Summer Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

Digital-Forensics-in-Cybersecurity Questions and Answers

Question # 6

A USB flash drive was seized as evidence to be entered into a trial.

Which type of evidence is this USB flash drive?

A.

Documentary

B.

Demonstrative

C.

Testimonial

D.

Real

Full Access
Question # 7

A forensic scientist is examining a computer for possible evidence of a cybercrime.

Why should the forensic scientist copy files at the bit level instead of the OS level when copying files from the computer to a forensic computer?

A.

Copying files at the OS level fails to copy deleted files or slack space.

B.

Copying files at the OS level takes too long to be practical.

C.

Copying files at the OS level changes the timestamp of the files.

D.

Copying files at the OS level will copy extra information that is unnecessary.

Full Access
Question # 8

A forensic investigator suspects that spyware has been installed to a Mac OS X computer by way of an update.

Which Mac OS X log or folder stores information about system and software updates?

A.

/var/spool/cups

B.

/var/log/daily.out

C.

/var/vm

D.

/Library/Receipts

Full Access
Question # 9

Tom saved a message using the least significant bit (LSB) method in a sound file and uploaded this sound to his own website.

What is the carrier in this example?

A.

The least significant bit method

B.

Tom's website

C.

The sound file

D.

The message

Full Access
Question # 10

A cybercriminal hacked into an Apple iPad that belongs to a company's chief executive officer (CEO). The cybercriminal deleted some important files on the data volume that must be retrieved.

Which hidden folder will contain the digital evidence?

A.

/Private/etc

B.

/lost+found

C.

/.Trashes/501

D.

/etc

Full Access
Question # 11

Which tool should a forensic investigator use to determine whether data are leaving an organization through steganographic methods?

A.

Data Encryption Standard (DES)

B.

MP3Stego

C.

Netstat

D.

Forensic Toolkit (FTK)

Full Access
Question # 12

How do forensic specialists show that digital evidence was handled in a protected, secure manner during the process of collecting and analyzing the evidence?

A.

By encrypting all evidence

B.

By maintaining the chain of custody

C.

By deleting temporary files

D.

By performing backups

Full Access
Question # 13

Which file system is supported by Mac?

A.

NTFS

B.

EXT4

C.

Hierarchical File System Plus (HFS+)

D.

FAT32

Full Access
Question # 14

Which law requires both parties to consent to the recording of a conversation?

A.

Health Insurance Portability and Accountability Act (HIPAA)

B.

Electronic Communications Privacy Act (ECPA)

C.

Wiretap Act

D.

Stored Communications Act

Full Access
Question # 15

What are the three basic tasks that a systems forensic specialist must keep in mind when handling evidence during a cybercrime investigation?

A.

Find evidence, preserve evidence, and prepare evidence

B.

Find evidence, analyze evidence, and prosecute evidence

C.

Preserve evidence, encrypt evidence, and delete evidence

D.

Analyze evidence, prepare evidence, and document evidence

Full Access
Question # 16

A company has identified that a hacker has modified files on one of the company's computers. The IT department has collected the storage media from the hacked computer.

Which evidence should be obtained from the storage media to identify which files were modified?

A.

File timestamps

B.

Private IP addresses

C.

Public IP addresses

D.

Operating system version

Full Access
Question # 17

A forensic scientist arrives at a crime scene to begin collecting evidence.

What is the first thing the forensic scientist should do?

A.

Seize the computer immediately

B.

Photograph all evidence in its original place

C.

Document user passwords

D.

Run antivirus scans

Full Access
Question # 18

Which Windows 7 operating system log stores events collected from remote computers?

A.

System

B.

Application

C.

ForwardedEvents

D.

Security

Full Access
Question # 19

Which method is used to implement steganography through pictures?

A.

Metadata alteration

B.

Least Significant Bit (LSB) insertion

C.

Encrypting image pixels

D.

File compression

Full Access
Question # 20

Which tool can be used to make a bit-by-bit copy of a Windows Phone 8?

A.

Forensic Toolkit (FTK)

B.

Data Doctor

C.

Pwnage

D.

Wolf

Full Access
Question # 21

Which operating system creates a swap file to temporarily store information from memory on the hard drive when needed?

A.

Linux

B.

Mac

C.

Unix

D.

Windows

Full Access
Question # 22

Where is the default location for 32-bit programs installed by a user on a 64-bit version of Windows 7?

A.

C:\ProgramData

B.

C:\Program files

C.

C:\Windows

D.

C:\Program files (x86)

Full Access