Black Friday Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Adam, a malicious hacker has successfully gained unauthorized access to the Linux system of

Umbrella Inc. Web server of the company runs on Apache. He has downloaded sensitive documents and database files from the computer. After performing these malicious tasks, Adam finally runs the following command on the Linux command box before disconnecting. for (( i = 0;i<11;i++ )); do

dd if=/dev/random of=/dev/hda && dd if=/dev/zero of=/dev/hda done

Which of the following actions does Adam want to perform by the above command?

A.

Making a bit stream copy of the entire hard disk for later download.

B.

Deleting all log files present on the system.

C.

Wiping the contents of the hard disk with zeros.

D.

Infecting the hard disk with polymorphic virus strings.

Normally, RAM is used for temporary storage of data. But sometimes RAM data is stored in the hard disk, what is this method called?

A.

Cache memory

B.

Static memory

C.

Virtual memory

D.

Volatile memory

Which of the following representatives of incident response team takes forensic backups of the systems that are the focus of the incident?

A.

Technical representative

B.

Information security representative

C.

Legal representative

D.

Lead investigator

Which of the following statements about registry is true?

Each correct answer represents a complete solution. Choose three.

A.

It is divided in many areas known as hives.

B.

It was first introduced with Windows 95 operating system.

C.

It is a centralized configuration database that stores information related to a Windows computer.

D.

It can be edited using SCANREG utility.

Adam works as a Computer Hacking Forensic Investigator in a law firm. He has been assigned with his first project. Adam collected all required evidences and clues. He is now required to write an investigative report to present before court for further prosecution of the case. He needs guidelines to write an investigative report for expressing an opinion. Which of the following are the guidelines to write an investigative report in an efficient way?

Each correct answer represents a complete solution. Choose all that apply.

A.

All ideas present in the investigative report should flow logically from facts to conclusions.

B.

There should not be any assumptions made about any facts while writing the investigative report.

C.

Opinion of a lay witness should be included in the investigative report.

D.

The investigative report should be understandable by any reader.

Which of the following directories contains administrative commands and daemon processes in the Linux operating system?

A.

/etc

B.

/dev

C.

/usr

D.

/sbin

Which of the following tools is used to block email, Instant Message, Web site, or other media if inappropriate words such as pornography, violence etc. is used?

A.

iProtect

B.

Reveal

C.

iProtectYou

D.

Child Exploitation Tracking System

Mark works as a Network administrator for SecureEnet Inc. His system runs on Mac OS X. He wants to boot his system from the Network Interface Controller (NIC). Which of the following snag keys will Mark use to perform the required function?

A.

N

B.

D

C.

C

D.

Z

Which of the following tools in Helix Windows Live is used to reveal the database password of password protected MDB files created using Microsoft Access or with Jet Database Engine?

A.

Asterisk logger

B.

FAU

C.

Galleta

D.

Access Pass View

Which of the following provides high availability of data?

A.

RAID

B.

Anti-virus software

C.

EFS

D.

Backup