Computer Hacking Forensic Investigator: 312-49v10 Questions

312-49v10 FAQs

Question #1  

When an investigator contacts by telephone the domain administrator or controller listed by a Who is lookup to request all e-mails sent and received for a user account be preserved, what U.S.C. statute authorizes this phone call and obligates the ISP to preserve e-mail records?

A. Title 18, Section 1030

B. Title 18, Section 2703(d)

C. Title 18, Section Chapter 90

D. Title 18, Section 2703(f)

Correct Answer: D

Question # 2  

Before you are called to testify as an expert, what must an attorney do first?

A. engage in damage control

B. prove that the tools you used to conduct your examination are perfect

C. read your curriculum vitae to the jury

D. qualify you as an expert witness

Correct Answer: D

Question # 3  

What type of attack occurs when an attacker can force a router to stop forwarding packets by flooding the router with many open connections simultaneously so that all the hosts behind the router are effectively disabled?

A. digital attack

B. denial of service

C. physical attack

D. ARP redirect

Correct Answer: B

Question # 4  

The offset in a hexadecimal code is:

A. The last byte after the colon

B. The 0x at the beginning of the code

C. The 0x at the end of the code

D. The first byte after the colon

Correct Answer: B

Question # 5   

Which part of the Windows Registry contains the user’s password file?

A. HKEY_LOCAL_MACHINE

B. HKEY_CURRENT_CONFIGURATION

C. HKEY_USER

D. HKEY_CURRENT_USER

Correct Answer: A

Question # 6   

What does the acronym POST mean as it relates to a PC?

A. Primary Operations Short Test

B. PowerOn Self Test

C. Pre Operational Situation Test

D. Primary Operating System Test

Correct Answer: B

Question # 7  

You are assigned to work in the computer forensics lab of a state police agency. While working on a high profile criminal case, you have followed  every applicable procedure, however your boss is still concerned that the defense attorney might question whether evidence has been changed while at the lab. What can you do to prove that the evidence is the same as it was when it first entered the lab?

A. make an MD5 hash of the evidence and compare it with the original MD5 hash that was taken when the evidence first entered the lab

B. make an MD5 hash of the evidence and compare it to the standard database developed by NIST

C. there is no reason to worry about this possible claim because state labs are certified

D. sign a statement attesting that the evidence is the same as it was when it entered the lab

Correct Answer: A

Question # 8   

What happens when a file is deleted by a Microsoft operating system using the FAT file system?

A. only the reference to the file is removed from the FAT

B. the file is erased and cannot be recovered

C. a copy of the file is stored and the original file is erased

D. the file is erased but can be recovered

Correct Answer: A

Question # 9  

What binary coding is used most often for e-mail purposes?

A. MIME

B. Uuencode

C. IMAP

D. SMTP

Correct Answer: A

Question # 10   

When obtaining a warrant, it is important to:

A. particularlydescribe the place to be searched and particularly describe the items to be seized

B. generallydescribe the place to be searched and particularly describe the items to be seized

C. generallydescribe the place to be searched and generally describe the items to be seized

D. particularlydescribe the place to be searched and generally describe the items to be seized

Correct Answer: A

Question # 11  

Corporate investigations are typically easier than public investigations because:

A. the users have standard corporate equipment and software

B. the investigator does not have to get a warrant

C. the investigator has to get a warrant

D. the users can load whatever they want on their machines

Correct Answer: B

Question # 12   

Why should you note all cable connections for a computer you want to seize as evidence?

A. to know what outside connections existed

B. in case other devices were connected

C. to know what peripheral devices exist

D. to know what hardware existed

Correct Answer: A

Question # 13  

Office documents (Word, Excel, PowerPoint) contain a code that allows tracking the MAC, or unique identifier, of the machine that created the

document. What is that code called?

A. the Microsoft Virtual Machine Identifier

B. the Personal Application Protocol

C. the Globally Unique ID

D. the Individual ASCII String

Correct Answer: C

Question # 14   

You have been asked to investigate the possibility of computer fraud in the finance department of a company. It is suspected that a staff member has been committing finance fraud by printing cheques that have not been authorized. You have exhaustively searched all data files on a bitmap image of the target computer, but have found no evidence. You suspect the files may not have been saved. What should you examine next in this case?

A. The registry

B. The swap file

C. The recycle bin

D. The metadata

Correct Answer: B

Question # 15   

When investigating a network that uses DHCP to assign IP addresses, where would you look to determine which system (MAC address) had a specific IP address at a specific time?

A. on the individual computer’s ARP cache

B. in the Web Server log files

C. in the DHCP Server log files

D. there is no way to determine the specific IP address

Correct Answer: C

Question # 16   

Windows identifies which application to open a file with by examining which of the following?

A. The File extension

B. The file attributes

C. The file Signature at the end of the file

D. The file signature at the beginning of the file

Correct Answer: A

Question # 17   

When you carve an image, recovering the image depends on which of the following skills?

A. Recognizing the pattern of the header content

B. Recovering the image from a tape backup

C. Recognizing the pattern of a corrupt file

D. Recovering the image from the tape backup

Correct Answer: A

Question # 18   

When examining a hard disk without a write-blocker, you should not start windows because Windows will write data to the:

A. Recycle Bin

B. MSDOS.sys

C. BIOS

D. Case files

Correct Answer: A

Question # 19   

This is original file structure database that Microsoft originally designed for floppy disks. It is written to the outermost track of a disk and contains

information about each file stored on the drive.

A. Master Boot Record (MBR)

B. Master File Table (MFT)

C. File Allocation Table (FAT)

D. Disk Operating System (DOS)

Correct Answer: C

Question # 20  

Chris has been called upon to investigate a hacking incident reported by one of his clients. The company suspects the involvement of an insider

accomplice in the attack. Upon reaching the incident scene, Chris secures the physical area, records the scene using visual media. He shuts the

system down by pulling the power plug so that he does not disturb the system in any way. He labels all cables and connectors prior to

disconnecting any. What do you think would be the next sequence of events?

A. Connect the target media; prepare the system for acquisition; Secure the evidence; Copy the media

B. Prepare the system for acquisition; Connect the target media; copy the media; Secure the evidence

C. Connect the target media; Prepare the system for acquisition; Secure the evidence; Copy the media

D. Secure the evidence; prepare the system for acquisition; Connect the target media; copy the media

Correct Answer: B

Pages: 1 2 3 4 5 6 7


Tags: