Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

A forensic investigator suspects that spyware has been installed to a Mac OS X computer by way of an update.

Which Mac OS X log or folder stores information about system and software updates?

A.

/var/spool/cups

B.

/var/log/daily.out

C.

/var/vm

D.

/Library/Receipts

Where does Windows store passwords for local user accounts?

A.

HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles

B.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WZCSVC\Parameters\Interfaces

C.

SAM file in Windows\System32

D.

Security file in Windows\System32

A cybercriminal communicates with his compatriots using steganography. The FBI discovers that the criminal group uses white space to hide data in photographs.

Which tool can the cybercriminals use to facilitate this type of communication?

A.

Steganophony

B.

Wolf

C.

Snow

D.

QuickStego

How should a forensic scientist obtain the network configuration from a Windows PC before seizing it from a crime scene?

A.

By checking the system properties

B.

By using the ipconfig command from a command prompt on the computer

C.

By opening the Network and Sharing Center

D.

By rebooting the computer into safe mode

A forensic investigator needs to know which file type to look for in order to find emails from a specific client.

Which file extension is used by Eudora?

A.

.dbx

B.

.ost

C.

.pst

D.

.mbx

A cybercriminal hacked into an Apple iPad that belongs to a company's chief executive officer (CEO). The cybercriminal deleted some important files on the data volume that must be retrieved.

Which hidden folder will contain the digital evidence?

A.

/Private/etc

B.

/lost+found

C.

/.Trashes/501

D.

/etc

Which information is included in an email header?

A.

Sender's MAC address

B.

Number of pages

C.

Content-Type

D.

Message-Digest

Which type of information does a Windows SAM file contain?

A.

Hash of network passwords

B.

Encrypted network passwords

C.

Hash of local Windows passwords

D.

Encrypted local Windows passwords

While collecting digital evidence from a running computer involved in a cybercrime, the forensic investigator makes a list of items that need to be collected.

Which piece of digital evidence should be collected first?

A.

Security logs

B.

Chat room logs

C.

Recently accessed files

D.

Temporary Internet files

A forensic investigator is acquiring evidence from an iPhone.

What should the investigator ensure before the iPhone is connected to the computer?

A.

That the phone is in jailbreak mode

B.

That the phone avoids syncing with the computer

C.

That the phone is powered off

D.

That the phone has root privilege