Pass the ECCouncil CHFIv9 312-49v9 Questions and answers with CertsForce

Viewing page 8 out of 12 pages
Viewing questions 106-120 out of questions
Questions # 106:

Jack Smith is a forensics investigator who works for Mason Computer Investigation Services. He is investigating a computer that was infected by Ramen Virus.

Question # 106

He runs the netstat command on the machine to see its current connections. In the following screenshot, what do the 0.0.0.0 IP addresses signify?

 

Options:

A.

Those connections are established


B.

Those connections are in listening mode


C.

Those connections are in closed/waiting mode


D.

Those connections are in timed out/waiting mode


Expert Solution
Questions # 107:

What must be obtained before an investigation is carried out at a location?

Options:

A.

Search warrant


B.

Subpoena


C.

Habeas corpus


D.

Modus operandi


Expert Solution
Questions # 108:

What is the size value of a nibble?

Options:

A.

0.5 kilo byte


B.

0.5 bit


C.

0.5 byte


D.

2 bits


Expert Solution
Questions # 109:

When needing to search for a website that is no longer present on the Internet today but was online few years back, what site can be used to view the website collection of pages?

Options:

A.

Proxify.net


B.

Dnsstuff.com


C.

Samspade.org


D.

Archive.org


Expert Solution
Questions # 110:

What is the primary function of the tool CHKDSK in Windows that authenticates the file system reliability of a volume?

Options:

A.

Repairs logical file system errors


B.

Check the disk for hardware errors


C.

Check the disk for connectivity errors


D.

Check the disk for Slack Space


Expert Solution
Questions # 111:

A forensics investigator is searching the hard drive of a computer for files that were recently moved to the Recycle Bin. He searches for files in C:\RECYCLED using a command line tool but does not find anything. What is the reason for this?

Options:

A.

He should search in C:\Windows\System32\RECYCLED folder


B.

The Recycle Bin does not exist on the hard drive


C.

The files are hidden and he must use switch to view them


D.

Only FAT system contains RECYCLED folder and not NTFS


Expert Solution
Questions # 112:

When investigating a computer forensics case where Microsoft Exchange and Blackberry Enterprise server are used, where would investigator need to search to find email sent from a Blackberry device?

Options:

A.

RIM Messaging center


B.

Blackberry Enterprise server


C.

Microsoft Exchange server


D.

Blackberry desktop redirector


Expert Solution
Questions # 113:

Microsoft Security IDs are available in Windows Registry Editor. The path to locate IDs in Windows 7 is:

Options:

A.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList


B.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ProfileList


C.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\RegList


D.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Regedit


Expert Solution
Questions # 114:

Bob works as information security analyst for a big finance company. One day, the anomaly-based intrusion detection system alerted that a volumetric DDOS targeting the main IP of the main web server was occurring. What kind of attack is it?

Options:

A.

IDS attack


B.

APT


C.

Web application attack


D.

Network attack


Expert Solution
Questions # 115:

John is working as a computer forensics investigator for a consulting firm in Canada. He is called to seize a computer at a local web caf purportedly used as a botnet server. John thoroughly scans the computer and finds nothing that would lead him to think the computer was a botnet server. John decides to scan the virtual memory of the computer to possibly find something he had missed. What information will the virtual memory scan produce?

Options:

A.

It contains the times and dates of when the system was last patched


B.

It is not necessary to scan the virtual memory of a computer


C.

It contains the times and dates of all the system files


D.

Hidden running processes


Expert Solution
Questions # 116:

A forensics investigator needs to copy data from a computer to some type of removable media so he can examine the information at another location. The problem is that the data is around 42GB in size. What type of removable media could the investigator use?

Options:

A.

Blu-Ray single-layer


B.

HD-DVD


C.

Blu-Ray dual-layer


D.

DVD-18


Expert Solution
Questions # 117:

Which of the following is a database in which information about every file and directory on an NT File System (NTFS) volume is stored?

Options:

A.

Volume Boot Record


B.

Master Boot Record


C.

GUID Partition Table


D.

Master File Table


Expert Solution
Questions # 118:

While presenting his case to the court, Simon calls many witnesses to the stand to testify. Simon decides to call Hillary Taft, a lay witness, to the stand. Since Hillary is a lay witness, what field would she be considered an expert in?

Options:

A.

Technical material related to forensics


B.

No particular field


C.

Judging the character of defendants/victims


D.

Legal issues


Expert Solution
Questions # 119:

What is the location of a Protective MBR in a GPT disk layout?

Options:

A.

Logical Block Address (LBA) 2


B.

Logical Block Address (LBA) 0


C.

Logical Block Address (LBA) 1


D.

Logical Block Address (LBA) 3


Expert Solution
Questions # 120:

What malware analysis operation can the investigator perform using the jv16 tool?

Options:

A.

Files and Folder Monitor


B.

Installation Monitor


C.

Network Traffic Monitoring/Analysis


D.

Registry Analysis/Monitoring


Expert Solution
Viewing page 8 out of 12 pages
Viewing questions 106-120 out of questions