Pass the ECCouncil ECSA 412-79 Questions and answers with CertsForce

Viewing page 3 out of 7 pages
Viewing questions 21-30 out of questions
Questions # 21:

You have completed a forensic investigation case. You would like to destroy the data contained in various disks at the forensics lab due to sensitivity of the case. How would you permanently erase the data on the hard disk?

Options:

A.

Throw the hard disk into the fire


B.

Run the powerful magnets over the hard disk


C.

Format the hard disk multiple times using a low level disk utility


D.

Overwrite the contents of the hard disk with Junk data


Expert Solution
Questions # 22:

To preserve digital evidence, an investigator should ____________________

Options:

A.

Make tow copies of each evidence item using a single imaging tool


B.

Make a single copy of each evidence item using an approved imaging tool


C.

Make two copies of each evidence item using different imaging tools


D.

Only store the original evidence item


Expert Solution
Questions # 23:

You have been asked to investigate after a user has reported a threatening e-mail they have received from an external source. Which of the following are you most interested in when trying to trace the source of the message?

Options:

A.

The X509 Address


B.

The SMTP reply Address


C.

The E-mail Header


D.

The Host Domain Name


Expert Solution
Questions # 24:

What is the name of the Standard Linux Command that is also available as windows application that can be used to create bit-stream images?

Options:

A.

mcopy


B.

image


C.

MD5


D.

dd


Expert Solution
Questions # 25:

Profiling is a forensics technique for analyzing evidence with the goal of identifying the perpetrator from their various activity. After a computer has been compromised by a hacker, which of the following would be most important in forming a profile of the incident?

Options:

A.

The manufacturer of the system compromised


B.

The logic, formatting and elegance of the code used in the attack


C.

The nature of the attack


D.

The vulnerability exploited in the incident


Expert Solution
Questions # 26:

What does mactime, an essential part of the coroner‟s toolkit do?

Options:

A.

It traverses the file system and produces a listing of all files based on the modification, access and change timestamps


B.

It can recover deleted file space and search it for datA. However, it does not allow the investigator t preview them


C.

The tools scans for i-node information, which is used by other tools in the tool kit


D.

It is tool specific to the MAC OS and forms a core component of the toolkit


Expert Solution
Questions # 27:

This is original file structure database that Microsoft originally designed for floppy disks. It is written to the outermost track of a disk and contains information about each file stored on the drive.

Options:

A.

Master Boot Record (MBR)


B.

Master File Table (MFT)


C.

File Allocation Table (FAT)


D.

Disk Operating System (DOS)


Expert Solution
Questions # 28:

An Expert witness give an opinion if:

Options:

A.

The Opinion, inferences or conclusions depend on special knowledge, skill or training not within the ordinary experience of lay jurors


B.

To define the issues of the case for determination by the finder of fact


C.

To stimulate discussion between the consulting expert and the expert witness


D.

To deter the witness form expanding the scope of his or her investigation beyond the requirements of the case


Expert Solution
Questions # 29:

An "idle" system is also referred to as what?

Options:

A.

Zombie


B.

PC not being used


C.

Bot


D.

PC not connected to the Internet


Expert Solution
Questions # 30:

Michael works for Kimball Construction Company as senior security analyst. As part of yearly security audit, Michael scans his network for vulnerabilities. Using Nmap, Michael conducts XMAS scan and most of the ports scanned do not give a response. In what state are these ports?

Options:

A.

Filtered


B.

Stealth


C.

Closed


D.

Open


Expert Solution
Viewing page 3 out of 7 pages
Viewing questions 21-30 out of questions