ECCouncil Computer Hacking Forensic Investigator
ECCouncil Computer Hacking Forensic Investigator
ECCouncil Computer Hacking Forensic Investigator
Exam : EC0-349
QUESTION 1
In what way do the procedures for dealing with evidence in a criminal case differ from the procedures for
dealing with evidence in a civil case?
A. evidence procedures are not important unless you work for a law enforcement agency
B. evidence must be handled in the same way regardless of the type of case
C. evidence in a civil case must be secured more tightly than in a criminal case
D. evidence in a criminal case must be secured more tightly than in a civil case
Answer: B
QUESTION 2
Which part of the Windows Registry contains the user's password file?
A. HKEY_LOCAL_MACHINE
B. HKEY_CURRENT_CONFIGURATION
C. HKEY_USER
D. HKEY_CURRENT_USER
Answer: C
QUESTION 3
If a suspect's computer is located in an area that may have toxic chemicals, you must
Answer: A
QUESTION 4
Profiling is a forensics technique for analyzing evidence with the goal of identifying the perpetrator from their
pervious activity. After a computer has been compromised by a hacker, which of the following would be most
important in forming a profile of the incident?
Answer: D
QUESTION 5
What information do you need to recover when searching a victims computer for a crime committed with
specific e-mail message?
A. Username and password
B. Firewall log
C. E-mail header
D. Internet service provider information
Answer: C
QUESTION 6
The use of warning banners helps a company avoid litigation by overcoming an employees assumed
___________________ when connecting to the companys intranet, network, or virtual private network (VPN)
and will allow the companys investigators to monitor, search, and retrieve information stored within the
network.
A. right of privacy
B. right to Internet access
C. right to work
D. right of free speech
Answer: A
QUESTION 7
When examining a hard disk without a write-blocker, you should not start Windows because Windows will
write data to the:
A. Case files
B. Recycle Bin
C. BIOS
D. MSDOS.SYS
Answer: B
QUESTION 8
How many sectors will a 125 KB file use in a FAT32 file system?
A. 16
B. 25
C. 256
D. 32
Answer: C
QUESTION 9
Which part of the Windows Registry contains the user's password file?
A. HKEY_CURRENT_CONFIGURATION
B. HKEY_USER
C. HKEY_CURRENT_USER
D. HKEY_LOCAL_MACHINE
Answer: B
QUESTION 10
You are working as an independent computer forensics investigator and receive a call from a systems
administrator for a local school system requesting your assistance. One of the students at the local high
school is suspected of downloading inappropriate images from the Internet to a PC in the Computer Lab.
When you arrive at the school, the systems administrator hands you a hard drive and tells you that he made a
simple backup copy of the hard drive in the PC and put it on this drive and requests that you examine the
drive for evidence of the suspected images. You inform him that a simple backup copy will not provide
deleted files or recover file fragments. What type of copy do you need to make to ensure that the evidence
found is complete and admissible in future proceedings?
Answer: D
QUESTION 11
A law enforcement officer may only search for and seize criminal evidence with ____________________,
which are facts or circumstances that would lead a reasonable person to believe a crime has been committed
or is about to be committed, evidence of the specific crime exists, and the evidence of the specific crime
exists at the place to be searched.
A. probable cause
B. a preponderance of the evidence
C. mere suspicion
D. beyond a reasonable doubt
Answer: A
QUESTION 12
To make sure the evidence you recover and analyze with computer forensics software can be admitted in
court, you must test and validate the software. What group is actively providing tools and creating procedures
for testing and validating computer forensics software?
Answer: C
QUESTION 13
When investigating a Windows system, it is important to view the contents of the "page" or "swap" file
because:
Answer: B
QUESTION 14
Profiling is a forensics technique for analyzing evidence with the goal of identifying the perpetrator from their
pervious activity. After a computer has been compromised by a hacker, which of the following would be most
important in forming a profile of the incident?
Answer: D
QUESTION 15
When performing a forensics analysis, what device is used to prevent the system from recording data on an
evidence disk?
A. a disk editor
B. a firewall
C. a write-blocker
D. a protocol analyzer
Answer: C
QUESTION 16
If you plan to startup a suspect's computer, you must modify the ___________ to ensure that you do not
contaminate or alter data on the suspect's hard drive by booting to the hard drive.
A. CMOS
B. Boot.sys
C. deltree command
D. Scandisk utility
Answer: A
QUESTION 17
The use of warning banners helps a company avoid litigation by overcoming an employees assumed
___________________ when connecting to the companys intranet, network, or virtual private network (VPN)
and will allow the companys investigators to monitor, search, and retrieve information stored within the
network.
Answer: C
QUESTION 18
When obtaining a warrant it is important to:
A. particularlydescribe the place to be searched and particularly describe the items to be seized
B. particularlydescribe the place to be searched and generally describe the items to be seized
C. generallydescribe the place to be searched and particularly describe the items to be seized
D. generallydescribe the place to be searched and generally describe the items to be seized
Answer: A
QUESTION 19
Printing under a windows computer normally requires which one of the following files types to be created?
A. EME
B. CME
C. MEM
D. EMF
Answer: D
QUESTION 20
When you carve an image, recovering the image depends on which of the following skills?
Answer: A
QUESTION 21
Printing under a windows computer normally requires which one of the following files types to be created?
A. EMF
B. EME
C. CME
D. MEM
Answer: A
QUESTION 22
What does the superblock in Linux define?
A. location of the firstinode
B. file system names
C. available space
D. disk geometry
Answer: A
QUESTION 23
If a suspect's computer is located in an area that may have toxic chemicals, you must
Answer: B
QUESTION 24
You are working for a large clothing manufacturer as a computer forensics investigator and are called in to
investigate an unusual case of an employee possibly stealing clothing designs from the company and selling
them under a different brand name for a different company. What you discover during the course of the
investigation is that the clothing designs are actually original products of the employee and the company has
no policy against an employee selling his own designs on his own time. The only thing that you can find that
the employee is doing wrong is that his clothing design incorporates the same graphic symbol as that of the
company with only the wording in the graphic being different. What area of the law is the employee violating?
A. copyright law
B. IP Law
C. patent law
D. trademark law
Answer: A
QUESTION 25
Which of the following is NOT a graphics file?
A. Picture3.nfo
B. Picture2.bmp
C. Picture1.tga
D. Picture4.psd
Answer: A
QUESTION 26
From the following spam mail header, identify the host IP that sent this spam?
with SMTP id fAR9QXwZ018431 for ; Tue, 27 Nov 2001 17:26:36 +0800 (HKT) Message-Id: >200111270926.
[email protected]
To: "Shlam"
X-Priority: 3 X-MSMail-
Priority: Normal
A. 203.218.39.50
B. 203.218.39.20
C. 137.189.96.52
D. 8.12.1.0
Answer: B
QUESTION 27
You have used a newly released forensic investigation tool, which doesnt meet the Daubert Test, during a
case. The case has ended-up in court. What argument could the defense make to weaken your case?
Answer: D
QUESTION 28
When performing a forensics analysis, what device is used to prevent the system from recording data on an
evidence disk?
A. a disk editor
B. a write-blocker
C. a protocol analyzer
D. a firewall
Answer: B
QUESTION 29
If you plan to startup a suspect's computer, you must modify the ___________ to ensure that you do not
contaminate or alter data on the suspect's hard drive by booting to the hard drive.
A. Scandisk utility
B. deltree command
C. CMOS
D. Boot.sys
Answer: C
QUESTION 30
Jones had been trying to penetrate a remote production system for the past two weeks. This time however, he
is able to get into the system. He was able to use the system for a period of three weeks. However law
enforcement agencies were recording his every activity and this was later presented as evidence. The
organization had used a virtual environment to trap Jones. What is a virtual environment?
Answer: C
QUESTION 31
You are working as an independent computer forensics investigator and receive a call from a systems
administrator for a local school system requesting your assistance. One of the students at the local high
school is suspected of downloading inappropriate images from the Internet to a PC in the Computer Lab.
When you arrive at the school, the systems administrator hands you a hard drive and tells you that he made a
simple backup copy of the hard drive in the PC and put it on this drive and requests that you examine the
drive for evidence of the suspected images. You inform him that a simple backup copy will not provide
deleted files or recover file fragments. What type of copy do you need to make to ensure that the evidence
found is complete and admissible in future proceedings?
Answer: B
QUESTION 32
The offset in a hexadecimal code is:
Answer: A
QUESTION 33
What does mactime, an essential part of the coroner's toolkit do?
A. It is a tool specific to the MAC OS and forms a core component of the toolkit
B. It traverses the file system and produces a listing of all files based on the modification, access and change
timestamps
C. The toolsscans for i-node information, which is used by other tools in the tool kit
D. It can recover deleted file space and search it for data. However, it does not allow the investigator to
preview them
Answer: B
QUESTION 34
When examining a file with a Hex Editor, what space does the file header occupy?
Answer: A
QUESTION 35
In a computer forensics investigation, what describes the route that evidence takes from the time you find it
until the case is closed or goes to court?
A. chain of custody
B. law of probability
C. rules of evidence
D. policy of separation
Answer: A
QUESTION 36
E-mail logs contain which of the following information to help you in your investigation?
Answer: ABCE
QUESTION 37
Microsoft Outlook maintains email messages in a proprietary format in what type of file?
A. .email
B. .doc
C. .pst
D. .mail
Answer: C
QUESTION 38
You are employed directly by an attorney to help investigate an alleged sexual harassment case at a large
pharmaceutical manufacturer. While at the corporate office of the company, the CEO demands to know the
status of the investigation. What prevents you from discussing the case with the CEO?
A. Trade secrets
B. the attorney-work-product rule
C. ISO 17799
D. Good manners
Answer: B
QUESTION 39
When conducting computer forensic analysis, you must guard against _________ so that you remain focused
on the primary job and insure that the level of work does not increase beyond what was originally expected.
A. scope creep
B. hard drive failure
C. unauthorized expenses
D. overzealous marketing
Answer: A
QUESTION 40
Which of the following should a computer forensics investigations lab have?
A. isolation
B. restricted access
C. open access
D. an entry log
Answer: B
QUESTION 41
What happens when a file is deleted by a Microsoft operating system using the FAT file system?
Answer: C
QUESTION 42
Jones had been trying to penetrate a remote production system for the past two weeks. This time however, he
is able to get into the system. He was able to use the system for a period of three weeks. However law
enforcement agencies were recording his every activity and this was later presented as evidence. The
organization had used a virtual environment to trap Jones. What is a virtual environment?
Answer: B
QUESTION 43
You are called by an author who is writing a book and he wants to know how long the copyright for his book
will last after he has the book published?
Answer: B
QUESTION 44
If a suspect's computer is located in an area that may have toxic chemicals, you must
Answer: A
QUESTION 45
When investigating a network that uses DHCP to assign IP addresses, where would you look to determine
which system (MAC address) had a specific IP address at a specific time?
Answer: B
QUESTION 46
What term is used to describe a cryptographic technique for embedding information into something else for
the sole purpose of hiding that information from the casual observer?
A. steganography
B. rootkit
C. key escrow
D. offset
Answer: A
QUESTION 47
While working for a prosecutor, what do you think you should do if the evidence you found appears to be
exculpatory and is not being released to the defense?
Answer: B
QUESTION 48
What information do you need to recover when searching a victims computer for a crime committed with
specific e-mail message?
A. Firewall log
B. Internet service provider information
C. E-mail header
D. Username and password
Answer: C
QUESTION 49
This is the original file structure database that Microsoft originally designed for floppy disks. It is written to the
outermost track of a disk and contains information about each file stored on the drive.
Answer: D
QUESTION 50
What file structure database would you expect to find on floppy disks?
A. NTFS
B. FAT12
C. FAT32
D. FAT16
Answer: B
QUESTION 51
When conducting computer forensic analysis, you must guard against _________ so that you remain focused
on the primary job and insure that the level of work does not increase beyond what was originally expected.
A. unauthorized expenses
B. overzealous marketing
C. scope creep
D. hard drive failure
Answer: C
QUESTION 52
Office documents (Word, Excel, PowerPoint) contain a code that allows tracking the MAC, or unique identifier,
of the machine that created the document. What is that code called?
Answer: B
QUESTION 53
While working for a prosecutor, what do you think you should do if the evidence you found appears to be
exculpatory and is not being released to the defense?
Answer: D
QUESTION 54
What does the acronym POST mean as it relates to a PC?
QUESTION 55
You are called in to assist the police in an investigation involving a suspected drug dealer. The suspects
house was searched by the police after a warrant was obtained and they located a floppy disk in the suspects
bedroom. The disk contains several files, but they appear to be password protected. What are two common
methods used by password cracking software that you can use to obtain the password?
Answer: B
QUESTION 56
A law enforcement officer may only search for and seize criminal evidence with ____________________,
which are facts or circumstances that would lead a reasonable person to believe a crime has been committed
or is about to be committed, evidence of the specific crime exists, and the evidence of the specific crime
exists at the place to be searched.
A. mere suspicion
B. probable cause
C. beyond a reasonable doubt
D. a preponderance of the evidence
Answer: B
QUESTION 57
What binary coding is used most often for e-mail purposes?
A. SMTP
B. IMAP
C. Uuencode
D. MIME
Answer: C
QUESTION 58
In the context of file deletion process, which of the following statement holds true?
A. The longer a disk is inuse, the less likely it is that deleted files will be overwritten
B. Secure delete programs work by completely overwriting the file in one go
C. When files are deleted, the data is overwritten and the cluster marked as available
D. While booting, the machine may create temporary files that can delete evidence
Answer: D
QUESTION 59
When performing a forensics analysis, what device is used to prevent the system from recording data on an
evidence disk?
A. a write-blocker
B. a disk editor
C. a protocol analyzer
D. a firewall
Answer: A
QUESTION 60
Chris has been called upon to investigate a hacking incident reported by one of his clients. The company
suspects the involvement of an insider accomplice in the attack. Upon reaching the incident scene, Chris
secures the physical area, records the scene using visual media. He shuts the system down by pulling the
power plug so that he does not disturb the system in any way. He labels all cables and connectors prior to
disconnecting any. What do you think would be the next sequence of events?
A. Connect the target media; Prepare the system for acquisition; Secure the evidence; Copy the media
B. Prepare the system for acquisition; Connect the target media; Copy the media; Secure the evidence
C. Connect the target media; Prepare the system for acquisition; Secure the evidence; Copy the media
D. Secure the evidence; Prepare the system for acquisition; Connect the target media; Copy the media
Answer: B
QUESTION 61
In the context of file deletion process, which of the following statement holds true?
A. When files are deleted, the data is overwritten and the cluster marked as available
B. Secure delete programs work by completely overwriting the file in one go
C. The longer a disk is inuse, the less likely it is that deleted files will be overwritten
D. While booting, the machine may create temporary files that can delete evidence
Answer: D
QUESTION 62
If you discover a criminal act while investigating a corporate policy abuse, it becomes a public- sector
investigation and should be referred to law enforcement?
A. True
B. False
Answer: A
QUESTION 63
What does the acronym POST mean as it relates to a PC?
Answer: A
QUESTION 64
Which of the following filesystem is used by Mac OS X?
A. EXT2
B. HFS+
C. EFS
D. NFS
Answer: B
QUESTION 65
A suspect is accused of violating the acceptable use of computing resources, as he has visited adult websites
and downloaded images. The investigator wants to demonstrate that the suspect did indeed visit these sites.
However, the suspect has cleared the search history and emptied the cookie cache. Moreover, he has
removed any images he might have downloaded. What can the investigator do to prove the violation? Choose
the most feasible option.
Answer: D
QUESTION 66
This is the original file structure database that Microsoft originally designed for floppy disks. It is written to the
outermost track of a disk and contains information about each file stored on the drive.
Answer: D
QUESTION 67
Which of the following is NOT a graphics file?
A. Picture1.tga
B. Picture3.nfo
C. Picture4.psd
D. Picture2.bmp
Answer: B
QUESTION 68
_______________________ is simply the application of computer investigation and analysis techniques in the
interests of determining potential legal evidence.
A. Event reaction
B. Network forensics
C. Incident response
D. Computer forensics
Answer: D
QUESTION 69
If you discover a criminal act while investigating a corporate policy abuse, it becomes a public- sector
investigation and should be referred to law enforcement?
A. True
B. False
Answer: A
QUESTION 70
Volatile memory is one of the leading problems for forensics. Worms such as Code Red are memory resident
and do write themselves to the hard drive, if you turn the system off they disappear. In a lab environment,
which of the following options would you suggest as the most appropriate to overcome the problem of
capturing volatile memory?
Answer: B
QUESTION 71
Why should you note all cable connections for a computer you want to seize as evidence?
Answer: A
QUESTION 72
What happens when a file is deleted by a Microsoft operating system using the FAT file system?
Answer: B
QUESTION 73
In conducting a computer abuse investigation you become aware that the suspect of the investigation is using
ABC Company as his Internet Service Provider (ISP). You contact the ISP and request that they provide you
assistance with your investigation. What assistance can the ISP provide?
A. the ISP can investigate computer abuse committed by their employees, but must preserve the privacy of
their customers and therefore cannot assist you without a warrant
B. the ISP can investigate anyone using their service and can provide you with assistance
C. ISPs never maintain log files so they would be of no use to your investigation
D. the ISP cannot conduct any type of investigations on anyone and therefore cannot assist you
Answer: A
QUESTION 74
What should you do when approached by a reporter about a case that you are working on or have worked on?
Answer: A
QUESTION 75
You should make at least how many bit-stream copies of a suspect drive?
A. 2
B. 3
C. 1
D. 4
Answer: A
QUESTION 76
You are working as an investigator for a corporation and you have just received instructions from your
manager to assist in the collection of 15 hard drives that are part of an ongoing investigation. Your job is to
complete the required evidence custody forms to properly document each piece of evidence as it is collected
by other members of your team. Your manager instructs you to complete one multi-evidence form for the
entire case and a single-evidence form for each hard drive. How will these forms be stored to help preserve
the chain of custody of the case?
A. All forms should be placed in an approved secure container because they are now primary evidence in the
case.
B. All forms should be placed in the report file because they are now primary evidence in the case.
C. The multi-evidence form should be placed in an approved secure container with the hard drives and the
single-evidence forms should be placed in the report file.
D. The multi-evidence form should be placed in the report file and the single-evidence forms should be kept
with each hard drive in an approved secure container.
Answer: D
QUESTION 77
What happens when a file is deleted by a Microsoft operating system using the FAT file system?
Answer: A
QUESTION 78
You are working in the Security Department of a law firm. One of the attorneys asks you about the topic of
sending fake email because he has a client who has been charged with doing just that. His client alleges that
he is innocent and that there is no way for a fake email to actually be sent. You inform the attorney that his
client is mistaken and that fake email is a possibility and that you can prove it. You return to your desk and
craft a fake email to the attorney that appears to come from his boss. What port do you send the email to on
the companys SMTP server?
A. 135
B. 110
C. 10
D. 25
Answer: D
QUESTION 79
How many characters long is the fixed-length MD5 algorithm checksum of a critical system file?
A. 32
B. 48
C. 16
D. 64
Answer: A
QUESTION 80
When reviewing web logs, you see an entry for resource not found in the HTTP status code field. What is the
actual error code that you would see in the log for resource not found?
A. 606
B. 202
C. 404
D. 909
Answer: C
QUESTION 81
Which legal document allows law enforcement to search an office, place of business, or other locale for
evidence relating to an alleged crime?
A. search warrant
B. wire tap
C. subpoena
D. bench warrant
Answer: A
QUESTION 82
You are working as computer forensics investigator and are called by the owner of an accounting firm to
investigate possible computer abuse by one of the firms employees. You meet with the owner of the firm and
discover that the company has never published a policy stating that they reserve the right to inspect their
computing assets at will. What do you do?
A. inform the owner that conducting an investigation without a policy is a violation of the 4th Amendment
B. inform the owner that conducting an investigation without a policy is a violation of the employees
expectation of privacy
C. inform the owner that conducting an investigation without a policy is not a problem because the company
is privately owned
D. inform the owner that conducting an investigation without a policy is not a problem because a policy is only
necessary for government agencies
Answer: B
QUESTION 83
Lance wants to place a honeypot on his network. Which of the following would be your recommendations?
Answer: C
QUESTION 84
When monitoring for both intrusion and security events between multiple computers, it is essential that the
computers' clocks are synchronized. Synchronized time allows an administrator to reconstruct what took place
during an attack against multiple computers. Without synchronized time, it is very difficult to determine
exactly when specific events took place, and how events interlace. What is the name of the service used to
synchronize time among multiple computers?
A. Universal Time Set
B. Network Time Protocol
C. Time-Sync Protocol
D. SyncTime Service
Answer: B
QUESTION 85
The MD5 program is used to:
Answer: D
QUESTION 86
You have used a newly released forensic investigation tool, which doesnt meet the Daubert Test, during a
case. The case has ended-up in court. What argument could the defense make to weaken your case?
Answer: D
QUESTION 87
When using Windows acquisitions tools to acquire digital evidence, it is important to use a well- tested
hardware write-blocking device to
Answer: B
QUESTION 88
What file structure database would you expect to find on floppy disks?
A. FAT16
B. FAT12
C. FAT32
D. NTFS
Answer: B
QUESTION 89
Sectors in hard disks typically contain how many bytes?
A. 512
B. 2048
C. 256
D. 1024
Answer: A
QUESTION 90
When reviewing web logs, you see an entry for resource not found in the HTTP status code field. What is the
actual error code that you would see in the log for resource not found?
A. 909
B. 606
C. 202
D. 404
Answer: D
QUESTION 91
This organization maintains a database of hash signatures for known software
Answer: D
QUESTION 92
Sectors in hard disks typically contain how many bytes?
A. 1024
B. 512
C. 2048
D. 256
Answer: B
QUESTION 93
An expert witness may give an opinion if:
A. to deter the witness from expanding the scope of his or her investigation beyond the requirements of the
case
B. to stimulate discussion between the consulting expert and the expert witness
C. the opinion, inferences, or conclusions depend on special knowledge, skill, or training not within the
ordinary experience of lay jurors
D. to define the issues of the case for determination by the finder of fact
Answer: C
QUESTION 94
How many characters long is the fixed-length MD5 algorithm checksum of a critical system file?
A. 64
B. 48
C. 32
D. 16
Answer: C
QUESTION 95
What type of attack occurs when an attacker can force a router to stop forwarding packets by flooding the
router with many open connections simultaneously so that all the hosts behind the router are effectively
disabled?
A. digital attack
B. denial of service
C. ARP redirect
D. physical attack
Answer: B
QUESTION 96
What binary coding is used most often for e-mail purposes?
A. Uuencode
B. SMTP
C. MIME
D. IMAP
Answer: A
QUESTION 97
To make sure the evidence you recover and analyze with computer forensics software can be admitted in
court, you must test and validate the software. What group is actively providing tools and creating procedures
for testing and validating computer forensics software?
QUESTION 98
You are employed directly by an attorney to help investigate an alleged sexual harassment case at a large
pharmaceutical manufacturer. While at the corporate office of the company, the CEO demands to know the
status of the investigation. What prevents you from discussing the case with the CEO?
A. Trade secrets
B. ISO 17799
C. the attorney-work-product rule
D. Good manners
Answer: C
QUESTION 99
In general, _________________ involves the investigation of data that can be retrieved from the hard disk or
other disks of a computer by applying scientific methods to retrieve the data.
A. computer forensics
B. network forensics
C. data recovery
D. disaster recovery
Answer: A
QUESTION 100
Printing under a windows computer normally requires which one of the following files types to be created?
A. EME
B. CME
C. MEM
D. EMF
Answer: D
QUESTION 101
What is the name of the standard Linux command that is also available as a Windows application that can be
used to create bit-stream images?
A. dd
B. mcopy
C. image
D. MD5
Answer: A
QUESTION 102
Which of following refers to the data that might still exist in a cluster even though the original file has been
overwritten by another file?
A. Sector
B. Slack Space
C. MFT
D. Metadata
Answer: B
QUESTION 103
Which part of the Windows Registry contains the user's password file?
A. HKEY_LOCAL_MACHINE
B. HKEY_CURRENT_USER
C. HKEY_CURRENT_CONFIGURATION
D. HKEY_USER
Answer: D
QUESTION 104
E-mail logs contain which of the following information to help you in your investigation?
Answer: ABCE
QUESTION 105
If a suspect's computer is located in an area that may have toxic chemicals, you must
Answer: A
QUESTION 106
Hackers can gain access to the Windows Registry and manipulate user passwords, DNS settings, access
rights, or other features that they may need in order to accomplish their objectives. One simple method for
loading an application at startup is to add an entry (key) to the following Registry hive:
A. HKEY_CURRENT_USER\Microsoft\Default
B. HKEY_LOCAL_MACHINE\Hardware\Windows\Start
C. HKEY_LOCAL_MACHINE\Software\Microsoft\CurrentVersion\Run
D. HKEY_LOCAL_USER\Software\Microsoft\OldVersion\Load
Answer: C
QUESTION 107
Windows identifies which application to open a file with by examining which of the following?
Answer: D
QUESTION 108
The efforts to obtain information before a trial by demanding documents, depositions, questions and answers
written under oath, written requests for admissions of fact, and examination of the scene is a description of
what legal term?
A. Discovery
B. Spoliation
C. Detection
D. Hearsay
Answer: A
QUESTION 109
If you plan to startup a suspect's computer, you must modify the ___________ to ensure that you do not
contaminate or alter data on the suspect's hard drive by booting to the hard drive.
A. deltree command
B. Scandisk utility
C. CMOS
D. Boot.sys
Answer: C
QUESTION 110
How many characters long is the fixed-length MD5 algorithm checksum of a critical system file?
A. 32
B. 64
C. 48
D. 16
Answer: A
QUESTION 111
You have used a newly released forensic investigation tool, which doesn't meet the Daubert Test, during a
case. The case has ended-up in court. What argument could the defense make to weaken your case?
Answer: B
QUESTION 112
Which of the following filesystem is used by Mac OS X?
A. HFS+
B. EFS
C. EXT2
D. NFS
Answer: A
QUESTION 113
While working for a prosecutor, what do you think you should do if the evidence you found appears to be
exculpatory and is not being released to the defense?
Answer: B
QUESTION 114
In Microsoft file structures, sectors are grouped together to form
A. drives
B. clusters
C. partitions
D. bitstreams
Answer: B
QUESTION 115
In a computer forensics investigation, what describes the route that evidence takes from the time you find it
until the case is closed or goes to court?
A. law of probability
B. rules of evidence
C. policy of separation
D. chain of custody
Answer: D
QUESTION 116
When investigating a network that uses DHCP to assign IP addresses, where would you look to determine
which system (MAC address) had a specific IP address at a specific time?
Answer: B
QUESTION 117
Hackers can gain access to the Windows Registry and manipulate user passwords, DNS settings, access
rights, or other features that they may need in order to accomplish their objectives. One simple method for
loading an application at startup is to add an entry (key) to the following Registry hive:
A. HKEY_LOCAL_USER\Software\Microsoft\OldVersion\Load
B. HKEY_LOCAL_MACHINE\Hardware\Windows\Start
C. HKEY_LOCAL_MACHINE\Software\Microsoft\CurrentVersion\Run
D. HKEY_CURRENT_USER\Microsoft\Default
Answer: C
QUESTION 118
What should you do when approached by a reporter about a case that you are working on or have worked on?
Answer: A
QUESTION 119
You have completed a forensic investigation case. You would like to destroy the data contained in various
hard disks at the forensics lab due to sensitivity of the case. How would you permanently erase the data on
the hard disks? (Recovery of data should be impossible)
QUESTION 120
You are assigned to work in the computer forensics lab of a state police agency. While working on a high
profile criminal case, you have followed every applicable procedure, however your boss is still concerned that
the defense attorney might question wheather evidence has been changed while at the lab. What can you do
to prove that the evidence is the same as it was when it first entered the lab?
A. make an MD5 hash of the evidence and compare it with the original MD5 hash that was taken when the
evidence first entered the lab
B. sign a statement attesting that the evidence is the same as it was when it entered the lab
C. there is no reason to worry about this possible claim because state labs are certified
D. make an MD5 hash of the evidence and compare it to the standard database developed by NIST
Answer: A
QUESTION 121
What type of file is represented by a colon (:) with a name following it in the Master File Table (MFT) of an
NTFS disk?
A. an encrypted file
B. a data streamfile
C. a reserved file
D. a compressed file
Answer: B
QUESTION 122
Which of following refers to the data that might still exist in a cluster even though the original file has been
overwritten by another file?
A. Metadata
B. MFT
C. Slack Space
D. Sector
Answer: C
QUESTION 123
You are working as computer forensics investigator and are called by the owner of an accounting firm to
investigate possible computer abuse by one of the firms employees. You meet with the owner of the firm and
discover that the company has never published a policy stating that they reserve the right to inspect their
computing assets at will. What do you do?
A. inform the owner that conducting an investigation without a policy is not a problem because a policy is only
necessary for government agencies
B. inform the owner that conducting an investigation without a policy is a violation of the 4th Amendment
C. inform the owner that conducting an investigation without a policy is a violation of the employees
expectation of privacy
D. inform the owner that conducting an investigation without a policy is not a problem because the company
is privately owned
Answer: C
QUESTION 124
When monitoring for both intrusion and security events between multiple computers, it is essential that the
computers' clocks are synchronized. Synchronized time allows an administrator to reconstruct what took place
during an attack against multiple computers. Without synchronized time, it is very difficult to determine
exactly when specific events took place, and how events interlace. What is the name of the service used to
synchronize time among multiple computers?
Answer: C
QUESTION 125
You have completed a forensic investigation case. You would like to destroy the data contained in various
hard disks at the forensics lab due to sensitivity of the case. How would you permanently erase the data on
the hard disks? (Recovery of data should be impossible)
Answer: E
QUESTION 126
One way to identify the presence of hidden partitions on a suspects hard drive is to:
Answer: C
QUESTION 127
What type of file is represented by a colon (:) with a name following it in the Master File Table (MFT) of an
NTFS disk?
A. a reserved file
B. an encrypted file
C. a compressed file
D. a data streamfile
Answer: D
QUESTION 128
Sectors in hard disks typically contain how many bytes?
A. 512
B. 2048
C. 256
D. 1024
Answer: A
QUESTION 129
In what way do the procedures for dealing with evidence in a criminal case differ from the procedures for
dealing with evidence in a civil case?
A. evidence procedures are not important unless you work for a law enforcement agency
B. evidence in a civil case must be secured more tightly than in a criminal case
C. evidence must be handled in the same way regardless of the type of case
D. evidence in a criminal case must be secured more tightly than in a civil case
Answer: C
QUESTION 130
What term is used to describe a cryptographic technique for embedding information into something else for
the sole purpose of hiding that information from the casual observer?
A. offset
B. rootkit
C. steganography
D. key escrow
Answer: C
QUESTION 131
You are working in the Security Department of a law firm. One of the attorneys asks you about the topic of
sending fake email because he has a client who has been charged with doing just that. His client alleges that
he is innocent and that there is no way for a fake email to actually be sent. You inform the attorney that his
client is mistaken and that fake email is a possibility and that you can prove it. You return to your desk and
craft a fake email to the attorney that appears to come from his boss. What port do you send the email to on
the companys SMTP server?
A. 25
B. 10
C. 135
D. 110
Answer: A
QUESTION 132
As a CHFI professional, which of the following is the most important to your professional reputation?
Answer: A
QUESTION 133
How many characters long is the fixed-length MD5 algorithm checksum of a critical system file?
A. 16
B. 64
C. 32
D. 48
Answer: C
QUESTION 134
How many sectors will a 125 KB file use in a FAT32 file system?
A. 256
B. 32
C. 25
D. 16
Answer: A
QUESTION 135
Jason is the security administrator of ACMA metal Corporation. One day he notices that the company's Oracle
database server has been compromised and the customer information along with financial data has been
stolen. The financial loss will be in millions of dollars if the database gets into the hands of the competitors.
Jason wants to report this crime to the law enforcement agencies immediately. Which organization
coordinates computer crimes investigations throughout the United States?
Answer: C
QUESTION 136
With the standard Linux second extended file system (Ext2fs), a file is deleted when the inode internal link
count reaches ________.
A. 2
B. 0
C. 10
D. 1
Answer: B
QUESTION 137
In Microsoft file structures, sectors are grouped together to form
A. drives
B. clusters
C. partitions
D. bitstreams
Answer: B
QUESTION 138
What file structure database would you expect to find on floppy disks?
A. FAT12
B. NTFS
C. FAT16
D. FAT32
Answer: A
QUESTION 139
E-mail logs contain which of the following information to help you in your investigation?
Answer: ABDE
QUESTION 140
You are working for a large clothing manufacturer as a computer forensics investigator and are called in to
investigate an unusual case of an employee possibly stealing clothing designs from the company and selling
them under a different brand name for a different company. What you discover during the course of the
investigation is that the clothing designs are actually original products of the employee and the company has
no policy against an employee selling his own designs on his own time. The only thing that you can find that
the employee is doing wrong is that his clothing design incorporates the same graphic symbol as that of the
company with only the wording in the graphic being different. What area of the law is the employee violating?
A. patent law
B. copyright law
C. IP Law
D. trademark law
Answer: B
QUESTION 141
You are called by an author who is writing a book and he wants to know how long the copyright for his book
will last after he has the book published?
A. 70 years
B. the life of the author
C. copyrights last forever
D. the life of the author plus 70 years
Answer: D
QUESTION 142
The use of warning banners helps a company avoid litigation by overcoming an employees assumed
___________________ when connecting to the companys intranet, network, or virtual private network (VPN)
and will allow the companys investigators to monitor, search, and retrieve information stored within the
network.
A. right to work
B. right to Internet access
C. right of privacy
D. right of free speech
Answer: C
QUESTION 143
Which of the following filesystem is used by Mac OS X?
A. EFS
B. NFS
C. HFS+
D. EXT2
Answer: C
QUESTION 144
When obtaining a warrant it is important to:
A. generallydescribe the place to be searched and generally describe the items to be seized
B. generallydescribe the place to be searched and particularly describe the items to be seized
C. particularlydescribe the place to be searched and particularly describe the items to be seized
D. particularlydescribe the place to be searched and generally describe the items to be seized
Answer: C
QUESTION 145
Why should you note all cable connections for a computer you want to seize as evidence?
Answer: C
QUESTION 146
When examining a file with a Hex Editor, what space does the file header occupy?
Answer: B
QUESTION 147
Which of the following should a computer forensics investigations lab have?
A. an entry log
B. restricted access
C. isolation
D. open access
Answer: B
QUESTION 148
Which is a standard procedure to perform during all computer forensics investigations?
A. with the hard drive in the suspect PC, check the date and time in the File Allocation Table
B. with the hard drive in the suspect PC, check the date and time in the systems CMOS
C. with the hard drive removed from the suspect PC, check the date and time in the systems RAM
D. with the hard drive removed from the suspect PC, check the date and time in the systems CMOS
Answer: D
QUESTION 149
When investigating a network that uses DHCP to assign IP addresses, where would you look to determine
which system (MAC address) had a specific IP address at a specific time?
Answer: B
QUESTION 150
Which legal document allows law enforcement to search an office, place of business, or other locale for
evidence relating to an alleged crime?
A. wire tap
B. search warrant
C. subpoena
D. bench warrant
Answer: B
QUESTION 151
You are called in to assist the police in an investigation involving a suspected drug dealer. The suspects
house was searched by the police after a warrant was obtained and they located a floppy disk in the suspects
bedroom. The disk contains several files, but they appear to be password protected. What are two common
methods used by password cracking software that you can use to obtain the password?
Answer: C
QUESTION 152
The use of warning banners helps a company avoid litigation by overcoming an employees assumed
___________________ when connecting to the companys intranet, network, or virtual private network (VPN)
and will allow the companys investigators to monitor, search, and retrieve information stored within the
network.
Answer: D
QUESTION 153
What information do you need to recover when searching a victims computer for a crime committed with
specific e-mail message?
A. E-mail header
B. Firewall log
C. Internet service provider information
D. Username and password
Answer: A
QUESTION 154
When investigating a potential e-mail crime, what is your first step in the investigation?
Answer: A
QUESTION 155
When investigating a potential e-mail crime, what is your first step in the investigation?
A. Write a report
B. Trace the IP address to its origin
C. Recover the evidence
D. Determine whether a crime was actually committed
Answer: B
QUESTION 156
You are conducting an investigation of fraudulent claims in an insurance company that involves complex text
searches through large numbers of documents. Which of the following tools would allow you to quickly and
efficiently search for a string within a file on the bitmap image of the target computer?
A. dir
B. strsearch
C. grep
D. grem
Answer: C
QUESTION 157
In general, _________________ involves the investigation of data that can be retrieved from the hard disk or
other disks of a computer by applying scientific methods to retrieve the data.
A. disaster recovery
B. network forensics
C. data recovery
D. computer forensics
Answer: D
QUESTION 158
What is the name of the standard Linux command that is also available as a Windows application that can be
used to create bit-stream images?
A. mcopy
B. image
C. dd
D. MD5
Answer: C
QUESTION 159
_______________________ is simply the application of computer investigation and analysis techniques in the
interests of determining potential legal evidence.
A. Computer forensics
B. Network forensics
C. Incident response
D. Event reaction
Answer: A
QUESTION 160
When you carve an image, recovering the image depends on which of the following skills?
Answer: C
QUESTION 161
What type of file is represented by a colon (:) with a name following it in the Master File Table (MFT) of an
NTFS disk?
A. a reserved file
B. a compressed file
C. a data streamfile
D. an encrypted file
Answer: C
QUESTION 162
From the following spam mail header, identify the host IP that sent this spam?
From [email protected] [email protected] Tue Nov 27 17:27:11 2001
fAR9RAP23061 for ; Tue, 27 Nov 2001 17:27:10 +0800 (HKT) Received: from mydomain.com (pcd249020.
netvigator.com [203.218.39.20]) by viruswall.ie.cuhk.edu.hk (8.12.1/8.12.1)
with SMTP id fAR9QXwZ018431 for ; Tue, 27 Nov 2001 17:26:36 +0800 (HKT)
Message-Id: >[email protected]
To: "Shlam"
Date: Tue, 27 Nov 2001 17:25:58 +0800 MIME-Version: 1.0 X-Priority: 3 X-MSMail-
Priority: Normal
A. 137.189.96.52
B. 203.218.39.50
C. 8.12.1.0
D. 203.218.39.20
Answer: D
QUESTION 163
Before you are called to testify as an expert, what must an attorney do first?
Answer: A
QUESTION 164
When a file is deleted by Windows Explorer or through the MS-DOS Delete command, the operating system
inserts _______________ in the first letter position of the filename in the FAT database.
Answer: A
QUESTION 165
When reviewing web logs, you see an entry for resource not found in the HTTP status code field. What is the
actual error code that you would see in the log for resource not found?
A. 202
B. 909
C. 404
D. 606
Answer: C
QUESTION 166
In a computer forensics investigation, what describes the route that evidence takes from the time you find it
until the case is closed or goes to court?
A. rules of evidence
B. chain of custody
C. policy of separation
D. law of probability
Answer: B
QUESTION 167
An employee is suspected of stealing proprietary information belonging to your company that he had no rights
to possess. The information was stored on the employees computer that was protected with the NTFS
Encrypted File System (EFS) and you had observed him copy the files to a floppy disk just before leaving
work for the weekend. You detain the employee before he leaves the building and recover the floppy disk and
secure his computer. Will you be able to break the encryption so that you can verify that the employee was in
possession of the proprietary information?
A. EFSuses a 128-bit key that cannot be cracked, so you will not be able to recover the information.
B. The EFS Revoked Key Agent can be used on the computer to recover the information.
C. When the encrypted file was copied to the floppy disk, the EFS private key was also copied to the floppy
disk, so you can recover the information.
D. When the encrypted file was copied to the floppy disk, it was automatically unencrypted, so you can
recover the information.
Answer: D
QUESTION 168
From the following spam mail header, identify the host IP that sent this spam?
with SMTP id fAR9QXwZ018431 for ; Tue, 27 Nov 2001 17:26:36 +0800 (HKT)
Message-Id: >[email protected]
To: "Shlam"
X-Priority: 3 X-MSMail-
Priority: Normal
A. 203.218.39.50
B. 137.189.96.52
C. 203.218.39.20
D. 8.12.1.0
Answer: C
QUESTION 169
An expert witness may give an opinion if:
A. the opinion, inferences, or conclusions depend on special knowledge, skill, or training not within the
ordinary experience of lay jurors
B. to deter the witness from expanding the scope of his or her investigation beyond the requirements of the
case
C. to stimulate discussion between the consulting expert and the expert witness
D. to define the issues of the case for determination by the finder of fact
Answer: A
QUESTION 170
What does the acronym POST mean as it relates to a PC?
Answer: A
QUESTION 171
When obtaining a warrant it is important to:
A. generallydescribe the place to be searched and particularly describe the items to be seized
B. particularlydescribe the place to be searched and particularly describe the items to be seized
C. generallydescribe the place to be searched and generally describe the items to be seized
D. particularlydescribe the place to be searched and generally describe the items to be seized
Answer: B
QUESTION 172
A state department site was recently attacked and all the servers had their hard disks erased. The incident
response team sealed the area and commenced investigation. During evidence collection, they came across a
zip disk that did not have the standard labeling on it. The incident team ran the disk on an isolated system and
found that the system disk was accidentally erased. They decided to call in the FBI for further investigation.
Meanwhile, they short listed possible suspects including three summer interns. Where did the incident team
go wrong?
Answer: B
QUESTION 173
You have been asked to investigate the possibility of computer fraud in the finance department of a company.
It is suspected that a staff member has been committing finance fraud by printing cheques that have not been
authorized. You have exhaustively searched all data files on a bitmap image of the target computer, but have
found no evidence. You suspect the files may not have been saved. What should you examine next in this
case?
Answer: C
QUESTION 174
One technique for hiding information is to change the file extension from the correct one to one that might not
be noticed by an investigator. For example, changing a .jpg extension to a .doc extension so that a picture file
appears to be a document. What can an investigator examine to verify that a file has the correct extension?
Answer: A
QUESTION 175
This organization maintains a database of hash signatures for known software
Answer: D
QUESTION 176
During the course of an investigation, you locate evidence that may prove the innocence of the suspect of the
investigation. You must maintain an unbiased opinion and be objective in your entire fact finding process.
Therefore you report this evidence. This type of evidence is known as:
A. Exculpatory evidence
B. Terrible evidence
C. Inculpatory evidence
D. Mandatory evidence
Answer: A
QUESTION 177
To make sure the evidence you recover and analyze with computer forensics software can be admitted in
court, you must test and validate the software. What group is actively providing tools and creating procedures
for testing and validating computer forensics software?
Answer: B
QUESTION 178
When investigating a Windows system, it is important to view the contents of the "page" or "swap" file
because:
Answer: C
QUESTION 179
What does the superblock in Linux define?
A. file system names
B. disk geometry
C. location of the firstinode
D. available space
Answer: C
QUESTION 180
The __________________________ refers to handing over the results of private investigations to the
authorities because of indications of criminal activity.
Answer: C
QUESTION 181
Which Intrusion Detection System (IDS) usually produces the most false alarms due to the unpredictable
behaviors of users and networks?
Answer: B
QUESTION 182
Chris has been called upon to investigate a hacking incident reported by one of his clients. The company
suspects the involvement of an insider accomplice in the attack. Upon reaching the incident scene, Chris
secures the physical area, records the scene using visual media. He shuts the system down by pulling the
power plug so that he does not disturb the system in any way. He labels all cables and connectors prior to
disconnecting any. What do you think would be the next sequence of events?
A. Prepare the system for acquisition; Connect the target media; Copy the media; Secure the evidence
B. Secure the evidence; Prepare the system for acquisition; Connect the target media; Copy the media
C. Connect the target media; Prepare the system for acquisition; Secure the evidence; Copy the media
D. Connect the target media; Prepare the system for acquisition; Secure the evidence; Copy the media
Answer: A
QUESTION 183
Corporate investigations are typically easier than public investigations because
Answer: D
QUESTION 184
What term is used to describe a cryptographic technique for embedding information into something else for
the sole purpose of hiding that information from the casual observer?
A. offset
B. rootkit
C. steganography
D. key escrow
Answer: C
QUESTION 185
A(n) _____________________ is one that performed by a computer program rather than the attacker
manually performing the steps in the attack sequence.
A. blackout attack
B. central processing attack
C. automated attack
D. distributed attack
Answer: C
QUESTION 186
What does the superblock in Linux define?
Answer: A
QUESTION 187
While working for a prosecutor, what do you think you should do if the evidence you found appears to be
exculpatory and is not being released to the defense?
Answer: B
QUESTION 188
To preserve digital evidence, an investigator should _____________________.
Answer: C
QUESTION 189
You should make at least how many bit-stream copies of a suspect drive?
A. 3
B. 2
C. 1
D. 4
Answer: B
QUESTION 190
Chris has been called upon to investigate a hacking incident reported by one of his clients. The company
suspects the involvement of an insider accomplice in the attack. Upon reaching the incident scene, Chris
secures the physical area, records the scene using visual media. He shuts the system down by pulling the
power plug so that he does not disturb the system in any way. He labels all cables and connectors prior to
disconnecting any. What do you think would be the next sequence of events?
A. Connect the target media; Prepare the system for acquisition; Secure the evidence; Copy the media
B. Prepare the system for acquisition; Connect the target media; Copy the media; Secure the evidence
C. Connect the target media; Prepare the system for acquisition; Secure the evidence; Copy the media
D. Secure the evidence; Prepare the system for acquisition; Connect the target media; Copy the media
Answer: B
QUESTION 191
You are called in to assist the police in an investigation involving a suspected drug dealer. The suspects
house was searched by the police after a warrant was obtained and they located a floppy disk in the suspects
bedroom. The disk contains several files, but they appear to be password protected. What are two common
methods used by password cracking software that you can use to obtain the password?
Answer: D
QUESTION 192
If a suspect's computer is located in an area that may have toxic chemicals, you must
A. determine a way to obtain the suspect computer
B. coordinate with the HAZMAT team
C. do not enter alone
D. assume the suspect machine is contaminated
Answer: B
QUESTION 193
You have been asked to investigate after a user has reported a threatening e-mail theyve received from an
external source. Which of the following are you most interested in when trying to trace the source of the
message?
Answer: A
QUESTION 194
Law enforcement officers are conducting a legal search for which a valid warrant was obtained. While
conducting the search, officers observe an item of evidence for an unrelated crime that was not included in
the warrant. The item was clearly visible to the officers and immediately identified as evidence. What is the
term used to describe how this evidence is admissible?
A. corpusdelicti
B. Locard Exchange Principle
C. Ex Parte Order
D. plain view doctrine
Answer: D
QUESTION 195
A suspect is accused of violating the acceptable use of computing resources, as he has visited adult websites
and downloaded images. The investigator wants to demonstrate that the suspect did indeed visit these sites.
However, the suspect has cleared the search history and emptied the cookie cache. Moreover, he has
removed any images he might have downloaded. What can the investigator do to prove the violation? Choose
the most feasible option.
Answer: C
QUESTION 196
Office documents (Word, Excel, PowerPoint) contain a code that allows tracking the MAC, or unique identifier,
of the machine that created the document. What is that code called?
Answer: D
QUESTION 197
When conducting computer forensic analysis, you must guard against _________ so that you remain focused
on the primary job and insure that the level of work does not increase beyond what was originally expected.
Answer: B
QUESTION 198
What does the acronym POST mean as it relates to a PC?
Answer: D
QUESTION 199
Sectors in hard disks typically contain how many bytes?
A. 1024
B. 256
C. 2048
D. 512
Answer: D
QUESTION 200
An employee is attempting to wipe out data stored on a couple of compact discs (CDs) and digital video discs
(DVDs) by using a large magnet. You inform him that this method will not be effective in wiping out the data
because CDs and DVDs are ______________ media used to store large amounts of data and are not affected
by the magnet.
A. anti-magnetic
B. magnetic
C. logical
D. optical
Answer: D
QUESTION 201
You are working as computer forensics investigator and are called by the owner of an accounting firm to
investigate possible computer abuse by one of the firms employees. You meet with the owner of the firm and
discover that the company has never published a policy stating that they reserve the right to inspect their
computing assets at will. What do you do?
A. inform the owner that conducting an investigation without a policy is a violation of the 4th Amendment
B. inform the owner that conducting an investigation without a policy is not a problem because a policy is only
necessary for government agencies
C. inform the owner that conducting an investigation without a policy is a violation of the employees
expectation of privacy
D. inform the owner that conducting an investigation without a policy is not a problem because the company
is privately owned
Answer: C
QUESTION 202
You are working as a computer forensics investigator for a corporation on a computer abuse case. You
discover evidence that shows the subject of your investigation is also embezzling money from the company.
The company CEO and the corporate legal counsel advise you to contact local law enforcement and provide
them with the evidence that you have found. The law enforcement officer that responds requests that you put
a network sniffer on your network and monitor all traffic to the subjects computer. You inform the officer that
you will not be able to comply with that request because doing so would:
Answer: D
QUESTION 203
The police believe that Mevin Matthew has been obtaining unauthorized access to computers belonging to
numerous computer software and computer operating systems manufacturers, cellular telephone
manufacturers, Internet Service Providers, and educational institutions. They also suspect that he has been
stealing, copying, and misappropriating proprietary computer software belonging to the several victim
companies. What is preventing the police from breaking down the suspects door and searching his home and
seizing all of his computer equipment if they have not yet obtained a warrant?
Answer: B
QUESTION 204
You are assisting in the investigation of a possible Web Server hack. The company who called you stated that
customers reported to them that whenever they entered the web address of the company in their browser,
what they received was a pornographic web site. The company checked the web server and nothing appears
wrong. When you type in the IP address of the web site in your browser everything appears normal. What is
the name of the attack that affects the DNS cache of the name resolution servers, resulting in those servers
directing users to the wrong web site?
A. ARP Poisoning
B. IP Spoofing
C. HTTP redirect attack
D. DNS Poisoning
Answer: D
QUESTION 205
When examining a file with a Hex Editor, what space does the file header occupy?
Answer: A
QUESTION 206
You should make at least how many bit-stream copies of a suspect drive?
A. 3
B. 4
C. 2
D. 1
Answer: C
QUESTION 207
You have completed a forensic investigation case. You would like to destroy the data contained in various
hard disks at the forensics lab due to sensitivity of the case. How would you permanently erase the data on
the hard disks? (Recovery of data should be impossible)
Answer: C
QUESTION 208
When a file is deleted by Windows Explorer or through the MS-DOS Delete command, the operating system
inserts _______________ in the first letter position of the filename in the FAT database.
Answer: C
QUESTION 209
Microsoft Outlook maintains email messages in a proprietary format in what type of file?
A. .email
B. .doc
C. .mail
D. .pst
Answer: D
QUESTION 210
Volatile memory is one of the leading problems for forensics. Worms such as Code Red are memory resident
and do write themselves to the hard drive, if you turn the system off they disappear. In a lab environment,
which of the following options would you suggest as the most appropriate to overcome the problem of
capturing volatile memory?
Answer: B
QUESTION 211
You are assigned to work in the computer forensics lab of a state police agency. While working on a high
profile criminal case, you have followed every applicable procedure, however your boss is still concerned that
the defense attorney might question wheather evidence has been changed while at the lab. What can you do
to prove that the evidence is the same as it was when it first entered the lab?
A. make an MD5 hash of the evidence and compare it to the standard database developed by NIST
B. there is no reason to worry about this possible claim because state labs are certified
C. sign a statement attesting that the evidence is the same as it was when it entered the lab
D. make an MD5 hash of the evidence and compare it with the original MD5 hash that was taken when the
evidence first entered the lab
Answer: D
QUESTION 212
You are a computer forensics investigator working with a local police department and you are called to assist
in an investigation of threatening emails. The complainant has printed out 27 email messages from the
suspect and gives the printouts to you. You inform her that you will need to examine her computer because
you need access to the ___________________________ in order to track the emails back to the suspect.
A. firewall log
B. email headers
C. routing table
D. configuration files
Answer: B
QUESTION 213
With the standard Linux second extended file system (Ext2fs), a file is deleted when the inode internal link
count reaches ________.
A. 2
B. 0
C. 1
D. 10
Answer: B
QUESTION 214
What should you do when approached by a reporter about a case that you are working on or have worked on?
Answer: C
QUESTION 215
A state department site was recently attacked and all the servers had their hard disks erased. The incident
response team sealed the area and commenced investigation. During evidence collection, they came across a
zip disk that did not have the standard labeling on it. The incident team ran the disk on an isolated system and
found that the system disk was accidentally erased. They decided to call in the FBI for further investigation.
Meanwhile, they short listed possible suspects including three summer interns. Where did the incident team
go wrong?
Answer: D
QUESTION 216
In the context of file deletion process, which of the following statement holds true?
Answer: B
QUESTION 217
When a file is deleted by Windows Explorer or through the MS-DOS Delete command, the operating system
inserts _______________ in the first letter position of the filename in the FAT database.
A. a blank space
B. the underscore symbol (_)
C. the lowercase Greek letter sigma (s)
D. a capital X
Answer: C
QUESTION 218
To preserve digital evidence, an investigator should _____________________.
Answer: D
QUESTION 219
When investigating a Windows system, it is important to view the contents of the "page" or "swap" file
because:
A. this is the file that Windows uses to store the history of the last 100 commands that were run from the
command line
B. Windows stores all of the systems configuration information in this file
C. this is the file that Windows uses to communicate directly with the Registry
D. a large volume of data can exist within the swap file of which the computer user has no knowledge
Answer: D
QUESTION 220
Jones had been trying to penetrate a remote production system for the past two weeks. This time however, he
is able to get into the system. He was able to use the system for a period of three weeks. However law
enforcement agencies were recording his every activity and this was later presented as evidence. The
organization had used a virtual environment to trap Jones. What is a virtual environment?
Answer: A
QUESTION 221
The __________________________ refers to handing over the results of private investigations to the
authorities because of indications of criminal activity.
A. Kelly Policy
B. Silver-Platter Doctrine
C. Locard Exchange Principle
D. Clark Standard
Answer: B
QUESTION 222
When monitoring for both intrusion and security events between multiple computers, it is essential that the
computers' clocks are synchronized. Synchronized time allows an administrator to reconstruct what took place
during an attack against multiple computers. Without synchronized time, it is very difficult to determine
exactly when specific events took place, and how events interlace. What is the name of the service used to
synchronize time among multiple computers?
A. SyncTime Service
B. Network Time Protocol
C. Universal Time Set
D. Time-Sync Protocol
Answer: B
QUESTION 223
The police believe that Mevin Matthew has been obtaining unauthorized access to computers belonging to
numerous computer software and computer operating systems manufacturers, cellular telephone
manufacturers, Internet Service Providers, and educational institutions. They also suspect that he has been
stealing, copying, and misappropriating proprietary computer software belonging to the several victim
companies. What is preventing the police from breaking down the suspects door and searching his home and
seizing all of his computer equipment if they have not yet obtained a warrant?
Answer: B
QUESTION 224
_______________________ is simply the application of computer investigation and analysis techniques in the
interests of determining potential legal evidence.
A. Event reaction
B. Incident response
C. Computer forensics
D. Network forensics
Answer: C
QUESTION 225
Printing under a windows computer normally requires which one of the following files types to be created?
A. CME
B. EME
C. MEM
D. EMF
Answer: D
QUESTION 226
Which is a standard procedure to perform during all computer forensics investigations?
A. with the hard drive in the suspect PC, check the date and time in the systems CMOS
B. with the hard drive in the suspect PC, check the date and time in the File Allocation Table
C. with the hard drive removed from the suspect PC, check the date and time in the systems CMOS
D. with the hard drive removed from the suspect PC, check the date and time in the systems RAM
Answer: C
QUESTION 227
You are working in the Security Department of a law firm. One of the attorneys asks you about the topic of
sending fake email because he has a client who has been charged with doing just that. His client alleges that
he is innocent and that there is no way for a fake email to actually be sent. You inform the attorney that his
client is mistaken and that fake email is a possibility and that you can prove it. You return to your desk and
craft a fake email to the attorney that appears to come from his boss. What port do you send the email to on
the companys SMTP server?
A. 135
B. 10
C. 110
D. 25
Answer: D
QUESTION 228
Which of the following should a computer forensics investigations lab have?
A. restricted access
B. open access
C. an entry log
D. isolation
Answer: A
QUESTION 229
You have been asked to investigate after a user has reported a threatening e-mail theyve received from an
external source. Which of the following are you most interested in when trying to trace the source of the
message?
Answer: A
QUESTION 230
Which is a standard procedure to perform during all computer forensics investigations?
A. with the hard drive removed from the suspect PC, check the date and time in the systems RAM
B. with the hard drive removed from the suspect PC, check the date and time in the systems CMOS
C. with the hard drive in the suspect PC, check the date and time in the systems CMOS
D. with the hard drive in the suspect PC, check the date and time in the File Allocation Table
Answer: B
QUESTION 231
When using Windows acquisitions tools to acquire digital evidence, it is important to use a well- tested
hardware write-blocking device to
Answer: C
QUESTION 232
In a computer forensics investigation, what describes the route that evidence takes from the time you find it
until the case is closed or goes to court?
A. chain of custody
B. law of probability
C. rules of evidence
D. policy of separation
Answer: A
QUESTION 233
The MD5 program is used to:
Answer: D
QUESTION 234
Which of the following filesystem is used by Mac OS X?
A. NFS
B. EXT2
C. EFS
D. HFS+
Answer: D
QUESTION 235
One technique for hiding information is to change the file extension from the correct one to one that might not
be noticed by an investigator. For example, changing a .jpg extension to a .doc extension so that a picture file
appears to be a document. What can an investigator examine to verify that a file has the correct extension?
Answer: B
QUESTION 236
As a CHFI professional, which of the following is the most important to your professional reputation?
Answer: D
QUESTION 237
When you carve an image, recovering the image depends on which of the following skills?
Answer: B
QUESTION 238
You are employed directly by an attorney to help investigate an alleged sexual harassment case at a large
pharmaceutical manufacturer. While at the corporate office of the company, the CEO demands to know the
status of the investigation. What prevents you from discussing the case with the CEO?
A. Good manners
B. the attorney-work-product rule
C. ISO 17799
D. Trade secrets
Answer: B
QUESTION 239
The rule of the thumb when shutting down a system is to pull the power plug. However, it has certain
drawbacks. Which of the following would that be?
Answer: AB
QUESTION 240
You are contracted to work as a computer forensics investigator for a regional bank that has four 30 TB
storage area networks that store customer data. What method would be most efficient for you to acquire
digital evidence from this network?
Answer: D
QUESTION 241
What happens when a file is deleted by a Microsoft operating system using the FAT file system?
Answer: B
QUESTION 242
With regard to using an antivirus scanner during a computer forensics investigation, you should:
A. scan your forensics workstation at intervals of no more than once every five minutes during an
investigation
B. scan your forensics workstation before beginning an investigation
C. neverrun a scan on your forensics workstation because it could change your systems configuration
D. scan the suspect hard drive before beginning an investigation
Answer: B
QUESTION 243
What type of file is represented by a colon (:) with a name following it in the Master File Table (MFT) of an
NTFS disk?
A. a reserved file
B. a data streamfile
C. a compressed file
D. an encrypted file
Answer: B
QUESTION 244
When investigating a network that uses DHCP to assign IP addresses, where would you look to determine
which system (MAC address) had a specific IP address at a specific time?
Answer: D
QUESTION 245
If you plan to startup a suspect's computer, you must modify the ___________ to ensure that you do not
contaminate or alter data on the suspect's hard drive by booting to the hard drive.
A. CMOS
B. Scandisk utility
C. Boot.sys
D. deltree command
Answer: A
QUESTION 246
You are contracted to work as a computer forensics investigator for a regional bank that has four 30 TB
storage area networks that store customer data. What method would be most efficient for you to acquire
digital evidence from this network?
Answer: C
QUESTION 247
How many sectors will a 125 KB file use in a FAT32 file system?
A. 32
B. 16
C. 25
D. 256
Answer: D
QUESTION 248
In the context of file deletion process, which of the following statement holds true?
A. While booting, the machine may create temporary files that can delete evidence
B. When files are deleted, the data is overwritten and the cluster marked as available
C. The longer a disk is inuse, the less likely it is that deleted files will be overwritten
D. Secure delete programs work by completely overwriting the file in one go
Answer: A
QUESTION 249
Which legal document allows law enforcement to search an office, place of business, or other locale for
evidence relating to an alleged crime?
A. search warrant
B. wire tap
C. subpoena
D. bench warrant
Answer: A
QUESTION 250
You are working as an investigator for a corporation and you have just received instructions from your
manager to assist in the collection of 15 hard drives that are part of an ongoing investigation. Your job is to
complete the required evidence custody forms to properly document each piece of evidence as it is collected
by other members of your team. Your manager instructs you to complete one multi-evidence form for the
entire case and a single-evidence form for each hard drive. How will these forms be stored to help preserve
the chain of custody of the case?
A. All forms should be placed in the report file because they are now primary evidence in the case.
B. The multi-evidence form should be placed in an approved secure container with the hard drives and the
single-evidence forms should be placed in the report file.
C. The multi-evidence form should be placed in the report file and the single-evidence forms should be kept
with each hard drive in an approved secure container.
D. All forms should be placed in an approved secure container because they are now primary evidence in the
case.
Answer: C
QUESTION 251
One technique for hiding information is to change the file extension from the correct one to one that might not
be noticed by an investigator. For example, changing a .jpg extension to a .doc extension so that a picture file
appears to be a document. What can an investigator examine to verify that a file has the correct extension?
Answer: D
QUESTION 252
In general, _________________ involves the investigation of data that can be retrieved from the hard disk or
other disks of a computer by applying scientific methods to retrieve the data.
A. data recovery
B. network forensics
C. disaster recovery
D. computer forensics
Answer: D
QUESTION 253
You have used a newly released forensic investigation tool, which doesnt meet the Daubert Test, during a
case. The case has ended-up in court. What argument could the defense make to weaken your case?
Answer: D
QUESTION 254
What does mactime, an essential part of the coroner's toolkit do?
A. It traverses the file system and produces a listing of all files based on the modification, access and change
timestamps
B. It is a tool specific to the MAC OS and forms a core component of the toolkit
C. The toolsscans for i-node information, which is used by other tools in the tool kit
D. It can recover deleted file space and search it for data. However, it does not allow the investigator to
preview them
Answer: A
QUESTION 255
An expert witness may give an opinion if:
A. to stimulate discussion between the consulting expert and the expert witness
B. to define the issues of the case for determination by the finder of fact
C. to deter the witness from expanding the scope of his or her investigation beyond the requirements of the
case
D. the opinion, inferences, or conclusions depend on special knowledge, skill, or training not within the
ordinary experience of lay jurors
Answer: D
QUESTION 256
You are employed directly by an attorney to help investigate an alleged sexual harassment case at a large
pharmaceutical manufacturer. While at the corporate office of the company, the CEO demands to know the
status of the investigation. What prevents you from discussing the case with the CEO?
Answer: A
QUESTION 257
Melanie was newly assigned to an investigation and asked to make a copy of all the evidence from the
compromised system. Melanie did a DOS copy of all the files on the system. What would be the primary
reason for you to recommend a disk imaging tool?
A. Evidence file format will contain case data entered by the examiner and encrypted at the beginning of the
evidence file
B. A disk imaging tool would check for CRC32s for internal self checking and validation and have MD5
checksum
C. There is no case for an imaging tool as it will use a closed, proprietary format that if compared to the
original will not match up sector for sector
D. A simple DOS copy will not include deleted files, file slack and other information
Answer: D
QUESTION 258
The use of warning banners helps a company avoid litigation by overcoming an employees assumed
___________________ when connecting to the companys intranet, network, or virtual private network (VPN)
and will allow the companys investigators to monitor, search, and retrieve information stored within the
network.
A. right to Internet access
B. right of privacy
C. right to work
D. right of free speech
Answer: B
QUESTION 259
When conducting computer forensic analysis, you must guard against _________ so that you remain focused
on the primary job and insure that the level of work does not increase beyond what was originally expected.
Answer: B
QUESTION 260
You are assisting in the investigation of a possible Web Server hack. The company who called you stated that
customers reported to them that whenever they entered the web address of the company in their browser,
what they received was a pornographic web site. The company checked the web server and nothing appears
wrong. When you type in the IP address of the web site in your browser everything appears normal. What is
the name of the attack that affects the DNS cache of the name resolution servers, resulting in those servers
directing users to the wrong web site?
A. IP Spoofing
B. ARP Poisoning
C. DNS Poisoning
D. HTTP redirect attack
Answer: C
QUESTION 261
Melanie was newly assigned to an investigation and asked to make a copy of all the evidence from the
compromised system. Melanie did a DOS copy of all the files on the system. What would be the primary
reason for you to recommend a disk imaging tool?
A. A disk imaging tool would check for CRC32s for internal self checking and validation and have MD5
checksum
B. A simple DOS copy will not include deleted files, file slack and other information
C. There is no case for an imaging tool as it will use a closed, proprietary format that if compared to the
original will not match up sector for sector
D. Evidence file format will contain case data entered by the examiner and encrypted at the beginning of the
evidence file
Answer: B
QUESTION 262
In what way do the procedures for dealing with evidence in a criminal case differ from the procedures for
dealing with evidence in a civil case?
A. evidence in a civil case must be secured more tightly than in a criminal case
B. evidence in a criminal case must be secured more tightly than in a civil case
C. evidence procedures are not important unless you work for a law enforcement agency
D. evidence must be handled in the same way regardless of the type of case
Answer: D
QUESTION 263
Which legal document allows law enforcement to search an office, place of business, or other locale for
evidence relating to an alleged crime?
A. bench warrant
B. search warrant
C. wire tap
D. subpoena
Answer: B
QUESTION 264
Before you are called to testify as an expert, what must an attorney do first?
Answer: C
QUESTION 265
A state department site was recently attacked and all the servers had their hard disks erased. The incident
response team sealed the area and commenced investigation. During evidence collection, they came across a
zip disk that did not have the standard labeling on it. The incident team ran the disk on an isolated system and
found that the system disk was accidentally erased. They decided to call in the FBI for further investigation.
Meanwhile, they short listed possible suspects including three summer interns. Where did the incident team
go wrong?
Answer: D
QUESTION 266
During the course of an investigation, you locate evidence that may prove the innocence of the suspect of the
investigation. You must maintain an unbiased opinion and be objective in your entire fact finding process.
Therefore you report this evidence. This type of evidence is known as:
A. Mandatory evidence
B. Exculpatory evidence
C. Inculpatory evidence
D. Terrible evidence
Answer: B
QUESTION 267
Jason is the security administrator of ACMA metal Corporation. One day he notices that the company's Oracle
database server has been compromised and the customer information along with financial data has been
stolen. The financial loss will be in millions of dollars if the database gets into the hands of the competitors.
Jason wants to report this crime to the law enforcement agencies immediately. Which organization
coordinates computer crimes investigations throughout the United States?
Answer: C
QUESTION 268
When performing a forensics analysis, what device is used to prevent the system from recording data on an
evidence disk?
A. a protocol analyzer
B. a disk editor
C. a write-blocker
D. a firewall
Answer: C
QUESTION 269
What should you do when approached by a reporter about a case that you are working on or have worked on?
Answer: A
QUESTION 270
If you plan to startup a suspect's computer, you must modify the ___________ to ensure that you do not
contaminate or alter data on the suspect's hard drive by booting to the hard drive.
A. Boot.sys
B. CMOS
C. deltree command
D. Scandisk utility
Answer: B
QUESTION 271
When reviewing web logs, you see an entry for resource not found in the HTTP status code field. What is the
actual error code that you would see in the log for resource not found?
A. 606
B. 404
C. 202
D. 909
Answer: B
QUESTION 272
During the course of a corporate investigation, you find that an employee is committing a crime. Can the
employer file a criminal complain with the police?
A. no, because the investigation was conducted without following standard police procedures
B. no, because the investigation was conducted without a warrant
C. yes, but only if you turn the evidence over to a federal law enforcement agency
D. yes, and all evidence can be turned over to the police
Answer: D
QUESTION 273
You are assigned to work in the computer forensics lab of a state police agency. While working on a high
profile criminal case, you have followed every applicable procedure, however your boss is still concerned that
the defense attorney might question wheather evidence has been changed while at the lab. What can you do
to prove that the evidence is the same as it was when it first entered the lab?
A. make an MD5 hash of the evidence and compare it with the original MD5 hash that was taken when the
evidence first entered the lab
B. there is no reason to worry about this possible claim because state labs are certified
C. sign a statement attesting that the evidence is the same as it was when it entered the lab
D. make an MD5 hash of the evidence and compare it to the standard database developed by NIST
Answer: A
QUESTION 274
Windows identifies which application to open a file with by examining which of the following?
Answer: A
QUESTION 275
With regard to using an antivirus scanner during a computer forensics investigation, you should:
A. scan your forensics workstation at intervals of no more than once every five minutes during an
investigation
B. scan the suspect hard drive before beginning an investigation
C. scan your forensics workstation before beginning an investigation
D. neverrun a scan on your forensics workstation because it could change your systems configuration
Answer: C
QUESTION 276
A(n) _____________________ is one thats performed by a computer program rather than the attacker
manually performing the steps in the attack sequence.
Answer: C
QUESTION 277
Why should you note all cable connections for a computer you want to seize as evidence?
Answer: B
QUESTION 278
A(n) _____________________ is one thats performed by a computer program rather than the attacker
manually performing the steps in the attack sequence.
A. distributed attack
B. blackout attack
C. central processing attack
D. automated attack
Answer: D
QUESTION 279
If you discover a criminal act while investigating a corporate policy abuse, it becomes a public- sector
investigation and should be referred to law enforcement?
A. True
B. False
Answer: A
QUESTION 280
How many characters long is the fixed-length MD5 algorithm checksum of a critical system file?
A. 48
B. 64
C. 16
D. 32
Answer: D
QUESTION 281
You are working as an investigator for a corporation and you have just received instructions from your
manager to assist in the collection of 15 hard drives that are part of an ongoing investigation. Your job is to
complete the required evidence custody forms to properly document each piece of evidence as it is collected
by other members of your team. Your manager instructs you to complete one multi-evidence form for the
entire case and a single-evidence form for each hard drive. How will these forms be stored to help preserve
the chain of custody of the case?
A. The multi-evidence form should be placed in an approved secure container with the hard drives and the
single-evidence forms should be placed in the report file.
B. All forms should be placed in the report file because they are now primary evidence in the case.
C. All forms should be placed in an approved secure container because they are now primary evidence in the
case.
D. The multi-evidence form should be placed in the report file and the single-evidence forms should be kept
with each hard drive in an approved secure container.
Answer: D
QUESTION 282
Lance wants to place a honeypot on his network. Which of the following would be your recommendations?
Answer: C
QUESTION 283
In conducting a computer abuse investigation you become aware that the suspect of the investigation is using
ABC Company as his Internet Service Provider (ISP). You contact the ISP and request that they provide you
assistance with your investigation. What assistance can the ISP provide?
A. the ISP cannot conduct any type of investigations on anyone and therefore cannot assist you
B. ISPs never maintain log files so they would be of no use to your investigation
C. the ISP can investigate computer abuse committed by their employees, but must preserve the privacy of
their customers and therefore cannot
assist you without a warrant
D. the ISP can investigate anyone using their service and can provide you with assistance
Answer: C
QUESTION 284
An expert witness may give an opinion if:
A. the opinion, inferences, or conclusions depend on special knowledge, skill, or training not within the
ordinary experience of lay jurors
B. to deter the witness from expanding the scope of his or her investigation beyond the requirements of the
case
C. to stimulate discussion between the consulting expert and the expert witness
D. to define the issues of the case for determination by the finder of fact
Answer: A
QUESTION 285
Which of following refers to the data that might still exist in a cluster even though the original file has been
overwritten by another file?
A. Sector
B. Slack Space
C. Metadata
D. MFT
Answer: B
QUESTION 286
When examining a hard disk without a write-blocker, you should not start Windows because Windows will
write data to the:
A. Case files
B. BIOS
C. MSDOS.SYS
D. Recycle Bin
Answer: D
QUESTION 287
An employee is attempting to wipe out data stored on a couple of compact discs (CDs) and digital video discs
(DVDs) by using a large magnet. You inform him that this method will not be effective in wiping out the data
because CDs and DVDs are ______________ media used to store large amounts of data and are not affected
by the magnet.
A. optical
B. logical
C. magnetic
D. anti-magnetic
Answer: A
QUESTION 288
You are employed directly by an attorney to help investigate an alleged sexual harassment case at a large
pharmaceutical manufacturer. While at the corporate office of the company, the CEO demands to know the
status of the investigation. What prevents you from discussing the case with the CEO?
A. Trade secrets
B. the attorney-work-product rule
C. Good manners
D. ISO 17799
Answer: B
QUESTION 289
When investigating a potential e-mail crime, what is your first step in the investigation?
Answer: B
QUESTION 290
Office documents (Word, Excel, PowerPoint) contain a code that allows tracking the MAC, or unique identifier,
of the machine that created the document. What is that code called?
A. Globally Unique ID
B. Personal Application Protocol
C. Individual ASCII String
D. Microsoft Virtual Machine Identifier
Answer: A
QUESTION 291
An employee is suspected of stealing proprietary information belonging to your company that he had no rights
to possess. The information was stored on the employees computer that was protected with the NTFS
Encrypted File System (EFS) and you had observed him copy the files to a floppy disk just before leaving
work for the weekend. You detain the employee before he leaves the building and recover the floppy disk and
secure his computer. Will you be able to break the encryption so that you can verify that the employee was in
possession of the proprietary information?
A. When the encrypted file was copied to the floppy disk, it was automatically unencrypted, so you can
recover the information.
B. EFSuses a 128-bit key that cannot be cracked, so you will not be able to recover the information.
C. When the encrypted file was copied to the floppy disk, the EFS private key was also copied to the floppy
disk, so you can recover the information.
D. The EFS Revoked Key Agent can be used on the computer to recover the information.
Answer: A
QUESTION 292
What type of file is represented by a colon (:) with a name following it in the Master File Table (MFT) of an
NTFS disk?
A. an encrypted file
B. a data streamfile
C. a reserved file
D. a compressed file
Answer: B
QUESTION 293
What term is used to describe a cryptographic technique for embedding information into something else for
the sole purpose of hiding that information from the casual observer?
A. key escrow
B. rootkit
C. steganography
D. offset
Answer: C
QUESTION 294
When cataloging digital evidence, the primary goal is to
Answer: A
QUESTION 295
E-mail logs contain which of the following information to help you in your investigation?
Answer: ABCD
QUESTION 296
Which of the following is NOT a graphics file?
A. Picture2.bmp
B. Picture1.tga
C. Picture4.psd
D. Picture3.nfo
Answer: D
QUESTION 297
You are working as computer forensics investigator and are called by the owner of an accounting firm to
investigate possible computer abuse by one of the firms employees. You meet with the owner of the firm and
discover that the company has never published a policy stating that they reserve the right to inspect their
computing assets at will. What do you do?
A. inform the owner that conducting an investigation without a policy is not a problem because a policy is only
necessary for government agencies
B. inform the owner that conducting an investigation without a policy is a violation of the employees
expectation of privacy
C. inform the owner that conducting an investigation without a policy is a violation of the 4th Amendment
D. inform the owner that conducting an investigation without a policy is not a problem because the company
is privately owned
Answer: B
QUESTION 298
Lance wants to place a honeypot on his network. Which of the following would be your recommendations?
Answer: B
QUESTION 299
When conducting computer forensic analysis, you must guard against _________ so that you remain focused
on the primary job and insure that the level of work does not increase beyond what was originally expected.
A. scope creep
B. unauthorized expenses
C. hard drive failure
D. overzealous marketing
Answer: A
QUESTION 300
You are working for a large clothing manufacturer as a computer forensics investigator and are called in to
investigate an unusual case of an employee possibly stealing clothing designs from the company and selling
them under a different brand name for a different company. What you discover during the course of the
investigation is that the clothing designs are actually original products of the employee and the company has
no policy against an employee selling his own designs on his own time. The only thing that you can find that
the employee is doing wrong is that his clothing design incorporates the same graphic symbol as that of the
company with only the wording in the graphic being different. What area of the law is the employee violating?
A. trademark law
B. patent law
C. IP Law
D. copyright law
Answer: D
QUESTION 301
When you are running a vulnerability scan on a network and the IDS cuts off your connection, what type of
IDS is being used?
A. Passive IDS
B. Active IDS
C. Progressive IDS
D. NIPS
Answer: B
QUESTION 302
Simon is a former employee of Trinitron XML Inc. He feels he was wrongly terminated and wants to hack into
his former company's network. Since Simon remembers some of the server names, he attempts to run the
axfr and ixfr commands using DIG. What is Simon trying to accomplish here?
Answer: C
QUESTION 303
What will the following command produce on a website login page? SELECT email, passwd, login_id,
full_name FROM members WHERE email = '[email protected]'; DROP TABLE members; --'
Answer: A
QUESTION 304
You setup SNMP in multiple offices of your company. Your SNMP software manager is not receiving data
from other offices like it is for your main office. You suspect that firewall changes are to blame. What ports
should you open for SNMP to work through Firewalls (Select 2)
A. 162
B. 161
C. 163
D. 160
Answer: AB
QUESTION 305
You are carrying out the last round of testing for your new website before it goes live. The website has many
dynamic pages and connects to a SQL backend that accesses your product inventory in a database. You
come across a web security site that recommends inputting the following code into a search field on web
pages to check for vulnerabilities: When you type this and click on search, you receive a pop-up window that
says:
Answer: A
QUESTION 306
If an attacker's computer sends an IPID of 31400 to a zombie computer on an open port in IDLE scanning,
what will be the response?
Answer: D
QUESTION 307
Michael works for Kimball Construction Company as senior security analyst. As part of yearly security audit,
Michael scans his network for vulnerabilities. Using Nmap, Michael conducts XMAS scan and most of the
ports scanned do not give a response. In what state are these ports?
A. Closed
B. Open
C. Stealth
D. Filtered
Answer: B
QUESTION 308
You are assisting a Department of Defense contract company to become compliant with the stringent security
policies set by the DoD. One such strict rule is that firewalls must only allow incoming connections that were
first initiated by internal computers. What type of firewall must you implement to abide by this policy?
Answer: D
QUESTION 309
Jessica works as systems administrator for a large electronics firm. She wants to scan her network quickly to
detect live hosts by using ICMP ECHO Requests. What type of scan is Jessica going to perform?
A. Tracert
B. Smurf scan
C. Ping trace
D. ICMP ping sweep
Answer: D
QUESTION 310
You work as an IT security auditor hired by a law firm in Boston to test whether you can gain access to
sensitive information about the company clients. You have rummaged through their trash and found very little
information. You do not want to set off any alarms on their network, so you plan on performing passive
footprinting against their Web servers. What tool should you use?
A. Ping sweep
B. Nmap
C. Netcraft
D. Dig
Answer: C
QUESTION 311
You are a security analyst performing a penetration tests for a company in the Midwest. After some initial
reconnaissance, you discover the IP addresses of some Cisco routers used by the company. You type in the
following URL that includes the IP address of one of the routers:
http://172.168.4.131/level/99/exec/show/config
After typing in this URL, you are presented with the entire configuration file for that router. What have you
discovered?
Answer: A
QUESTION 312
What is the following command trying to accomplish?
A. Verify that UDP port 445 is open for the 192.168.0.0 network
B. Verify that TCP port 445 is open for the 192.168.0.0 network
C. Verify that NETBIOS is running for the 192.168.0.0 network
D. Verify that UDP port 445 is closed for the 192.168.0.0 network
Answer: A
QUESTION 313
You are the network administrator for a small bank in Dallas, Texas. To ensure network security, you enact a
security policy that reQuires all users to have 14 character passwords. After giving your users 2 weeks notice,
you change the Group Policy to force 14 character passwords. A week later you dump the SAM database from
the standalone server and run a password-cracking tool against it. Over 99% of the passwords are broken
within an hour. Why were these passwords cracked so Quickly?
Answer: A
QUESTION 314
An "idle" system is also referred to as what?
Answer: B
QUESTION 315
Larry is an IT consultant who works for corporations and government agencies. Larry plans on shutting down
the city's network using BGP devices and zombies? What type of Penetration Testing is Larry planning to
carry out?
A. Router Penetration Testing
B. DoS Penetration Testing
C. Firewall Penetration Testing
D. Internal Penetration Testing
Answer: B
QUESTION 316
Click on the Exhibit Button To test your website for vulnerabilities, you type in a Quotation mark (? for the
username field. After you click Ok, you receive the following error message window: What can you infer from
this error window?
Answer: A
QUESTION 317
John and Hillary works at the same department in the company. John wants to find out Hillary's network
password so he can take a look at her documents on the file server. He enables Lophtcrack program to
sniffing mode. John sends Hillary an email with a link to Error! Reference source not found. What information
will he be able to gather from this?
Answer: A
QUESTION 318
Bill is the accounting manager for Grummon and Sons LLC in Chicago. On a regular basis, he needs to send
PDF documents containing sensitive information through E-mail to his customers. Bill protects the PDF
documents with a password and sends them to their intended recipients.
Why PDF passwords do not offer maximum protection?
Answer: A
QUESTION 319
Meyer Electronics Systems just recently had a number of laptops stolen out of their office. On these laptops
contained sensitive corporate information regarding patents and company strategies. A month after the
laptops were stolen, a competing company was found to have just developed products that almost exactly
duplicated products that Meyer produces. What could have prevented this information from being stolen from
the laptops?
A. EFS Encryption
B. DFS Encryption
C. IPS Encryption
D. SDW Encryption
Answer: A
QUESTION 320
Kimberly is studying to be an IT security analyst at a vocational school in her town. The school offers many
different programming as well as networking languages. What networking protocol language should she learn
that routers utilize?
A. ATM
B. UDP
C. BPG
D. OSPF
Answer: D
QUESTION 321
What is the target host IP in the following command?
A. 172.16.28.95
B. 10.10.150.1
C. Firewalk does not scan target hosts
D. This command is using FIN packets, which cannot scan target hosts
Answer: A
QUESTION 322
George is a senior security analyst working for a state agency in Florida. His state's congress just passed a bill
mandating every state agency to undergo a security audit annually. After learning what will be required,
George needs to implement an IDS as soon as possible before the first audit occurs. The state bill requires
that an IDS with a "time-based induction machine" be used. What IDS feature must George implement to
meet this requirement?
Answer: C
QUESTION 323
John is using Firewalk to test the security of his Cisco PIX firewall. He is also utilizing a sniffer located on a
subnet that resides deep inside his network. After analyzing the sniffer log files, he does not see any of the
traffic produced by Firewalk. Why is that?
Answer: D
QUESTION 324
After undergoing an external IT audit, George realizes his network is vulnerable to DDoS attacks. What
countermeasures could he take to prevent DDoS attacks?
Answer: B
QUESTION 325
George is performing security analysis for Hammond and Sons LLC. He is testing security vulnerabilities of
their wireless network. He plans on remaining as "stealthy" as possible during the scan. Why would a scanner
like Nessus is not recommended in this situation?
Answer: A
QUESTION 326
At what layer of the OSI model do routers function on?
A. 4
B. 3
C. 1
D. 5
Answer: B
QUESTION 327
Frank is working on a vulnerability assessment for a company on the West coast. The company hired Frank to
assess its network security through scanning, pen tests, and vulnerability assessments. After discovering
numerous known vulnerabilities detected by a temporary IDS he set up, he notices a number of items that
show up as unknown but Questionable in the logs. He looks up the behavior on the Internet, but cannot find
anything related. What organization should Frank submit the log to find out if it is a new vulnerability or not?
A. APIPA
B. IANA
C. CVE
D. RIPE
Answer: C
QUESTION 328
George is the network administrator of a large Internet company on the west coast. Per corporate policy, none
of the employees in the company are allowed to use FTP or SFTP programs without obtaining approval from
the IT department. Few managers are using SFTP program on their computers. Before talking to his boss,
George wants to have some proof of their activity. George wants to use Ethereal to monitor network traffic,
but only SFTP traffic to and from his network.
What filter should George use in Ethereal?
Answer: D
QUESTION 329
Your company uses Cisco routers exclusively throughout the network. After securing the routers to the best of
your knowledge, an outside security firm is brought in to assess the network security. Although they found very
few issues, they were able to enumerate the model, OS version, and capabilities for all your Cisco routers with
very little effort. Which feature will you disable to eliminate the ability to enumerate this information on your
Cisco routers?
Answer: B
QUESTION 330
In Linux, what is the smallest possible shellcode?
A. 24 bytes
B. 8 bytes
C. 800 bytes
D. 80 bytes
Answer: A
QUESTION 331
Jim performed a vulnerability analysis on his network and found no potential problems. He runs another utility
that executes exploits against his system to verify the results of the vulnerability test. The second utility
executes five known exploits against his network in which the vulnerability analysis said were not exploitable.
What kind of results did Jim receive from his vulnerability analysis?
A. False negatives
B. False positives
C. True negatives
D. True positives
Answer: A
QUESTION 332
You work as a penetration tester for Hammond Security Consultants. You are currently working on a contract
for the state government of California. Your next step is to initiate a DoS attack on their network. Why would
you want to initiate a DoS attack on a system you are testing?
Answer: B
QUESTION 333
Why are Linux/Unix based computers better to use than Windows computers for idle scanning?
Answer: C
QUESTION 334
What operating system would respond to the following command?
A. Windows 95
B. FreeBSD
C. Windows XP
D. Mac OS X
Answer: B
QUESTION 335
Paul's company is in the process of undergoing a complete security audit including logical and physical
security testing. After all logical tests were performed; it is now time for the physical round to begin. None of
the employees are made aware of this round of testing. The security-auditing firm sends in a technician
dressed as an electrician. He waits outside in the lobby for some employees to get to work and follows behind
them when they access the restricted areas. After entering the main office, he is able to get into the server
room telling the IT manager that there is a problem with the outlets in that room. What type of attack has the
technician performed?
A. Tailgating
B. Backtrapping
C. Man trap attack
D. Fuzzing
Answer: A
QUESTION 336
Click on the Exhibit Button Paulette works for an IT security consulting company that is currently performing
an audit for the firm ACE Unlimited. Paulette's duties include logging on to all the company's network
equipment to ensure IOS versions are up-to-date and all the other security settings are as stringent as
possible. Paulette presents the following screenshot to her boss so he can inform the client about necessary
changes need to be made. From the screenshot, what changes should the client company make?
Answer: A
QUESTION 337
On Linux/Unix based Web servers, what privilege should the daemon service be run under?
A. Guest
B. Root
C. You cannot determine what privilege runs the daemon service
D. Something other than root
Answer: D
QUESTION 338
What will the following URL produce in an unpatched IIS Web Server? http://www.thetargetsite.com/scripts/..
% co%af../..%co%af../windows/system32/cmd.exe?/c+dir+c:\
Answer: A
QUESTION 339
What is kept in the following directory? HKLM\SECURITY\Policy\Secrets
Answer: B
QUESTION 340
Harold is a security analyst who has just run the rdisk /s command to grab the backup SAM file on a computer.
Where should Harold navigate on the computer to find the file?
A. %systemroot%\system32\LSA
B. %systemroot%\system32\drivers\etc
C. %systemroot%\repair
D. %systemroot%\LSA
Answer: C
QUESTION 341
You are trying to locate Microsoft Outlook Web Access Default Portal using Google search on the Internet.
What search string will you use to locate them?
A. allinurl:"exchange/logon.asp"
B. intitle:"exchange server"
C. locate:"logon page"
D. outlook:"search"
Answer: A
QUESTION 342
When setting up a wireless network with multiple access points, why is it important to set each access point on
a different channel?
A. Multiple access points can be set up on the same channel without any issues
B. Avoid over-saturation of wireless signals
C. So that the access points will work on differentfreQuencies
D. Avoid cross talk
Answer: D
QUESTION 343
You are running through a series of tests on your network to check for any security vulnerabilities. After
normal working hours, you initiate a DoS attack against your external firewall. The firewall Quickly freezes up
and becomes unusable. You then initiate an FTP connection from an external IP into your internal network.
The connection is successful even though you have FTP blocked at the external firewall. What has
happened?
QUESTION 344
You just passed your ECSA exam and are about to start your first consulting job running security audits for a
financial institution in Los Angeles. The IT manager of the company you will be working for tries to see if you
remember your ECSA class. He asks about the methodology you will be using to test the company's network.
How would you answer?
A. Microsoft Methodology
B. Google Methodology
C. IBM Methodology
D. LPT Methodology
Answer: D
QUESTION 345
Software firewalls work at which layer of the OSI model?
A. Application
B. Network
C. Transport
D. Data Link
Answer: D
QUESTION 346
After passing her CEH exam, Carol wants to ensure that her network is completely secure. She implements a
DMZ, statefull firewall, NAT, IPSEC, and a packet filtering firewall. Since all security measures were taken,
none of the hosts on her network can reach the Internet. Why is that?
Answer: D
QUESTION 347
Jason has set up a honeypot environment by creating a DMZ that has no physical or logical access to his
production network. In this honeypot, he has placed a server running Windows Active Directory. He has also
placed a Web server in the DMZ that services a number of web pages that offer visitors a chance to download
sensitive information by clicking on a button. A week later, Jason finds in his network logs how an intruder
accessed the honeypot and downloaded sensitive information. Jason uses the logs to try and prosecute the
intruder for stealing sensitive corporate information. Why will this not be viable?
A. Entrapment
B. Enticement
C. Intruding into ahoneypot is not illegal
D. Intruding into a DMZ is not illegal
Answer: A
QUESTION 348
You have compromised a lower-level administrator account on an Active Directory network of a small
company in Dallas, Texas. You discover Domain Controllers through enumeration. You connect to one of the
Domain Controllers on port 389 using ldp.exe. What are you trying to accomplish here?
Answer: D
QUESTION 349
What are the security risks of running a "repair" installation for Windows XP?
Answer: A
QUESTION 350
Terri works for a security consulting firm that is currently performing a penetration test on First National Bank
in Tokyo. Terri's duties include bypassing firewalls and switches to gain access to the network. Terri sends an
IP packet to one of the company's switches with ACK bit and the source address of her machine set. What is
Terri trying to accomplish by sending this IP packet?
A. Trick the switch into thinking it already has a session with Terri's computer
B. Poison the switch's MAC address table by flooding it with ACK bits
C. Crash the switch with aDoS attack since switches cannot send ACK bits
D. Enable tunneling feature on the switch
Answer: A
QUESTION 351
You are a security analyst performing reconnaissance on a company you will be carrying out a penetration test
for. You conduct a search for IT jobs on Dice.com and find the following information for an open position: 7+
years experience in Windows Server environment 5+ years experience in Exchange 2000/2003 environment
Experience with Cisco Pix Firewall, Linksys 1376 router, Oracle 11i and MYOB v3.4 Accounting software are
reQuired MCSA desired, MCSE, CEH preferred No Unix/Linux Experience needed What is this information
posted on the job website considered?
Answer: C
QUESTION 352
The objective of this act was to protect consumers personal financial information held by financial institutions
and their service providers.
A. Gramm-Leach-Bliley Act
B. Sarbanes-Oxley 2002
C. California SB 1386
D. HIPAA
Answer: A
QUESTION 353
Why is it a good idea to perform a penetration test from the inside?
Answer: B
QUESTION 354
Harold is a web designer who has completed a website for ghttech.net. As part of the maintenance agreement
he signed with the client, Harold is performing research online and seeing how much exposure the site has
received so far. Harold navigates to google.com and types in the following search. link:www.ghttech.net What
will this search produce?
Answer: B
QUESTION 355
Jonathan is a network administrator who is currently testing the internal security of his network. He is
attempting to hijack a session, using Ettercap, of a user connected to his Web server. Why will Jonathan not
succeed?
QUESTION 356
A packet is sent to a router that does not have the packet destination address in its route table, how will the
packet get to its properA packet is sent to a router that does not have the packet? destination address in its
route table, how will the packet get to its proper destination?
Answer: C
QUESTION 357
James is testing the ability of his routers to withstand DoS attacks. James sends ICMP ECHO requests to the
broadcast address of his network. What type of DoS attack is James testing against his network?
A. Smurf
B. Trinoo
C. Fraggle
D. SYN flood
Answer: A
QUESTION 358
Kyle is performing the final testing of an application he developed for the accounting department. His last
round of testing is to ensure that the program is as secure as possible. Kyle runs the following command.
What is he testing at this point? #include #include int main(int argc, char *argv[]) { char buffer[10]; if (argc < 2)
{ fprintf (stderr, "USAGE: %s string\n", argv[0]); return 1; } strcpy(buffer, argv[1]); return 0; }
A. Buffer overflow
B. SQL injection
C. Format string bug
D. Kernal injection
Answer: A
QUESTION 359
You are running known exploits against your network to test for possible vulnerabilities. To test the strength of
your virus software, you load a test network to mimic your production network. Your software successfully
blocks some simple macro and encrypted viruses. You decide to really test the software by using virus code
where the code rewrites itself entirely and the signatures change from child to child, but the functionality stays
the same. What type of virus is this that you are testing?
A. Polymorphic
B. Metamorphic
C. Oligomorhic
D. Transmorphic
Answer: B
QUESTION 360
What is a good security method to prevent unauthorized users from "tailgating"?
A. Man trap
B. Electronic combination locks
C. Pick-resistant locks
D. Electronic key systems
Answer: A
QUESTION 361
You are the security analyst working for a private company out of France. Your current assignment is to obtain
credit card information from a Swiss bank owned by that company. After initial reconnaissance, you discover
that the bank security defenses are very strong and would take too long to penetrate. You decide to get the
information by monitoring the traffic between the bank and one of its subsidiaries in London. After monitoring
some of the traffic, you see a lot of FTP packets traveling back and forth. You want to sniff the traffic and
extract usernames and passwords. What tool could you use to get this information?
A. Airsnort
B. Snort
C. Ettercap
D. RaidSniff
Answer: C
QUESTION 362
As a security analyst you setup a false survey website that will reQuire users to create a username and a
strong password. You send the link to all the employees of the company. What information will you be able to
gather?
Answer: C
QUESTION 363
Julia is a senior security analyst for Berber Consulting group. She is currently working on a contract for a small
accounting firm in Florida. They have given her permission to perform social engineering attacks on the
company to see if their in-house training did any good. Julia calls the main number for the accounting firm and
talks to the receptionist. Julia says that she is an IT technician from the company's main office in Iowa. She
states that she needs the receptionist's network username and password to troubleshoot a problem they are
having. Julia says that Bill Hammond, the CEO of the company, reQuested this information. After hearing the
name of the CEO, the receptionist gave Julia all the information she asked for. What principal of social
engineering did Julia use?
A. Social Validation
B. Scarcity
C. Friendship/Liking
D. Reciprocation
Answer: D
QUESTION 364
Harold wants to set up a firewall on his network but is not sure which one would be the most appropriate. He
knows he needs to allow FTP traffic to one of the servers on his network, but he wants to only allow FTP-PUT.
Which firewall would be most appropriate for Harold? needs?
Answer: C
QUESTION 365
What will the following command accomplish?
Answer: A
QUESTION 366
What does ICMP Type 3/Code 13 mean?
A. Host Unreachable
B. Administratively Blocked
C. Port Unreachable
D. Protocol Unreachable
Answer: B
QUESTION 367
How many bits is Source Port Number in TCP Header packet?
A. 16
B. 32
C. 48
D. 64
Answer: A
QUESTION 368
After passively scanning the network of Department of Defense (DoD), you switch over to active scanning to
identify live hosts on their network. DoD is a lage organization and should respond to any number of scans.
You start an ICMP ping sweep by sending an IP packet to the broadcast address. Only five hosts responds to
your ICMP pings; definitely not the number of hosts you were expecting. Why did this ping sweep only
produce a few responses?
Answer: D
QUESTION 369
Your company's network just finished going through a SAS 70 audit. This audit reported that overall, your
network is secure, but there are some areas that needs improvement. The major area was SNMP security.
The audit company recommended turning off SNMP, but that is not an option since you have so many remote
nodes to keep track of. What step could you take to help secure SNMP on your network?
Answer: D
QUESTION 370
After attending a CEH security seminar, you make a list of changes you would like to perform on your network
to increase its security. One of the first things you change is to switch the RestrictAnonymous setting from 0 to
1 on your servers. This, as you were told, would prevent anonymous users from establishing a null session on
the server. Using Userinfo tool mentioned at the seminar, you succeed in establishing a null session with one
of the servers. Why is that?
Answer: C
QUESTION 371
In a virtual test environment, Michael is testing the strength and security of BGP using multiple routers to
mimic the backbone of the Internet. This project will help him write his doctoral thesis on "bringing down the
Internet". Without sniffing the traffic between the routers, Michael sends millions of RESET packets to the
routers in an attempt to shut one or all of them down. After a few hours, one of the routers finally shuts itself
down. What will the other routers communicate between themselves?
Answer: A
QUESTION 372
How many possible sequence number combinations are there in TCP/IP protocol?
A. 1 billion
B. 320 billion
C. 4 billion
D. 32 million
Answer: C
QUESTION 373
Tyler is setting up a wireless network for his business that he runs out of his home. He has followed all the
directions from the ISP as well as the wireless router manual. He does not have any encryption set and the
SSID is being broadcast. On his laptop, he can pick up the wireless signal for short periods of time, but then
the connection drops and the signal goes away. Eventually the wireless signal shows back up, but drops
intermittently. What could be Tyler issue with his home wireless network?
Answer: C
QUESTION 374
You are working on a thesis for your doctorate degree in Computer Science. Your thesis is based on HTML,
DHTML, and other web-based languages and how they have evolved over the years. You navigate to archive.
org and view the HTML code of news.com. You then navigate to the current news.com website and copy over
the source code. While searching through the code, you come across something abnormal: What have you
found?
A. Web bug
B. CGI code
C. Trojan.downloader
D. Blind bug
Answer: A