Pass the ECCouncil CHFI v10 312-49v10 Questions and answers with CertsForce

Viewing page 12 out of 15 pages
Viewing questions 166-180 out of questions
Questions # 166:

When investigating a Windows System, it is important to view the contents of the page or swap file because:

Options:

A.

Windows stores all of the systems configuration information in this file


B.

This is file that windows use to communicate directly with Registry


C.

A Large volume of data can exist within the swap file of which the computer user has no knowledge


D.

This is the file that windows use to store the history of the last 100 commands that were run from the command line


Expert Solution
Questions # 167:

You are assigned to work in the computer forensics lab of a state police agency. While working on a high profile criminal case, you have followed every applicable procedure, however your boss is still concerned that the defense attorney might question whether evidence has been changed while at the lab. What can you do to prove that the evidence is the same as it was when it first entered the lab?

Options:

A.

make an MD5 hash of the evidence and compare it with the original MD5 hash that was taken when the evidence first entered the lab


B.

make an MD5 hash of the evidence and compare it to the standard database developed by NIST


C.

there is no reason to worry about this possible claim because state labs are certified


D.

sign a statement attesting that the evidence is the same as it was when it entered the lab


Expert Solution
Questions # 168:

You are carrying out the last round of testing for your new website before it goes live. The website has many dynamic pages and connects to a SQL backend that accesses your product inventory in a database. You come across a web security site that recommends inputting the following code into a search field on web pages to check for vulnerabilities: When you type this and click on search, you receive a pop-up window that says: "This is a test."

What is the result of this test?

Options:

A.

Your website is vulnerable to CSS


B.

Your website is not vulnerable


C.

Your website is vulnerable to SQL injection


D.

Your website is vulnerable to web bugs


Expert Solution
Questions # 169:

Melanie was newly assigned to an investigation and asked to make a copy of all the evidence from the compromised system. Melanie did a DOS copy of all the files on the system. What would be the primary reason for you to recommend a disk imaging tool?

Options:

A.

A disk imaging tool would check for CRC32s for internal self-checking and validation and have MD5 checksum


B.

Evidence file format will contain case data entered by the examiner and encrypted at the beginning of the evidence file


C.

A simple DOS copy will not include deleted files, file slack and other information


D.

There is no case for an imaging tool as it will use a closed, proprietary format that if compared to the original will not match up sector for sector


Expert Solution
Questions # 170:

The rule of thumb when shutting down a system is to pull the power plug. However, it has certain drawbacks. Which of the following would that be?

Options:

A.

Any data not yet flushed to the system will be lost


B.

All running processes will be lost


C.

The /tmp directory will be flushed


D.

Power interruption will corrupt the pagefile


Expert Solution
Questions # 171:

The objective of this act was to protect consumers’ personal financial information held by financial institutions and their service providers.

Options:

A.

Gramm-Leach-Bliley Act


B.

Sarbanes-Oxley 2002


C.

California SB 1386


D.

HIPAA


Expert Solution
Questions # 172:

During the course of a corporate investigation, you find that an Employee is committing a crime.

Can the Employer file a criminal complaint with Police?

Options:

A.

Yes, and all evidence can be turned over to the police


B.

Yes, but only if you turn the evidence over to a federal law enforcement agency


C.

No, because the investigation was conducted without following standard police procedures


D.

No, because the investigation was conducted without warrant


Expert Solution
Questions # 173:

You are working as an independent computer forensics investigator and received a call from a systems administrator for a local school system requesting your assistance. One of the students at the local high school is suspected of downloading inappropriate images from the Internet to a PC in the Computer lab. When you arrive at the school, the systems administrator hands you a hard drive and tells you that he made a “simple backup copy” of the hard drive in the PC and put it on this drive and requests that you examine that drive for evidence of the suspected images. You inform him that a “simple backup copy” will not provide deleted files or recover file fragments.

What type of copy do you need to make to ensure that the evidence found is complete and admissible in future proceeding?

Options:

A.

Bit-stream Copy


B.

Robust Copy


C.

Full backup Copy


D.

Incremental Backup Copy


Expert Solution
Questions # 174:

You are running through a series of tests on your network to check for any security vulnerabilities.

After normal working hours, you initiate a DoS attack against your external firewall. The firewall Quickly freezes up and becomes unusable. You then initiate an FTP connection from an external IP into your internal network. The connection is successful even though you have FTP blocked at the external firewall. What has happened?

Options:

A.

The firewall failed-bypass


B.

The firewall failed-closed


C.

The firewall ACL has been purged


D.

The firewall failed-open


Expert Solution
Questions # 175:

What information do you need to recover when searching a victim’s computer for a crime committed with specific e-mail message?

Options:

A.

Internet service provider information


B.

E-mail header


C.

Username and password


D.

Firewall log


Expert Solution
Questions # 176:

If you see the files Zer0.tar.gz and copy.tar.gz on a Linux system while doing an investigation, what can you conclude?

Options:

A.

The system files have been copied by a remote attacker


B.

The system administrator has created an incremental backup


C.

The system has been compromised using a t0rnrootkit


D.

Nothing in particular as these can be operational files


Expert Solution
Questions # 177:

You are working in the security Department of law firm. One of the attorneys asks you about the topic of sending fake email because he has a client who has been charged with doing just that. His client alleges that he is innocent and that there is no way for a fake email to actually be sent. You inform the attorney that his client is mistaken and that fake email is possibility and that you can prove it. You return to your desk and craft a fake email to the attorney that appears to come from his boss. What port do you send the email to on the company SMTP server?

Options:

A.

10


B.

25


C.

110


D.

135


Expert Solution
Questions # 178:

When performing a forensics analysis, what device is used to prevent the system from recording data on an evidence disk?

Options:

A.

a write-blocker


B.

a protocol analyzer


C.

a firewall


D.

a disk editor


Expert Solution
Questions # 179:

What is a good security method to prevent unauthorized users from "tailgating"?

Options:

A.

Man trap


B.

Electronic combination locks


C.

Pick-resistant locks


D.

Electronic key systems


Expert Solution
Questions # 180:

Which response organization tracks hoaxes as well as viruses?

Options:

A.

NIPC


B.

FEDCIRC


C.

CERT


D.

CIAC


Expert Solution
Viewing page 12 out of 15 pages
Viewing questions 166-180 out of questions