New Year Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which operating system creates a swap file to temporarily store information from memory on the hard drive when needed?

A.

Linux

B.

Mac

C.

Unix

D.

Windows

On which file does the Windows operating system store hashed passwords?

A.

SAM

B.

Kerberos

C.

System

D.

NTUSER.dat

Which universal principle must be observed when handling digital evidence?

A.

Avoid making changes to the evidence

B.

Make a copy and analyze the original

C.

Get the signatures of two witnesses

D.

Keep the evidence in a plastic bag

Which type of information does a Windows SAM file contain?

A.

Hash of network passwords

B.

Encrypted network passwords

C.

Hash of local Windows passwords

D.

Encrypted local Windows passwords

Thomas received an email stating he needed to follow a link and verify his bank account information to ensure it was secure. Shortly after following the instructions, Thomas noticed money was missing from his account.

Which digital evidence should be considered to determine how Thomas' account information was compromised?

A.

Email messages

B.

Browser cache

C.

Bank transaction logs

D.

Firewall logs

A forensic scientist arrives at a crime scene to begin collecting evidence.

What is the first thing the forensic scientist should do?

A.

Seize the computer immediately

B.

Photograph all evidence in its original place

C.

Document user passwords

D.

Run antivirus scans

A forensic scientist is examining a computer for possible evidence of a cybercrime.

Why should the forensic scientist copy files at the bit level instead of the OS level when copying files from the computer to a forensic computer?

A.

Copying files at the OS level fails to copy deleted files or slack space.

B.

Copying files at the OS level takes too long to be practical.

C.

Copying files at the OS level changes the timestamp of the files.

D.

Copying files at the OS level will copy extra information that is unnecessary.

A victim of Internet fraud fell for an online offer after using a search engine to find a deal on an expensive software purchase. Once the victim learned about the fraud, he contacted a forensic investigator for help.

Which digital evidence should the investigator collect?

A.

Virus signatures

B.

Whois records

C.

Computer logs

D.

Email headers

Which law or guideline lists the four states a mobile device can be in when data is extracted from it?

A.

Health Insurance Portability and Accountability Act (HIPAA)

B.

NIST SP 800-72 Guidelines

C.

Electronic Communications Privacy Act (ECPA)

D.

Communications Assistance to Law Enforcement Act (CALEA)

A forensics investigator is investigating a Windows computer which may be collecting data from other computers on the network.

Which Windows command line tool can be used to determine connections between machines?

A.

Telnet

B.

Xdetect

C.

Openfiles

D.

Netstat