New Year Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

Digital-Forensics-in-Cybersecurity Questions and Answers

Question # 6

The chief information officer of an accounting firm believes sensitive data is being exposed on the local network.

Which tool should the IT staff use to gather digital evidence about this security vulnerability?

A.

Firewall

B.

Sniffer

C.

Antivirus

D.

Packet filter

Full Access
Question # 7

A police detective investigating a threat traces the source to a house. The couple at the house shows the detective the only computer the family owns, which is in their son's bedroom. The couple states that their son is presently in class at a local middle school.

How should the detective legally gain access to the computer?

A.

Obtain consent to search from the parents

B.

Wait for the son to return and ask for consent

C.

Search immediately without consent due to emergency

D.

Get a warrant without consent

Full Access
Question # 8

What are the three basic tasks that a systems forensic specialist must keep in mind when handling evidence during a cybercrime investigation?

A.

Find evidence, preserve evidence, and prepare evidence

B.

Find evidence, analyze evidence, and prosecute evidence

C.

Preserve evidence, encrypt evidence, and delete evidence

D.

Analyze evidence, prepare evidence, and document evidence

Full Access
Question # 9

What is a reason to use steganography?

A.

To save secret data

B.

To highlight secret data

C.

To erase secret data

D.

To delete secret data

Full Access
Question # 10

An employee sends an email message to a fellow employee. The message is sent through the company's messaging server.

Which protocol is used to send the email message?

A.

SNMP

B.

IMAP

C.

POP3

D.

SMTP

Full Access
Question # 11

A forensic scientist is examining a computer for possible evidence of a cybercrime.

Why should the forensic scientist copy files at the bit level instead of the OS level when copying files from the computer to a forensic computer?

A.

Copying files at the OS level fails to copy deleted files or slack space.

B.

Copying files at the OS level takes too long to be practical.

C.

Copying files at the OS level changes the timestamp of the files.

D.

Copying files at the OS level will copy extra information that is unnecessary.

Full Access
Question # 12

An organization believes that a company-owned mobile phone has been compromised.

Which software should be used to collect an image of the phone as digital evidence?

A.

PTFinder

B.

Forensic SIM Cloner

C.

Forensic Toolkit (FTK)

D.

Data Doctor

Full Access
Question # 13

A forensics investigator is investigating a Windows computer which may be collecting data from other computers on the network.

Which Windows command line tool can be used to determine connections between machines?

A.

Telnet

B.

Xdetect

C.

Openfiles

D.

Netstat

Full Access
Question # 14

A forensic scientist arrives at a crime scene to begin collecting evidence.

What is the first thing the forensic scientist should do?

A.

Seize the computer immediately

B.

Photograph all evidence in its original place

C.

Document user passwords

D.

Run antivirus scans

Full Access
Question # 15

Which type of information does a Windows SAM file contain?

A.

Hash of network passwords

B.

Encrypted network passwords

C.

Hash of local Windows passwords

D.

Encrypted local Windows passwords

Full Access
Question # 16

A forensic specialist is about to collect digital evidence from a suspect's computer hard drive. The computer is off.

What should be the specialist's first step?

A.

Carefully review the chain of custody form.

B.

Turn the computer on and remove any malware.

C.

Make a forensic copy of the computer's hard drive.

D.

Turn the computer on and photograph the desktop.

Full Access
Question # 17

Which policy is included in the CAN-SPAM Act?

A.

Email sender must provide a method for recipients to opt out of future emails without charge

B.

Email sender must encrypt all outgoing emails

C.

Email sender must verify the recipient’s consent before sending

D.

Email sender must include recipient IP address in the email header

Full Access
Question # 18

A user at a company attempts to hide the combination to a safe that stores confidential information in a data file called vacationdetails.doc.

What is vacationdetails.doc called, in steganographic terms?

A.

Payload

B.

Snow

C.

Carrier

D.

Channel

Full Access
Question # 19

The following line of code is an example of how to make a forensic copy of a suspect drive:

dd if=/dev/mem of=/evidence/image.memory1

Which operating system should be used to run this command?

A.

Windows

B.

Linux

C.

MacOS

D.

Unix

Full Access
Question # 20

A forensic investigator suspects that spyware has been installed to a Mac OS X computer by way of an update.

Which Mac OS X log or folder stores information about system and software updates?

A.

/var/spool/cups

B.

/var/log/daily.out

C.

/var/vm

D.

/Library/Receipts

Full Access
Question # 21

Which operating system (OS) uses the NTFS (New Technology File System) file operating system?

A.

Linux

B.

Mac OS X v10.5

C.

Mac OS X v10.4

D.

Windows 8

Full Access
Question # 22

Which storage format is a magnetic drive?

A.

CD-ROM

B.

SATA

C.

Blu-ray

D.

SSD

Full Access
Question # 23

Which universal principle must be observed when handling digital evidence?

A.

Avoid making changes to the evidence

B.

Make a copy and analyze the original

C.

Get the signatures of two witnesses

D.

Keep the evidence in a plastic bag

Full Access