(V9) v11.0 (312-49v9) Flashcards
(486 cards)
File deletion is a way of removing a file from a computer’s file system. What happens when
a file is deleted in windows7?
The operating system marks the file’s name in the MFT with a special character that indicates that the file has been deleted
Networks are vulnerable to an attack which occurs due to overextension of bandwidth,
bottlenecks, network data interception, etc.
Which of the following network attacks refers to a process in which an attacker changes his
or her IP address so that he or she appears to be someone else?
IP address spoofing
The evolution of web services and their increasing use in business offers new attack
vectors in an application framework. Web services are based on XML protocols such as
web Services Definition Language (WSDL) for describing the connection points, Universal
Description, Discovery, and Integration (UDDI) for the description and discovery of Web
services and Simple Object Access Protocol (SOAP) for communication between Web
services that are vulnerable to various web application threats. Which of the following layer
in web services stack is vulnerable to fault code leaks?
Discovery Layer
The ARP table of a router comes in handy for Investigating network attacks, as the table
contains IP addresses associated with the respective MAC addresses.
The ARP table can be accessed using the __________command in Windows 7.
C:\arp -a
Attackers can manipulate variables that reference files with “dot-dot-slash (./)” sequences
and their variations such as
http://www.juggyDoy.corn/GET/process.php./././././././././etc/passwd.
Identify the attack referred.
Directory traversal
What is a SCSI (Small Computer System Interface)?
A set of ANSI standard electronic interfaces that allow personal computers to communicate with peripheral hardware such as disk drives, tape drives. CD-ROM drives, printers, and scanners
Billy, a computer forensics expert, has recovered a large number of DBX files during
forensic investigation of a laptop. Which of the following email clients he can use to analyze
the DBX files?
Microsoft Outlook Express
Depending upon the Jurisdictional areas, different laws apply to different incidents. Which
of the following law is related to fraud and related activity in connection with computers?
18 USC 7030
What is a bit-stream copy?
Bit-Stream Copy is a bit-by-bit copy of the original storage medium and exact copy of the original disk
T or F? Network forensics can be defined as the sniffing, recording, acquisition and analysis of the
network traffic and event logs in order to investigate a network security incident.
True
According to US federal rules, to present a testimony in a court of law, an expert witness
needs to furnish certain information to prove his eligibility. Jason, a qualified computer
forensic expert who has started practicing two years back, was denied an expert testimony
in a computer crime case by the US Court of Appeals for the Fourth Circuit in Richmond,
Virginia. Considering the US federal rules, what could be the most appropriate reason for
the court to reject Jason’s eligibility as an expert witness?
Jason was unable to furnish documents showing four years of previous experience in the field
Syslog is a client/server protocol standard for forwarding log messages across an IP
network. Syslog uses ___________to transfer log messages in a clear text format.
TCP
Which of the following statements is incorrect when preserving digital evidence?
Turn on the computer and extract Windows event viewer log files
An Internet standard protocol (built on top of TCP/IP) that assures accurate synchronization
to the millisecond of computer clock times in a network of computers. Which of the
following statement is true for NTP Stratum Levels?
A stratum-3 server gets its time over a network link, via NTP, from a stratum-2 server, and so on
JPEG is a commonly used method of compressing photographic Images. It uses a
compression algorithm to minimize the size of the natural image, without affecting the
quality of the image. The JPEG lossy algorithm divides the image in separate blocks
of____________.
8x8 pixels
Which of the following commands shows you the NetBIOS name table each?
nbtstat -n
Computer security logs contain information about the events occurring within an
organization’s systems and networks. Which of the following security logs contains Logs of
network and host-based security software?
Security software logs
What is the smallest allocation unit of a hard disk?
Cluster
Which of the following is not a part of data acquisition forensics Investigation?
Work on the original storage medium not on the duplicated copy
In which step of the computer forensics investigation methodology would you run MD5
checksum on the evidence?
Acquire the data
Damaged portions of a disk on which no read/Write operation can be performed is known
as ______________.
Bad sector
SIM is a removable component that contains essential information about the subscriber. It
has both volatile and non-volatile memory. The file system of a SIM resides in
_____________ memory.
Non-volatile
T or F? During first responder procedure you should follow all laws while collecting the evidence,
and contact a computer forensic examiner as soon as possible
True
Which of the following is not a part of disk imaging tool requirements?
The tool should not compute a hash value for the complete bit stream copy generated from an image file of the source