Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

A company has identified that a hacker has modified files on one of the company's computers. The IT department has collected the storage media from the hacked computer.

Which evidence should be obtained from the storage media to identify which files were modified?

A.

File timestamps

B.

Private IP addresses

C.

Public IP addresses

D.

Operating system version

The chief information officer of an accounting firm believes sensitive data is being exposed on the local network.

Which tool should the IT staff use to gather digital evidence about this security vulnerability?

A.

Firewall

B.

Sniffer

C.

Antivirus

D.

Packet filter

A forensic investigator needs to identify where email messages are stored on a Microsoft Exchange server.

Which file extension is used by Exchange email servers to store the mailbox database?

A.

.edb

B.

.nsf

C.

.mail

D.

.db

A digital forensic examiner receives a computer used in a hacking case. The examiner is asked to extract information from the computer's Registry.

How should the examiner proceed when obtaining the requested digital evidence?

A.

Ensure that any tools and techniques used are widely accepted

B.

Investigate whether the computer was properly seized

C.

Enlist a colleague to witness the investigative process

D.

Download a tool from a hacking website to extract the data

Which operating system creates a swap file to temporarily store information from memory on the hard drive when needed?

A.

Linux

B.

Mac

C.

Unix

D.

Windows

Which file stores local Windows passwords in the Windows\System32\ directory and is subject to being cracked by using a live CD?

A.

SAM

B.

IPSec

C.

HAL

D.

Ntidr

Which tool can be used to make a bit-by-bit copy of a Windows Phone 8?

A.

Forensic Toolkit (FTK)

B.

Data Doctor

C.

Pwnage

D.

Wolf

Which U.S. law criminalizes the act of knowingly using a misleading domain name with the intent to deceive a minor into viewing harmful material?

A.

Communications Assistance to Law Enforcement Act (CALEA)

B.

18 U.S.C. 2252B

C.

The Privacy Protection Act (PPA)

D.

Electronic Communications Privacy Act (ECPA)

Which description applies to the Advanced Forensic Format (AFF)?

A.

An open file standard developed by AccessData

B.

A proprietary format used by the iLook tool

C.

An open file standard used by Sleuth Kit and Autopsy

D.

A proprietary format developed by Guidance Software

Susan was looking at her credit report and noticed that several new credit cards had been opened lately in her name. Susan has not opened any of the credit card accounts herself.

Which type of cybercrime has been perpetrated against Susan?

A.

Identity theft

B.

SQL injection

C.

Cyberstalking

D.

Malware