Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

The following line of code is an example of how to make a forensic copy of a suspect drive:

dd if=/dev/mem of=/evidence/image.memory1

Which operating system should be used to run this command?

A.

Windows

B.

Linux

C.

MacOS

D.

Unix

A company has identified that a hacker has modified files on one of the company's computers. The IT department has collected the storage media from the hacked computer.

Which evidence should be obtained from the storage media to identify which files were modified?

A.

File timestamps

B.

Private IP addresses

C.

Public IP addresses

D.

Operating system version

Which tool identifies the presence of steganography?

A.

Disk Investigator

B.

DiskDigger

C.

Forensic Toolkit (FTK)

D.

ComputerCOP

A forensic examiner is reviewing a laptop running OS X which has been compromised. The examiner wants to know if any shell commands were executed by any of the accounts.

Which log file or folder should be reviewed?

A.

/var/vm

B.

/Users//.bash_history

C.

/var/log

D.

/Users//Library/Preferences

Which characteristic applies to solid-state drives (SSDs) compared to magnetic drives?

A.

They are less susceptible to damage

B.

They have moving parts

C.

They are generally slower

D.

They have a lower cost per gigabyte

Which technique allows a cybercriminal to hide information?

A.

Steganalysis

B.

Steganography

C.

Encryption

D.

Cryptography

Which rule is used for conducting electronic surveillance?

A.

All documents related to health informatics should be stored in perpetuity.

B.

All commercial email must provide an opt-out mechanism.

C.

Using a misleading domain name to deceive a person into viewing obscene material shall result in fines or imprisonment.

D.

Telecommunications equipment must have built-in surveillance capabilities for law enforcement.

A digital forensic examiner receives a computer used in a hacking case. The examiner is asked to extract information from the computer's Registry.

How should the examiner proceed when obtaining the requested digital evidence?

A.

Ensure that any tools and techniques used are widely accepted

B.

Investigate whether the computer was properly seized

C.

Enlist a colleague to witness the investigative process

D.

Download a tool from a hacking website to extract the data

Which information is included in an email header?

A.

Sender's MAC address

B.

Number of pages

C.

Content-Type

D.

Message-Digest

Which law requires a search warrant or one of the recognized exceptions to search warrant requirements for searching email messages on a computer?

A.

The Fourth Amendment to the U.S. Constitution

B.

Electronic Communications Privacy Act (ECPA)

C.

Stored Communications Act

D.

Communications Assistance to Law Enforcement Act (CALEA)