Black Friday Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which of the following is the correct order of digital investigations Standard Operating Procedure (SOP)?

A.

Request for service, initial analysis, data collection, data reporting, data analysis

B.

Initial analysis, request for service, data collection, data analysis, data reporting

C.

Initial analysis, request for service, data collection, data reporting, data analysis

D.

Request for service, initial analysis, data collection, data analysis, data reporting

Which of the following password cracking tools can work on the Unix and Linux environment?

A.

Brutus

B.

John the Ripper

C.

Cain and Abel

D.

Ophcrack

Adam works as a professional Computer Hacking Forensic Investigator. He wants to investigate a suspicious email that is sent using a Microsoft Exchange server. Which of the following files will he review to accomplish the task?

Each correct answer represents a part of the solution. Choose all that apply.

A.

Checkpoint files

B.

EDB and STM database files

C.

Temporary files

D.

cookie files

Which of the following is included in a memory dump file?

A.

List of loaded drivers

B.

Security ID

C.

Stop message and its parameters

D.

The kernel-mode call stack for the thread that stopped the process from execution

You work as a Network Administrator for Infonet Inc. The company has a Windows Server 2008 domain-based network. The network has three Windows Server 2008 member servers and 150 Windows Vista client computers. According to the company's security policy, you apply Windows firewall setting to the computers on the network. Now, you are troubleshooting a connectivity problem that might be caused by Windows firewall. What will you do to identify connections that Windows firewall allows or blocks?

A.

Configure Internet Protocol Security (IPSec).

B.

Configure Network address translation (NAT).

C.

Disable Windows firewall logging.

D.

Enable Windows firewall logging.

Which of the following log files are used to collect evidences before taking the bit-stream image of the BlackBerry?

Each correct answer represents a complete solution. Choose all that apply.

A.

user history

B.

Transmit/Receive

C.

Radio status

D.

Roam and Radio

Allen works as a professional Computer Hacking Forensic Investigator. A project has been assigned to him to investigate a computer, which is used by the suspect to sexually harass the victim using instant messenger program. Suspect's computer runs on Windows operating system. Allen wants to recover password from instant messenger program, which suspect is using, to collect the evidence of the crime. Allen is using Helix Live for this purpose. Which of the following utilities of Helix will he use to accomplish the task?

A.

Asterisk Logger

B.

Access PassView

C.

Mail Pass View

D.

MessenPass

Host-based IDS (HIDS) is an Intrusion Detection System that runs on the system to be monitored. HIDS monitors only the data that it is directed to, or originates from the system on which HIDS is installed. Besides monitoring network traffic for detecting attacks, it can also monitor other parameters of the system such as running processes, file system access and integrity, and user logins for identifying malicious activities. Which of the following tools are examples of HIDS?

Each correct answer represents a complete solution. Choose all that apply.

A.

HPing

B.

BlackIce Defender

C.

Tripwire

D.

Legion

Which of the following file systems is designed by Sun Microsystems?

A.

NTFS

B.

CIFS

C.

ZFS

D.

ext2

You are planning DNS configuration for your company. You decide to configure an Active Directory integrated DNS.

Which of the following are the benefits of Active Directory integrated DNS configuration?

Each correct answer represents a complete solution. Choose all that apply.

A.

Replication is more efficient.

B.

Multi-master environments are more fault tolerant.

C.

Single-master environment is simpler to administer.

D.

It results in enhanced security.

Which of the following protocols is used by e-mail servers to send messages?

A.

SNMP

B.

FTP

C.

POP3

D.

SMTP

E.

HTTP

You work as a technician for Tech Perfect Inc. You are troubleshooting an Internet name resolution issue. You ping your ISP's DNS server address and find that the server is down. You want to continuously ping the DNS address until you have stopped the command. Which of the following commands will you use?

A.

ping -a

B.

ping -l

C.

ping -t

D.

ping –n

Which of the following tools is used to store the contents of a TDB (Trivial Database) file to the standard output when debugging problems with TDB files?

A.

tcpdump

B.

pdbedit

C.

Winbindd

D.

tdbdump

What is the order of the extension headers that is followed by IPv6?

A.

Destination Options (first), Routing, IPv6 header, Hop-by-Hop, Fragment, Authentication, Encrypted Security Payload, Destination Options (second), followed by an Upper-layer header, indicating payload.

B.

Routing, Hop-by-Hop, Destination Options (first), Fragment, Authentication, Encrypted Security Payload, Destination Options (second), followed by an Upper-layer header, indicating payload.

C.

Fragment, Routing, Hop-by-Hop, Destination Options (first), Authentication, Encrypted Security Payload, Destination Options (second), followed by an Upper-layer header, indicating payload.

D.

IPv6 header, Hop-by-Hop, Destination Options (first), Routing, Fragment, Authentication, Encrypted Security Payload, Destination Options (second), followed by an Upper-layer header, indicating payload.

Which of the following types of firewall functions by creating two different communications, one between the client and the firewall, and the other between the firewall and the end server?

A.

Stateful firewall

B.

Proxy-based firewall

C.

Packet filter firewall

D.

Endian firewall