Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

You want to search for two words within five words of each other. Which search request

would accomplish this function?

A.

apple by pear w/5

B.

June near July w/5

C.

supernova w/5 cassiopeia

D.

supernova by cassiopeia w/5

You are converting one image file format to another using FTK Imager. Why are the hash

values of the original image and the resulting new image the same?

A.

because FTK Imager's progress bar tracks the conversion

B.

because FTK Imager verifies the amount of data converted

C.

because FTK Imager compares the elapsed time of conversion

D.

because FTK Imager hashes only the data during the conversion

In FTK, which two formats can be used to export an E-mail message? (Choose two.)

A.

raw format

B.

XML format

C.

PDF format

D.

HTML format

E.

binary format

Using the FTK Report Wizard, which two options are available in the Bookmarks - A

window? (Choose two.)

A.

Apply a filter to the list

B.

Group all filenames at end of report

C.

Yes, include all graphics in the case

D.

No, do not include a bookmark section

E.

Export full-size graphics and link them to the thumbnails

Which statement is true about Processes to Perform in FTK?

A.

Processing options can be chosen only when adding evidence.

B.

Processing options can be chosen during or after adding evidence.

C.

Processing options can be chosen only after evidence has been added.

D.

If processing is not performed while adding evidence, the case must be started again.

Click the Exhibit button.

You need to search for specific data that are located in a Microsoft Word document. You do not know the exact spelling of this datA. Using the Index Search Options as displayed in the exhibit, which changes do you make in the Broadening Options and Search Limiting Options containers?

A.

check the Fuzzy box;

check the File Name Pattern box;

type *.doc in the pattern container

B.

check the Stemming box;

check the File Name Pattern box;

type *.doc in the pattern container

C.

check the Synonym box;

check the File Name Pattern box;

type *.doc in the pattern container

D.

check the Stemming box;

check the File Name Pattern box;

type %.doc in the pattern container

While analyzing unallocated space, you locate what appears to be a 64-bit Windows date and

time. Which FTK Imager feature allows you display the information as a date and time?

A.

INFO2 Filter

B.

Base Converter

C.

Metadata Parser

D.

Hex Value Interpreter

Which type of evidence can be added to FTK Imager?

A.

individual files

B.

all checked items

C.

contents of a folder

D.

all currently listed items

What is the most effective method to facilitate successful password recovery?

A.

Art of War

B.

Entropy Test

C.

Advanced EFS Attack

D.

Primary Dictionary Attack

Click the Exhibit button.

When decrypting EFS files in a case, you receive the result shown in the exhibit. What is the most plausible explanation for this result?

A.

The encrypted file was corrupt.

B.

A different user encrypted the remaining encrypted file.

C.

The hash value of the remaining encrypted file did not match.

D.

The remaining encrypted file had previously been bookmarked.

E.

An incorrect CRC value for the $EFS certificate was applied by the user.