Pass the ECCouncil CHFI v10 312-49v10 Questions and answers with CertsForce

Viewing page 8 out of 15 pages
Viewing questions 106-120 out of questions
Questions # 106:

Which "Standards and Criteria" under SWDGE states that "the agency must use hardware and software that are appropriate and effective for the seizure or examination procedure"?

Options:

A.

Standards and Criteria 1.7


B.

Standards and Criteria 1.6


C.

Standards and Criteria 1.4


D.

Standards and Criteria 1.5


Expert Solution
Questions # 107:

What is the primary function of the tool CHKDSK in Windows that authenticates the file system reliability of a volume?

Options:

A.

Repairs logical file system errors


B.

Check the disk for hardware errors


C.

Check the disk for connectivity errors


D.

Check the disk for Slack Space


Expert Solution
Questions # 108:

What will the following command accomplish?

dd if=/dev/xxx of=mbr.backup bs=512 count=1

Options:

A.

Back up the master boot record


B.

Restore the master boot record


C.

Mount the master boot record on the first partition of the hard drive


D.

Restore the first 512 bytes of the first partition of the hard drive


Expert Solution
Questions # 109:

Which of the following tool enables data acquisition and duplication?

Options:

A.

Colasoft’s Capsa


B.

DriveSpy


C.

Wireshark


D.

Xplico


Expert Solution
Questions # 110:

What is the slave device connected to the secondary IDE controller on a Linux OS referred to?

Options:

A.

hda


B.

hdd


C.

hdb


D.

hdc


Expert Solution
Questions # 111:

To which phase of the Computer Forensics Investigation Process does the Planning and Budgeting of a Forensics Lab belong?

Options:

A.

Post-investigation Phase


B.

Reporting Phase


C.

Pre-investigation Phase


D.

Investigation Phase


Expert Solution
Questions # 112:

Paul is a computer forensics investigator working for Tyler & Company Consultants. Paul has been called upon to help investigate a computer hacking ring broken up by the local police. Paul begins to inventory the PCs found in the hackers hideout. Paul then comes across a PDA left by them that is attached to a number of different peripheral devices. What is the first step that Paul must take with the PDA to ensure the integrity of the investigation?

Options:

A.

Place PDA, including all devices, in an antistatic bag


B.

Unplug all connected devices


C.

Power off all devices if currently on


D.

Photograph and document the peripheral devices


Expert Solution
Questions # 113:

In a virtual test environment, Michael is testing the strength and security of BGP using multiple routers to mimic the backbone of the Internet. This project will help him write his doctoral thesis on "bringing down the Internet". Without sniffing the traffic between the routers, Michael sends millions of RESET packets to the routers in an attempt to shut one or all of them down. After a few hours, one of the routers finally shuts itself down. What will the other routers communicate between themselves?

Options:

A.

The change in the routing fabric to bypass the affected router


B.

More RESET packets to the affected router to get it to power back up


C.

RESTART packets to the affected router to get it to power back up


D.

STOP packets to all other routers warning of where the attack originated


Expert Solution
Questions # 114:

Files stored in the Recycle Bin in its physical location are renamed as Dxy.ext, where “x” represents the ___________________.

Options:

A.

Drive name


B.

Original file name’s extension


C.

Sequential number


D.

Original file name


Expert Solution
Questions # 115:

Using Internet logging software to investigate a case of malicious use of computers, the investigator comes across some entries that appear odd.

Question # 115

From the log, the investigator can see where the person in question went on the Internet. From the log, it appears that the user was manually typing in different user ID numbers. What technique this user was trying?

Options:

A.

Parameter tampering


B.

Cross site scripting


C.

SQL injection


D.

Cookie Poisoning


Expert Solution
Questions # 116:

Adam, a forensic investigator, is investigating an attack on Microsoft Exchange Server of a large organization. As the first step of the investigation, he examined the PRIV.EDB file and found the source from where the mail originated and the name of the file that disappeared upon execution. Now, he wants to examine the MIME stream content. Which of the following files is he going to examine?

Options:

A.

PRIV.STM


B.

gwcheck.db


C.

PRIV.EDB


D.

PUB.EDB


Expert Solution
Questions # 117:

If a PDA is seized in an investigation while the device is turned on, what would be the proper procedure?

Options:

A.

Keep the device powered on


B.

Turn off the device immediately


C.

Remove the battery immediately


D.

Remove any memory cards immediately


Expert Solution
Questions # 118:

Annie is searching for certain deleted files on a system running Windows XP OS. Where will she find the files if they were not completely deleted from the system?

Options:

A.

C: $Recycled.Bin


B.

C: \$Recycle.Bin


C.

C:\RECYCLER


D.

C:\$RECYCLER


Expert Solution
Questions # 119:

A master boot record (MBR) is the first sector (“sector zero”) of a data storage device. What is the size of MBR?

Options:

A.

Depends on the capacity of the storage device


B.

1048 Bytes


C.

4092 Bytes


D.

512 Bytes


Expert Solution
Questions # 120:

Which of the following reports are delivered under oath to a board of directors/managers/panel of the jury?

Options:

A.

Written Formal Report


B.

Verbal Formal Report


C.

Verbal Informal Report


D.

Written Informal Report


Expert Solution
Viewing page 8 out of 15 pages
Viewing questions 106-120 out of questions