Pass the ECCouncil CHFI v10 312-49v10 Questions and answers with CertsForce

Viewing page 13 out of 15 pages
Viewing questions 181-195 out of questions
Questions # 181:

Printing under a Windows Computer normally requires which one of the following files types to be created?

Options:

A.

EME


B.

MEM


C.

EMF


D.

CME


Expert Solution
Questions # 182:

In a FAT32 system, a 123 KB file will use how many sectors?

Options:

A.

34


B.

25


C.

11


D.

56


Expert Solution
Questions # 183:

John is using Firewalk to test the security of his Cisco PIX firewall. He is also utilizing a sniffer located on a subnet that resides deep inside his network. After analyzing the sniffer log files, he does not see any of the traffic produced by Firewalk. Why is that?

Options:

A.

Firewalk cannot pass through Cisco firewalls


B.

Firewalk sets all packets with a TTL of zero


C.

Firewalk cannot be detected by network sniffers


D.

Firewalk sets all packets with a TTL of one


Expert Solution
Questions # 184:

You are called by an author who is writing a book and he wants to know how long the copyright for his book will last after he has the book published?

Options:

A.

70 years


B.

the life of the author


C.

the life of the author plus 70 years


D.

copyrights last forever


Expert Solution
Questions # 185:

You are working as an investigator for a corporation and you have just received instructions from your manager to assist in the collection of 15 hard drives that are part of an ongoing investigation.

Your job is to complete the required evidence custody forms to properly document each piece of evidence as it is collected by other members of your team. Your manager instructs you to complete one multi-evidence form for the entire case and a single-evidence form for each hard drive. How will these forms be stored to help preserve the chain of custody of the case?

Options:

A.

All forms should be placed in an approved secure container because they are now primary evidence in the case.


B.

The multi-evidence form should be placed in the report file and the single-evidence forms should be kept with each hard drive in an approved secure container.


C.

The multi-evidence form should be placed in an approved secure container with the hard drives and the single-evidence forms should be placed in the report file.


D.

All forms should be placed in the report file because they are now primary evidence in the case.


Expert Solution
Questions # 186:

You have used a newly released forensic investigation tool, which doesn't meet the Daubert Test, during a case. The case has ended-up in court. What argument could the defense make to weaken your case?

Options:

A.

The tool hasn't been tested by the International Standards Organization (ISO)


B.

Only the local law enforcement should use the tool


C.

The total has not been reviewed and accepted by your peers


D.

You are not certified for using the tool


Expert Solution
Questions # 187:

How many characters long is the fixed-length MD5 algorithm checksum of a critical system file?

Options:

A.

128


B.

64


C.

32


D.

16


Expert Solution
Questions # 188:

When examining a hard disk without a write-blocker, you should not start windows because Windows will write data to the:

Options:

A.

Recycle Bin


B.

MSDOS.sys


C.

BIOS


D.

Case files


Expert Solution
Questions # 189:

When investigating a potential e-mail crime, what is your first step in the investigation?

Options:

A.

Trace the IP address to its origin


B.

Write a report


C.

Determine whether a crime was actually committed


D.

Recover the evidence


Expert Solution
Questions # 190:

You are using DriveSpy, a forensic tool and want to copy 150 sectors where the starting sector is 1709 on the primary hard drive. Which of the following formats correctly specifies these sectors?

Options:

A.

0:1000, 150


B.

0:1709, 150


C.

1:1709, 150


D.

0:1709-1858


Expert Solution
Questions # 191:

After passing her CEH exam, Carol wants to ensure that her network is completely secure. She implements a DMZ, stateful firewall, NAT, IPSEC, and a packet filtering firewall. Since all security measures were taken, none of the hosts on her network can reach the Internet. Why is that?

Options:

A.

Stateful firewalls do not work with packet filtering firewalls


B.

NAT does not work with stateful firewalls


C.

IPSEC does not work with packet filtering firewalls


D.

NAT does not work with IPSEC


Expert Solution
Questions # 192:

When cataloging digital evidence, the primary goal is to

Options:

A.

Make bit-stream images of all hard drives


B.

Preserve evidence integrity


C.

Not remove the evidence from the scene


D.

Not allow the computer to be turned off


Expert Solution
Questions # 193:

A honey pot deployed with the IP 172.16.1.108 was compromised by an attacker. Given below is an excerpt from a Snort binary capture of the attack. Decipher the activity carried out by the attacker by studying the log. Please note that you are required to infer only what is explicit in the excerpt.

(Note: The student is being tested on concepts learnt during passive OS fingerprinting, basic TCP/IP connection concepts and the ability to read packet signatures from a sniff dump.)

03/15-20:21:24.107053 211.185.125.124:3500 -> 172.16.1.108:111

TCP TTL:43 TOS:0x0 ID:29726 IpLen:20 DgmLen:52 DF

***A**** Seq: 0x9B6338C5 Ack: 0x5820ADD0 Win: 0x7D78 TcpLen: 32

TCP Options (3) => NOP NOP TS: 23678634 2878772

=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=

03/15-20:21:24.452051 211.185.125.124:789 -> 172.16.1.103:111

UDP TTL:43 TOS:0x0 ID:29733 IpLen:20 DgmLen:84

Len: 64

01 0A 8A 0A 00 00 00 00 00 00 00 02 00 01 86 A0 ................

00 00 00 02 00 00 00 03 00 00 00 00 00 00 00 00 ................

00 00 00 00 00 00 00 00 00 01 86 B8 00 00 00 01 ................

00 00 00 11 00 00 00 00 ........

=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=

03/15-20:21:24.730436 211.185.125.124:790 -> 172.16.1.103:32773

UDP TTL:43 TOS:0x0 ID:29781 IpLen:20 DgmLen:1104

Len: 1084

47 F7 9F 63 00 00 00 00 00 00 00 02 00 01 86 B8

Options:

A.

The attacker has conducted a network sweep on port 111


B.

The attacker has scanned and exploited the system using Buffer Overflow


C.

The attacker has used a Trojan on port 32773


D.

The attacker has installed a backdoor


Expert Solution
Questions # 194:

Diskcopy is:

Options:

A.

a utility by AccessData


B.

a standard MS-DOS command


C.

Digital Intelligence utility


D.

dd copying tool


Expert Solution
Questions # 195:

Which is a standard procedure to perform during all computer forensics investigations?

Options:

A.

with the hard drive removed from the suspect PC, check the date and time in the system's CMOS


B.

with the hard drive in the suspect PC, check the date and time in the File Allocation Table


C.

with the hard drive removed from the suspect PC, check the date and time in the system's RAM


D.

with the hard drive in the suspect PC, check the date and time in the system's CMOS


Expert Solution
Viewing page 13 out of 15 pages
Viewing questions 181-195 out of questions