Pass the ECCouncil ECSA EC0-479 Questions and answers with CertsForce

Viewing page 6 out of 7 pages
Viewing questions 51-60 out of questions
Questions # 51:

What does mactime, an essential part of the coroner‟s toolkit do?

Options:

A.

It traverses the file system and produces a listing of all files based on the modification, access and change timestamps


B.

It can recover deleted file space and search it for datA. However, it does not allow the investigator t preview them


C.

The tools scans for i-node information, which is used by other tools in the tool kit


D.

It is tool specific to the MAC OS and forms a core component of the toolkit


Expert Solution
Questions # 52:

When using Windows acquisitions tools to acquire digital evidence, it is important to use a well- tested hardware write-blocking device to:

Options:

A.

Automate Collection from image files


B.

Avoiding copying data from the boot partition


C.

Acquire data from host-protected area on a disk


D.

Prevent Contamination to the evidence drive


Expert Solution
Questions # 53:

One technique for hiding information is to change the file extension from the correct one to one that might not be noticed by an investigator. For example, changing a .jpg extension to a .doc extension so that a picture file appears to be a document. What can an investigator examine to verify that a file has the correct extension?

Options:

A.

the File Allocation Table


B.

the file header


C.

the file footer


D.

the sector map


Expert Solution
Questions # 54:

The police believe that Mevin Mattew has been obtaining unauthorized access to computers belonging to numerous computer software and computer operating systems manufacturers, cellular telephone manufacturers, Internet Service Providers and Educational Institutions. They also suspect that he has been stealing, copying and misappropriating proprietary computer software belonging to the several victim companies. What is preventing the police from breaking down the suspects door and searching his home and seizing all of his computer equipment if they have not yet obtained a warrant?

Options:

A.

The Fourth Amendment


B.

The USA patriot Act


C.

The Good Samaritan Laws


D.

The Federal Rules of Evidence


Expert Solution
Questions # 55:

What is the name of the Standard Linux Command that is also available as windows application that can be used to create bit-stream images?

Options:

A.

mcopy


B.

image


C.

MD5


D.

dd


Expert Solution
Questions # 56:

Volatile Memory is one of the leading problems for forensics. Worms such as code Red are memory resident and do write themselves to the hard drive, if you turn the system off they disappear. In a lab environment, which of the following options would you suggest as the most appropriate to overcome the problem of capturing volatile memory?

Options:

A.

Use Vmware to be able to capture the data in memory and examine it


B.

Give the Operating System a minimal amount of memory, forcing it to use a swap file


C.

Create a Separate partition of several hundred megabytes and place the swap file there


D.

Use intrusion forensic techniques to study memory resident infections


Expert Solution
Questions # 57:

Which part of the Windows Registry contains the user‟s password file?

Options:

A.

HKEY_LOCAL_MACHINE


B.

HKEY_CURRENT_CONFIGURATION


C.

HKEY_USER


D.

HKEY_CURRENT_USER


Expert Solution
Questions # 58:

When a file is deleted by Windows Explorer or through the MS-DOS delete command, the operating system inserts _______________ in the first letter position of the filename in the FAT database.

Options:

A.

A Capital X


B.

A Blank Space


C.

The Underscore Symbol


D.

The lowercase Greek Letter Sigma (s)


Expert Solution
Questions # 59:

You are called in to assist the police in an investigation involving a suspected drug dealer. The suspects house was searched by the police after a warrant was obtained and they located a floppy disk in the suspects bedroom. The disk contains several files, but they appear to be password protecteD. What are two common methods used by password cracking software that you can use to obtain the password?

Options:

A.

Limited force and library attack


B.

Brute Force and dictionary Attack


C.

Maximum force and thesaurus Attack


D.

Minimum force and appendix Attack


Expert Solution
Questions # 60:

You are using DriveSpy, a forensic tool and want to copy 150 sectors where the starting sector is 1709 on the primary hard drive. Which of the following formats correctly specifies these sectors?

Options:

A.

0:1000, 150


B.

0:1709, 150


C.

1:1709, 150


D.

0:1709-1858


Expert Solution
Viewing page 6 out of 7 pages
Viewing questions 51-60 out of questions