceilings, and floor", "B": "To control the room temperature", "C": "To avoid electromagnetic emanations", "D": "To make the lab sound proof" }, "answer": "C" }, { "question": "What type of flash memory card comes in either Type I or Type II and consumes only five percent of the power required by small hard drives?", "options": { "A": "SD memory", "B": "MMC memory", "C": "CF memory", "D": "SM memory" }, "answer": "C" }, { "question": "You are assigned to work in the computer forensics lab of a state police agency. While working on a high profile criminal case, you have followed every procedure, however your boss is still concerned that the defense attorney might question whether evidence has been changed while at the lab. What can you prove that the evidence is the same as it was when it first entered the lab?", "options": { "A": "make an SHA3-256 hash of the evidence and compare it with the original SHA3-256 hash that was taken when the evidence first entered the lab", "B": "there is no reason to worry about this possible claim because state labs are certified", "C": "make an SHA3-256 hash of the evidence and compare it to the standard database developed by NIST", "D": "sign a statement attesting that the evidence is the same as it was when it entered the lab" }, "answer": "A" }, { "question": "You are conducting an investigation of fraudulent claims in an insurance company that involves complex text searches through large numbers of documents. Which of the following tools would allow you to quickly and efficiently search for a string within a file on the bitmap image of the target computer?", "options": { "A": "grep", "B": "vim", "C": "lookup", "D": "dir" }, "answer": "A" }, { "question": "Lance wants to place a honeypot on his network. Which of the following would be your recommendations?", "options": { "A": "Use a system that is not directly interacing with the router", "B": "It doesn't matter as all replies are faked", "C": "Use a system that has a dynamic addressing on the network", "D": "Use it on a system in an external DMZ in front of the firewall" }, "answer": "D" }, { "question": "Networks are vulnerable to an attack which occurs due to overextension of bandwidth, bottlenecks, network data interception, etc. Which of the following network attacks refers to a process in which an attacker changes his or her IP address so that he or she appears to be someone else?", "options": { "A": "Man-in-the-middle attack", "B": "Denial of Service attack", "C": "Session sniffing", "D": "IP address spoofing" }, "answer": "D" }, { "question": "NTP (Network Time Protocol) is an Internet standard built on top of TCP/IP that ensures accurate synchronization of computer clocks to the millisecond across a network. Which of the following statements is true regarding NTP Stratum levels?", "options": { "A": "Stratum-0 servers are used on the network; they are not directly connected to computers which then operate as stratum-1 servers", "B": "Stratum-1 time server is linked over a network path to a reliable source of UTC time such as GPS, WWV, or CDMA transmissions", "C": "A stratum-2 server is directly linked (not over a network path) to a reliable source of UTC time such as GPS, WWV, or CDMA transmissions", "D": "A stratum-3 server gets its time over a network link, via NTP, from a stratum-2 server, and so on" }, "answer": "D" }, { "question": "In Linux OS, different log files hold different information, which help the investigators to analyze various issues during a security incident. What information the investigators obtain from the log file var/log/dmesg?", "options": { "A": "All mail server message logs", "B": "Debugging log messages", "C": "Kernel ring buffer information", "D": "Global system messages" }, "answer": "C" }, { "question": "Which of the following is a precomputed table containing word lists like dictionary files and brute force lists and their hash values?", "options": { "A": "Master file Table (MFT)", "B": "Rainbow Table", "C": "Partition Table", "D": "Directory Table" }, "answer": "B" }, { "question": "When carrying out a forensics investigation, why should you never delete a partition on a dynamic disk?", "options": { "A": "The computer will be set in a constant reboot state", "B": "The wrong partition may be set to active", "C": "All virtual memory will be deleted", "D": "This action can corrupt the disk" }, "answer": "D" }, { "question": "Steve, a forensic investigator, was asked to investigate an email incident in his organization. The organization has Microsoft Exchange Server deployed communications. Which among the following files will Steve check to analyze message headers, message text, and standard attachments?", "options": { "A": "PUB.EDB", "B": "PUB.STM", "C": "PRIV.EDB", "D": "PRIV.STM" }, "answer": "C" }, { "question": "Which artifact helps identify DLL side-loading attacks?", "options": { "A": "Legitimate signed binaries", "B": "Large prefetch files", "C": "Encrypted network traffic", "D": "Mismatched DLL hashes" }, "answer": "D" }, { "question": "When investigating a network that uses DHCP to assign IP addresses, where would you look to determine which system (MAC address) had a specific IP address at a specific time?", "options": { "A": "In the DHCP Server log files", "B": "There is no way to determine the specific IP address", "C": "On the individual computer ARP cache", "D": "In the Web Server log files" }, "answer": "A" }, { "question": "In a Linux-based system, what does the command 'Last -F' display?", "options": { "A": "Login and logout times and dates of the system", "B": "Last functions performed", "C": "Last run processes", "D": "Recently opened files" }, "answer": "A" }, { "question": "Which hashing algorithm is most commonly used to verify forensic image integrity today?", "options": { "A": "SHA-256", "B": "CRC32", "C": "SHA-1", "D": "MD5" }, "answer": "A" }, { "question": "You are assigned a task to examine the log files pertaining to MyISAM storage engine. While examining, you are asked to perform a recovery operation on MyISAM log file. Which among the following MySQL Utilities allow you to do so?", "options": { "A": "myisamchk", "B": "mysqldump", "C": "myisamaccess", "D": "myisamlog" }, "answer": "D" }, { "question": "When is it appropriate to use computer forensics?", "options": { "A": "If a financial institution is burglarized by robbers", "B": "If sales drop off for no apparent reason for an extended period of time", "C": "If copyright and intellectual property theft/misuse has occurred", "D": "If employees do not care for their boss management techniques" }, "answer": "C" }, { "question": "What technique is used by JPEGs for compression?", "options": { "A": "DCT", "B": "ZIP", "C": "TIFF-8", "D": "TCD" }, "answer": "A" }, { "question": "What does ICMP Type 3/Code 13 mean?", "options": { "A": "Protocol Unreachable", "B": "Host Unreachable", "C": "Administratively Blocked", "D": "Port Unreachable" }, "answer": "C" }, { "question": "You are carrying out the last round of testing for your new website before it goes live. The website has many dynamic pages and connects to a SQL backend that accesses your product inventory in a database. You come across a web security site that recommends inputting specific code into a search field on web pages to check for vulnerabilities. When you type this and click on search, you receive a pop-up window that says: 'This is a test'.", "options": { "A": "Your website is vulnerable to web bugs", "B": "Your website is vulnerable to XSS", "C": "Your website is vulnerable to blind SQL injection", "D": "Your website is not vulnerable" }, "answer": "B" }, { "question": "Which legislation governs digital evidence handling in the European Union?", "options": { "A": "FERPA", "B": "SOX", "C": "HIPAA", "D": "GDPR" }, "answer": "D" }, { "question": "An investigator has found certain details after analysis of a mobile device. What can reveal the manufacturer information?", "options": { "A": "International mobile subscriber identity (IMSI)", "B": "Integrated circuit card identifier (ICCID)", "C": "Equipment Identity Register (EIR)", "D": "Electronic Serial Number (ESN)" }, "answer": "D" }, { "question": "To preserve digital evidence, an investigator should _____", "options": { "A": "Make two copies of each evidence item using a single imaging tool", "B": "Only store the original evidence item", "C": "Make two copies of each evidence item using different imaging tools", "D": "Make a single copy of each evidence item using an approved imaging tool" }, "answer": "C" }, { "question": "Adam, a forensic investigator, is investigating an attack on Microsoft Exchange Server of a large organization. As the first step of the investigation, he examined the PRIV.EDB file and found the source from where the mail originated and the name of the file that disappeared upon execution. Now, he wants to examine the MIME stream content. Which of the following files is he going to examine?", "options": { "A": "gwcheck.db", "B": "PRIV.STM", "C": "PUB.EDB", "D": "PRIV.EDB" }, "answer": "B" }, { "question": "Smith, an employee of a reputed forensic investigation firm, has been hired by a private organization to investigate a laptop that is suspected to be involved in the hacking of the organization's DC server. Smith wants to find all the values typed into the Run box in the Start menu. Which of the following registry keys will Smith check to find the above information?", "options": { "A": "TypedURLs key", "B": "RunMRU key", "C": "UserAssist Key", "D": "MountedDevices key" }, "answer": "B" }, { "question": "Which of the following processes is part of the dynamic malware analysis?", "options": { "A": "Malware disassembly", "B": "File fingerprinting", "C": "Process Monitoring", "D": "Searching for the strings" }, "answer": "C" }, { "question": "Ron, a computer forensics expert, is investigating a case involving corporate espionage. He has recovered several mobile computing devices from the crime scene. One of the evidence that Ron possesses is a mobile phone from Nokia (3210) that was left in ON condition. Ron needs to recover the IMEI number of the device to establish the identity of the device owner. Which of the following key combinations can he use to recover the IMEI number?", "options": { "A": "*IMEI#", "B": "*#06#", "C": "#*06*#", "D": "#06#*" }, "answer": "C" }, { "question": "Chris has been called upon to investigate a hacking incident reported by one of his clients. The company suspects the involvement of an insider accomplice attack. Upon reaching the incident scene, Chris secures the physical area, records the scene using visual media. He shuts the system down by pulling the plug so that he does not disturb the system in any way. He labels all cables and connectors prior to disconnecting anything. What do you think would be the next sequence of events?", "options": { "A": "Secure the evidence; prepare the system for acquisition; Connect the target media; copy the media", "B": "Connect the target media; prepare the system for acquisition; Secure the evidence; Copy the media", "C": "Prepare the system for acquisition; Connect the target media; copy the media; Secure the evidence", "D": "Connect the target media; Prepare the system for acquisition; Secure the evidence; Copy the media" }, "answer": "C" }, { "question": "An attacker takes advantage of weak authentication or session management mechanisms\u2014such as exposed session IDs, improper logout procedures, password handling, or inadequate session timeouts. For example, if a user accesses their account from a public computer and closes the browser without logging out, an attacker can reopen the browser and gain access to the user's session. Which type of vulnerability is being exploited in this scenario?", "options": { "A": "Password Exploitation", "B": "Timeout Exploitation (session hijackiong)", "C": "I/O exploitation", "D": "Session ID in URLs" }, "answer": "B" }, { "question": "Which of the following file system is used by Mac OS X?", "options": { "A": "HFS+", "B": "EXT2", "C": "NFS", "D": "EFS" }, "answer": "A" }, { "question": "Buffer overflow vulnerability of a web application occurs when it fails to guard its buffer properly and allows writing beyond its maximum size. Thus, it overwrites the ______. There are multiple forms of buffer overflow, including a Heap Buffer Overflow and a Format String Attack.", "options": { "A": "Adjacent string locations", "B": "Adjacent memory locations", "C": "Adjacent buffer locations", "D": "Adjacent bit blocks" }, "answer": "B" }, { "question": "Which technique uses legitimate cloud services for C2?", "options": { "A": "Port knocking", "B": "Webhook abuse", "C": "DNS tunneling", "D": "ICMP covert channels" }, "answer": "B" }, { "question": "Norbert is working as a computer forensics investigator for a consulting firm in Canada. He is called to seize a computer at a local web caf purportedly used as a botnet server. Norbert thoroughly scans the computer and finds nothing that would lead him to think the computer was a botnet server. Norbert decides to scan virtual memory of the computer to possibly find something he had missed. What information will the virtual memory scan produce?", "options": { "A": "It is not necessary to scan the virtual memory of a computer", "B": "It contains the times and dates of when the system was last patched", "C": "Hidden running processes", "D": "It contains the times and dates of all the system files" }, "answer": "C" }, { "question": "Examination of a computer by a technically unauthorized person will almost always result in:", "options": { "A": "Rendering any evidence found admissible in a court of law", "B": "The chain of custody being fully maintained", "C": "Rendering any evidence found inadmissible in a court of law", "D": "Completely accurate results of the examination" }, "answer": "C" }, { "question": "Which federal computer crime law specifically refers to fraud and related activity in connection with access devices like routers?", "options": { "A": "18 U.S. Code \u00a7 2511", "B": "18 U.S. Code \u00a7 1362", "C": "None of the above", "D": "18 U.S. Code \u00a7 1029" }, "answer": "D" }, { "question": "You are contracted to work as a computer forensics investigator for a regional bank that has four 30 TB storage area networks that store customer data. Which method would be most efficient for you to acquire digital evidence from this network?", "options": { "A": "Create a compressed copy of the file with DoubleSpace", "B": "Make a bit-stream disk-to-disk file", "C": "Create a sparse data copy of a folder or file", "D": "Make a bit-stream disk-to-image file" }, "answer": "C" }, { "question": "Office documents (Word, Excel, PowerPoint) contain a code that allows tracking the MAC, or unique identifier, of the machine that created the document. What is that code called?", "options": { "A": "the Individual ASCII String", "B": "the Microsoft Virtual Machine Identifier", "C": "the Personal Application Protocol", "D": "the Globally Unique ID" }, "answer": "D" }, { "question": "Which of the following techniques can be used to beat steganography?", "options": { "A": "Encryption", "B": "Cryptanalysis", "C": "Steganalysis", "D": "Decryption" }, "answer": "C" }, { "question": "The efforts to obtain information before a trail by demanding documents, depositions, questioned and answers written under oath, written requests for admissions of fact and examination of the scene is a description of what legal term?", "options": { "A": "Spoliation", "B": "Discovery", "C": "Detection", "D": "Hearsay" }, "answer": "B" }, { "question": "Which cloud model allows an investigator to acquire the instance of a virtual machine and initiate the forensics examination process?", "options": { "A": "SaaS model", "B": "PaaS model", "C": "SecaaS model", "D": "IaaS model" }, "answer": "D" }, { "question": "What is the primary indicator of a ransomware infection?", "options": { "A": "Disabled Task Manager", "B": "Mass file encryption with new extensions", "C": "Unusual outbound SMTP traffic", "D": "Modified MBR records" }, "answer": "B" }, { "question": "Volatile Memory is one of the leading problems for forensics. Worms such as code Red are memory resident and do not write themselves to the hard drive, turn the system off they disappear. In a lab environment, which of the following options would you suggest as the most appropriate to overcome the problem of capturing volatile memory?", "options": { "A": "Give the Operating System a minimal amount of memory, forcing it to use a swap file", "B": "Use intrusion forensic techniques to study memory resident infections", "C": "Use Vmware to be able to capture the data in memory and examine it", "D": "Create a Separate partition of several hundred megabytes and place the swap file there" }, "answer": "C" }, { "question": "The MAC attributes are timestamps that refer to a time at which the file was last modified or last accessed or originally created. Which of the following store MAC attributes in Coordinated Universal Time (UTC) format?", "options": { "A": "Hierarchical File System (HFS)", "B": "File Allocation Table (FAT)", "C": "Global File System (GFS)", "D": "New Technology File System (NTFS)" }, "answer": "D" }, { "question": "Which of the following commands shows you the username and IP address used to access the system via a remote login session and the Type of client from which they are accessing the system?", "options": { "A": "Net file", "B": "Net sessions", "C": "Net config", "D": "Net share" }, "answer": "B" }, { "question": "> NMAP -sn 192.168.11.200-215 The NMAP command above performs which of the following?", "options": { "A": "A trace sweep", "B": "A port scan", "C": "An operating system detect", "D": "A ping scan" }, "answer": "D" }, { "question": "Tamas, a black hat hacker, has embedded a malware into a small enticing advertisement and posted it on a popular ad-network that displays across various websites. What is she doing?", "options": { "A": "Spearphishing", "B": "Malvertising", "C": "Click-jacking", "D": "Compromising a legitimate site" }, "answer": "B" }, { "question": "Which artifact indicates DLL search-order hijacking?", "options": { "A": "Malicious DLL in application directories", "B": "Large DLL file sizes", "C": "Signed malicious DLLs", "D": "None of the above" }, "answer": "A" }, { "question": "What does the 63.78.199.4(161) denotes in a Cisco router log?\nMar 14 22:57:53.425 EST: %SEC-6-IPACCESSLOGP: list internet-inbound denied udp 66.56.16.77(1029) -> 63.78.199.4(161), 1 packet", "options": { "A": "Source IP address", "B": "None of the above", "C": "Destination IP address", "D": "Login IP address" }, "answer": "C" }, { "question": "Which Windows event log contains security-related events?", "options": { "A": "Application", "B": "Setup", "C": "Security", "D": "System" }, "answer": "C" }, { "question": "Annie is searching for certain deleted files on a system running Windows XP OS (NTFS). Where will she find the files if they were not completely deleted from the system?", "options": { "A": "C:\\$RECYCLER", "B": "C: $Recycled.Bin", "C": "C:\\RECYCLER", "D": "C: \\$Recycle.Bin" }, "answer": "C" }, { "question": "Self-Monitoring, Analysis, and Reporting Technology (SMART) is built into the hard drives to monitor and report system activity. Which of the following in the report generated by SMART?", "options": { "A": "List of running processes", "B": "Logs of high temperatures the drive has reached", "C": "Power Off time", "D": "All the states (running and discontinued) associated with the OS" }, "answer": "B" }, { "question": "What is the primary function of the tool CHKDSK in Windows that authenticates the file system reliability of a volume?", "options": { "A": "Check the disk for hardware errors", "B": "Check the disk for Slack Space", "C": "Repairs logical file system errors", "D": "Check the disk for connectivity errors" }, "answer": "C" }, { "question": "What does a high number of failed DNS lookups indicate?", "options": { "A": "Port scanning", "B": "DGA activity", "C": "Phishing attempt", "D": "Data exfiltration" }, "answer": "B" }, { "question": "If the partition size is 4 GB, each cluster will be 32 K. Even If a file needs only 10 K, the entire 32 K will be allocated, resulting In 22 K of ____.", "options": { "A": "Deleted space", "B": "Slack space", "C": "Cluster space", "D": "Sector space" }, "answer": "B" }, { "question": "Syslog is a client/server protocol standard for forwarding log messages across an IP network. Syslog uses ___ to transfer log messages in a clear text f", "options": { "A": "SMTP", "B": "TCP", "C": "POP", "D": "FTP" }, "answer": "B" }, { "question": "A forensic examiner is examining a Windows system seized from a crime scene. During the examination of a suspect file, he discovered that the file is password protected. He tried guessing the password using the suspect's available information but without any success. Which of the following tool can help to solve this issue?", "options": { "A": "Cain & Abel", "B": "Xplico", "C": "Recuva", "D": "Colasoft's Capsa" }, "answer": "A" }, { "question": "With regard to using an antivirus scanner during a computer forensics investigation, you should:", "options": { "A": "Scan the suspect hard drive before beginning an investigation", "B": "Scan your forensics workstation before beginning an investigation", "C": "Scan your forensics workstation at intervals of no more than once every five minutes during an investigation", "D": "Never run a scan on your forensics workstation because it could change your system configuration" }, "answer": "B" }, { "question": "When reviewing web logs, you see an entry for resource not found in the HTTP status code field. What is the actual error code that you would see in the resource not found?", "options": { "A": "202", "B": "404", "C": "999", "D": "606" }, "answer": "B" }, { "question": "Which artifact helps identify pass-the-hash attacks?", "options": { "A": "Disabled Windows Update", "B": "Modified MBR", "C": "LSASS memory access", "D": "Large DNS queries" }, "answer": "C" }, { "question": "The firewall Quickly freezes up and becomes unusable. You then initiate an FTP connection from an external IP into your internal network. The connection is successful even though you have FTP blocked at the external firewall. What has happened?", "options": { "A": "The firewall failed-open", "B": "The firewall failed-bypass", "C": "The firewall failed-closed", "D": "The firewall ACL has been purged" }, "answer": "A" }, { "question": "Wireless network discovery tools use two different methodologies to detect, monitor and log a WLAN device (i.e. active scanning and passive scanning). A scanning methodology involves ____ and waiting for responses from available wireless networks.", "options": { "A": "Sniffing the packets from the airwave", "B": "Inspecting WLAN and surrounding networks", "C": "Scanning the network", "D": "Broadcasting a probe request frame" }, "answer": "D" }, { "question": "When an investigator contacts by telephone the domain administrator or controller listed by a Who is lookup to request all e-mails sent and received for a user account be preserved, what U.S.C. statute authorizes this phone call and obligates the ISP to preserve e-mail records?", "options": { "A": "Title 18, Section 1030", "B": "Title 18, Section 2703(d)", "C": "Title 18, Section Chapter 90", "D": "Title 18, Section 2703(f)" }, "answer": "D" }, { "question": "Larry is an IT consultant who works for corporations and government agencies. Larry plans on shutting down the city\u2019s network using BGP devices and zombies? What type of Penetration Testing is Larry planning to carry out?", "options": { "A": "Internal Penetration Testing", "B": "DoS Penetration Testing", "C": "Router Penetration Testing", "D": "Firewall Penetration Testing" }, "answer": "B" }, { "question": "During an investigation of an XSS attack, the investigator comes across the term '[a-zA-Z0-9\\%]+' in the analyzed evidence. What is this regular expression used for?", "options": { "A": "Checks for forward slash used in HTML closing tags, its hex or double-encoded hex equivalent", "B": "Checks for closing angle bracket, hex or double-encoded hex equivalent", "C": "Checks for upper and lower-case alphanumeric strings and percent signs, often representing hex-encoded content", "D": "Checks for opening angle bracket, its hex or double-encoded hex equivalent" }, "answer": "C" }, { "question": "The evolution of web services and their increasing use in business offers new attack vectors in an application framework. Web services are based on XML protocols such as web Services Definition Language (WSDL) for describing the connection points, Universal Description, Discovery, and Integration (UDDI) description and discovery of Web services and Simple Object Access Protocol (SOAP) for communication between Web services that are vulnerable to various web application threats. Which of the following layer in web services stack is vulnerable to fault code leaks?", "options": { "A": "Access Layer", "B": "Security Layer", "C": "Discovery Layer", "D": "Presentation Layer" }, "answer": "C" }, { "question": "When examining a file with a Hex Editor, what space does the file header occupy?", "options": { "A": "one byte at the beginning of the file", "B": "the last several bytes of the file", "C": "none, file headers are contained in the FAT", "D": "the first several bytes of the file" }, "answer": "D" }, { "question": "Harold wants to set up a firewall on his network but is not sure which one would be the most appropriate. He knows he needs to allow FTP traffic to one server on his network, but he wants to only allow FTP-PUT. Which firewall would be most appropriate for Harold?", "options": { "A": "Application-level proxy firewall", "B": "Packet filtering firewall", "C": "Data link layer firewall", "D": "Circuit-level proxy firewall" }, "answer": "A" }, { "question": "Which of the following setups should a tester choose to analyze malware behavior?", "options": { "A": "A virtual system with network simulation for internet connection", "B": "A normal system with internet connection", "C": "A normal system without internet connect", "D": "A virtual system with internet connection" }, "answer": "A" }, { "question": "Harold is a computer forensics investigator working for a consulting firm out of Atlanta Georgia. Harold is called upon to help with a corporate espionage in Miami Florida. Harold assists in the investigation by pulling all the data from the computers allegedly used in the illegal activities. He finds that two suspects in the company where stealing sensitive corporate information and selling it to competing companies. From the email and instant messenger logs recovered, Harold has discovered that the two employees notified the buyers by writing symbols on the back of specific stop signs. This way, the buyers knew when and where to meet with the alleged suspects to buy the stolen material. What type of steganography did these two suspects use?", "options": { "A": "Grill cipher", "B": "Visual cipher", "C": "Text semagram", "D": "Visual semagram" }, "answer": "D" }, { "question": "A swap file is a space on a hard disk used as the virtual memory extension of a computer's RAM. Where is the hidden swap file in Windows located?", "options": { "A": "C:\\pagefile.sys", "B": "C:\\config.sys", "C": "C:\\hiberfil.sys", "D": "C:\\ALCSetup.log" }, "answer": "A" }, { "question": "The process of restarting a computer without completely shutting down the system is called?", "options": { "A": "Hot Boot", "B": "Warm boot", "C": "Cold boot", "D": "Ice boot" }, "answer": "B" }, { "question": "Which forensic investigating concept trails the whole incident from how the attack began to how the victim was affected?", "options": { "A": "End-to-end", "B": "Complete event analysis", "C": "Point-to-point", "D": "Thorough" }, "answer": "A" }, { "question": "What is the correct order of volatility for digital evidence?", "options": { "A": "Swap space, RAM, CPU cache, disk storage", "B": "Disk storage, RAM, CPU cache, swap space", "C": "CPU cache, RAM, swap space, disk storage", "D": "RAM, CPU cache, disk storage, swap space" }, "answer": "C" }, { "question": "Which password cracking technique uses every possible combination of character sets?", "options": { "A": "Dictionary attack", "B": "Rule-based attack", "C": "Rainbow table attack", "D": "Brute force attack" }, "answer": "D" }, { "question": "What does the superblock in Linux define?", "options": { "A": "None of the above", "B": "The superblock stores the overall filesystem layout in the disk", "C": "disk ID number", "D": "file names" }, "answer": "B" }, { "question": "What is a SCSI (Small Computer System Interface)?", "options": { "A": "A set of ANSI standard electronic interfaces that allow personal computers to communicate with peripheral hardware such as disk drives, tape drive", "B": "A plug-and-play interface, which allows a device to be added without an adapter card and without rebooting the computer", "C": "A standard electronic interface used between a computer motherboard's data paths or bus and the computer's disk storage devices", "D": "CD-ROM drives, printers, and scanners" }, "answer": "A" }, { "question": "What is kept in the following directory? HKLM\\SECURITY\\Policy\\Secrets", "options": { "A": "Cached password hashes for the past 20 users", "B": "IAS account names and passwords", "C": "Service account passwords in plain text", "D": "Local store PKI Kerberos certificates" }, "answer": "C" }, { "question": "Using Internet logging software to investigate a case of malicious use of computers, the investigator comes across some entries that appear odd.\nFrom the log, the investigator can see where the person in question went on the Internet. From the log, it appears that the user was manually typing in different user ID numbers. What technique this user was trying?", "options": { "A": "SQL injection", "B": "Cookie Poisoning", "C": "Cross site scripting", "D": "Parameter tampering" }, "answer": "D" }, { "question": "Windows Security Accounts Manager (SAM) is a registry file which stores passwords in a hashed format. SAM file in Windows is located at:", "options": { "A": "C:\\windows\\system32\\Boot\\SAM", "B": "C:\\windows\\system32\\drivers\\SAM", "C": "C:\\windows\\system32\\config\\SAM", "D": "C:\\windows\\system32\\con\\SAM" }, "answer": "C" }, { "question": "What is the primary purpose of 'VM detection' in malware?", "options": { "A": "Improve performance", "B": "Enhance persistence", "C": "Avoid analysis environments", "D": "Spread to virtual machines" }, "answer": "C" }, { "question": "What is the target host IP in the following command?\nc:\\>firewalk -F 80 10.10.150.1 172.16.28.95 -p UDP", "options": { "A": "172.16.28.95", "B": "This command is using FIN packets, which cannot scan target hosts", "C": "Firewalk does not scan target hosts", "D": "10.10.150.1" }, "answer": "A" }, { "question": "Which of the following file in Novel GroupWise stores information about user accounts?", "options": { "A": "PRIV.STM", "B": "ngwguard.db", "C": "gwcheck.db", "D": "PRIV.EDB" }, "answer": "B" }, { "question": "In Linux, what is the smallest possible shellcode?", "options": { "A": "8 bytes", "B": "24 bytes", "C": "800 bytes", "D": "80 bytes" }, "answer": "B" }, { "question": "Why should you note all cable connections for a computer you want to seize as evidence?", "options": { "A": "in case other devices were connected", "B": "to know what outside connections existed", "C": "to know what peripheral devices exist", "D": "to know what hardware existed" }, "answer": "B" }, { "question": "Which of the following application password cracking tool can discover all password-protected items on a computer and decrypts them?", "options": { "A": "Passware Kit Forensic", "B": "R-Studio", "C": "TestDisk for Windows", "D": "Windows Password Recovery Bootdisk" }, "answer": "A" }, { "question": "This is the original file structure database that Microsoft designed for floppy disks. It is written to the outermost track of a disk and contains an index of each file stored on the drive.", "options": { "A": "Master File Table (MFT)", "B": "File Allocation Table (FAT)", "C": "Disk Operating System (DOS)", "D": "Master Boot Record (MBR)" }, "answer": "B" }, { "question": "On an Active Directory network using NTLM authentication, where on the domain controllers are the passwords stored?", "options": { "A": "Password.conf", "B": "SAM", "C": "AMS", "D": "Shadow file" }, "answer": "B" }, { "question": "What is a chain of custody?", "options": { "A": "A legal document that demonstrates the progression of evidence as it travels from the original evidence location to the forensic laboratory", "B": "Chain of custody refers to obtaining preemptive court order to restrict further damage of evidence in electronic seizures", "C": "It is a search warrant that is required for seizing evidence at a crime scene", "D": "It is a document that lists chain of windows process events" }, "answer": "A" }, { "question": "Software firewalls work at which layer of the OSI model?", "options": { "A": "Transport", "B": "Network", "C": "Data Link", "D": "Application" }, "answer": "D" }, { "question": "Which file system is used by modern macOS versions?", "options": { "A": "APFS", "B": "EXT4", "C": "FAT32", "D": "HFS+" }, "answer": "A" }, { "question": "P0P3 (Post Office Protocol 3) is a standard protocol for receiving email that deletes mail on the server as soon as the user downloads it. When a messag the POP3 server appends it to the bottom of the recipient's account file, which can be retrieved by the email client at any preferred time. Email client the POP3 server at ____ by default to fetch emails.", "options": { "A": "Port 109", "B": "Port 123", "C": "Port 110", "D": "Port 115" }, "answer": "C" }, { "question": "Which of the following Android libraries are used to render 2D (SGL) or 3D (OpenGL/ES) graphics content to the screen?", "options": { "A": "Surface Manager", "B": "OpenGL/ES and SGL", "C": "WebKit", "D": "Media framework" }, "answer": "B" }, { "question": "In what circumstances would you conduct searches without a warrant?", "options": { "A": "Agents may search a place or object without a warrant if he suspect the crime was committed", "B": "A search warrant is not required if the crime involves Denial-Of-Service attack over the Internet", "C": "Law enforcement agencies located in California under section SB 567 are authorized to seize computers without warrant under all circumstances", "D": "When destruction of evidence is imminent, a warrantless seizure of that evidence is justified if there is probable cause to believe that the item seized evidence of criminal activity" }, "answer": "D" }, { "question": "In what way do the procedures for dealing with evidence in a criminal case differ from the procedures for dealing with evidence in a civil case?", "options": { "A": "evidence must be handled in the same way regardless of the type of case", "B": "evidence procedures are not important unless you work for a law enforcement agency", "C": "evidence in a civil case must be secured more tightly than in a criminal case", "D": "evidence in a criminal case must be secured more tightly than in a civil case" }, "answer": "D" }, { "question": "Which of these ISO standards define the file system for optical storage media, such as CD-ROM and DVD-ROM?", "options": { "A": "ISO 9660", "B": "ISO 13490", "C": "ISO 13346", "D": "ISO 9960" }, "answer": "A" }, { "question": "Which artifact indicates possible process injection?", "options": { "A": "High CPU usage", "B": "Large pagefile.sys", "C": "Multiple temp files", "D": "Suspended processes with RWX memory" }, "answer": "D" }, { "question": "Which program uses different techniques to conceal a malware's code, thereby making it difficult for security mechanisms to detect or remove it?", "options": { "A": "Dropper", "B": "Obfuscator", "C": "Packer", "D": "Injector" }, "answer": "B" }, { "question": "What value of the \"Boot Record Signature\" is used to indicate that the boot-loader exists?", "options": { "A": "A100", "B": "AA00", "C": "00AA", "D": "AA55" }, "answer": "D" }, { "question": "Diskcopy is:", "options": { "A": "a utility by AccessManipulate", "B": "dd copying tool", "C": "a standard MS-DOS command", "D": "Digital Intelligence utility" }, "answer": "C" }, { "question": "Daryl, a computer forensics investigator, has just arrived at the house of an alleged computer hacker. Daryl takes pictures and tags all computer and peripheral equipment found in the house. Daryl packs all the items found in his van and takes them back to his lab for further examination. At his lab, Michael his assistant helps him with the investigation. Since Michael is still in training, Daryl supervises all of his work very carefully. Michael is not quite sure about the procedures to copy all the data off the computer and peripheral devices. How many data acquisition tools should Michael use when creating copies of the evidence for the investigation?", "options": { "A": "Four", "B": "Three", "C": "Two", "D": "One" }, "answer": "C" }, { "question": "What is a good security method to prevent unauthorized users from \"tailgating\"?", "options": { "A": "Electronic key systems", "B": "Electronic combination locks", "C": "Pick-resistant locks", "D": "Man trap" }, "answer": "D" }, { "question": "Sectors in hard disks typically contain how many bytes?", "options": { "A": "1024", "B": "256", "C": "2048", "D": "512" }, "answer": "D" }, { "question": "When cataloging digital evidence, the primary goal is to", "options": { "A": "Not allow the computer to be turned off", "B": "Make bit-stream images of all hard drives", "C": "Preserve evidence integrity", "D": "Not remove the evidence from the scene" }, "answer": "C" } ] }