1.
What does the acronym POST mean as it relates to a PC?
Correct Answer
B. PowerOn Self Test
Explanation
The acronym POST stands for PowerOn Self Test. This test is performed by a computer when it is powered on to check if all the hardware components are functioning properly. It checks the memory, keyboard, hard drive, and other essential components. If any issues are detected during the POST, the computer may display error messages or emit beep codes to indicate the problem. The POST is an important diagnostic tool that helps identify hardware failures and ensures that the computer is in a good operational state before the operating system is loaded.
2.
If you see the files ZerO.tar.gz and copy.tar.gz on a Linux system while doing an investigation, what can you conclude?
Correct Answer
D. Nothing in particular as these can be operational files
Explanation
The presence of the files ZerO.tar.gz and copy.tar.gz on a Linux system does not provide enough information to draw any conclusions. These files could be operational files used by the system, and their presence alone does not indicate any suspicious activity or compromise. Further investigation and analysis would be necessary to determine their purpose and if they pose any security risks.
3.
Adam, a forensic investigator, is investigating an attack on Microsoft Exchange Server of a large organization. As the first step of the investigation, he examined the PRIV.EDB file and found the source from where the mail originated and the name of the file that disappeared upon execution. Now, he wants to examine the MIME stream content. Which of the following files is he going to examine?
Correct Answer
A. PRIV.STM
Explanation
Adam is investigating an attack on the Microsoft Exchange Server and has already examined the PRIV.EDB file to gather information. The PRIV.EDB file revealed the source of the email and the name of the file that disappeared upon execution. Now, Adam wants to examine the MIME stream content, which is stored in the PRIV.STM file. Therefore, he will examine the PRIV.STM file to further investigate the attack.
4.
Which of the following files gives information about the client sync sessions in Google Drive on Windows?
Correct Answer
B. Sync_log.log
Explanation
The correct answer is "Sync_log.log" because the question is asking for a file that provides information about client sync sessions in Google Drive on Windows. The file name "Sync_log.log" suggests that it is a log file specifically for syncing activities, and the use of underscores and lowercase letters is consistent with file naming conventions on Windows.
5.
How many possible sequence number combinations are there in TCP/IP protocol?
Correct Answer
C. 4 billion
Explanation
The TCP/IP protocol uses a 32-bit sequence number field, which means there are 2^32 (4 billion) possible combinations. This allows for a large number of unique sequence numbers to be used in TCP/IP communication, ensuring reliable and ordered data transmission.
6.
Which of the following technique creates a replica of an evidence media?
Correct Answer
C. Bit Stream Imaging
Explanation
Bit Stream Imaging is a technique that creates a complete and exact replica of an evidence media. It captures every bit and byte of data, including deleted and hidden files, as well as the file system structure. This ensures that the integrity of the original evidence is preserved, allowing for a thorough analysis without altering or damaging the original data. Backup, Data Extraction, and Data Deduplication do not create a complete replica of the evidence media, making Bit Stream Imaging the correct answer.
7.
To make sure the evidence you recover and analyze with computer forensics software can be admitted in court, you must test and validate the software. What group is actively providing tools and creating procedures for testing and validating computer forensics software?
Correct Answer
C. National Institute of Standards and Technology (NIST)
Explanation
The National Institute of Standards and Technology (NIST) is actively providing tools and creating procedures for testing and validating computer forensics software. This ensures that the evidence recovered and analyzed using the software can be admitted in court.
8.
Which of the following commands shows you the names of all open shared files on a server and the number of file locks on each file?
Correct Answer
B. Net file
Explanation
The correct answer is "Net file" because this command displays the names of all open shared files on a server and also provides information about the number of file locks on each file. This command is useful for monitoring file sharing and identifying any potential issues or conflicts with file access.
9.
You have been called in to help with an investigation of an alleged network intrusion. After questioning the members of the company IT department, you search through the server log files to find any trace of the intrusion. After that you decide to telnet into one of the company routers to see if there is any evidence to be found. While connected to the router, you see some unusual activity and believe that the attackers are currently connected to that router. You start up an ethereal session to begin capturing traffic on the router that could be used in the investigation. At what layer of the OSI model are you monitoring while watching traffic to and from the router?
Correct Answer
A. Network
Explanation
While watching traffic to and from the router, you are monitoring at the Network layer of the OSI model. The Network layer is responsible for routing and forwarding data packets between different networks. By monitoring at this layer, you can analyze the network addresses, routing protocols, and other network-related information to gather evidence for the investigation of the alleged network intrusion.
10.
Which of the following tools is not a data acquisition hardware tool?
Correct Answer
C. F-Response Imager
Explanation
F-Response Imager is not a data acquisition hardware tool because it is a software tool used for remote forensic imaging and analysis. It allows investigators to acquire data from remote computers over a network connection, rather than physically connecting to the hardware. The other options, UltraKit, Atola Insight Forensic, and Triage-Responder, are all examples of data acquisition hardware tools that are used to physically connect to and acquire data from target devices.
11.
You are running known exploits against your network to test for possible vulnerabilities. To test the strength of your virus software, you load a test network to mimic your production network. Your software successfully blocks some simple macro and encrypted viruses. You decide to really test the software by using virus code where the code rewrites itself entirely and the signatures change from child to child, but the functionality stays the same. What type of virus is this that you are testing?
Correct Answer
B. MetamorpHic
Explanation
The type of virus being tested in this scenario is a metamorphic virus. This type of virus is able to rewrite its own code completely, changing its signatures from child to child while maintaining the same functionality. This makes it difficult for antivirus software to detect and block the virus, as the signatures keep changing.
12.
Harold is a security analyst who has just run the rdisk /s command to grab the backup SAM files on a computer. Where should Harold navigate on the computer to find the file?
Correct Answer
C. %systemroot%\repair
Explanation
Harold should navigate to the %systemroot%\repair directory on the computer to find the backup SAM files.
13.
This ISO standard defines file systems and protocols for exchanging data between optical disks. What is it?
Correct Answer
A. ISO 9660
Explanation
ISO 9660 is the correct answer because it is an ISO standard that specifically defines file systems and protocols for exchanging data between optical disks. ISO/IEC 13940 and ISO 9060 are not relevant to this topic, and IEC 3490 is not an ISO standard.
14.
The MD5 program is used to:
Correct Answer
D. Verify that a disk is not altered when you examine it
Explanation
The MD5 program is used to verify that a disk is not altered when you examine it. MD5 (Message Digest Algorithm 5) is a widely used cryptographic hash function that produces a unique hash value for a given input. By comparing the hash value of a disk before and after examination, you can determine if any changes or alterations have been made to the disk. This is important for ensuring the integrity and authenticity of the evidence on the disk.
15.
If an attacker's computer sends an IPID of 31400 to a zombie computer on an open port in IDLE scanning, what will be the response?
Correct Answer
D. 31401
Explanation
In IDLE scanning, the attacker's computer sends a series of SYN packets to the zombie computer on an open port. If the IPID of the attacker's computer is 31400, the zombie computer will respond with a SYN/ACK packet and increment the IPID by 1. Therefore, the response from the zombie computer will have an IPID of 31401.
16.
Which of the following should a computer forensics lab used for investigations have?
Correct Answer
B. Restricted access
Explanation
A computer forensics lab should have restricted access to ensure the security and integrity of the investigations. This means that only authorized personnel should be allowed to enter the lab, minimizing the risk of tampering or unauthorized access to the evidence. Restricted access helps maintain the chain of custody and ensures that the evidence collected is admissible in court. It also helps protect the lab from potential threats or breaches that could compromise the investigations.
17.
Sectors are pie-shaped regions on a hard disk that store data. Which of the following parts of a hard disk do not contribute in determining the addresses of data?
Correct Answer
B. Interface
Explanation
The interface of a hard disk is responsible for connecting the hard disk to the computer system and facilitating communication between them. It does not play a role in determining the addresses of data stored on the hard disk. The addresses of data are determined by the combination of sectors, cylinders, and heads, which define the physical location of the data on the disk.
18.
The given image displays information about date and time of installation of the OS along with service packs, patches, and sub-directories. What command or tool did the investigator use to view this output?
SI Administrator Command Prompt - â–¡ X
03/10/2016
03:30 AH
<DIR>
migration
03/10/2016
03:32 AH
352,136
FNTCACHE.DAT
03/25/2016
08:09 pH
140,098
perfc009.dat
03/25/2016
08:09 pH
746,532
perfh009.dat
03/25/2016
08:09 pH
883,572
PerfStringBackup. Illi
04/06/2016
04:54 pH
<DIR>
Driverstore
04/13/2016
11:27 AH
<DIR>
catroot2
04/13/2016
12:33 pH
135,176,864
HRT.exe
04/13/2016
12:33 pH
<DIR>
HRT
04/14/2016
09:36 AH
<DIR>
config
04/14/2016
03:06 pH
<OIR>
drivers
04/14/2016
04:02 pH
<OIR>
04/14/2016
04:02 pH
<DIR>
04/14/2016
04:02 pH
324
pid.dump
04/14/2016
05:51 pH
<OIR>
sru
3866 File(s) 1,727,891,022 bytes â–
116 Dir(s)
63,601,328,128 bytes free â–
C:\WINOOWS\system32>_
____________
___________________
Correct Answer
A. Dir/o:d
Explanation
The investigator used the "dir/o:d" command to view this output. This command is used to list the files and directories in a directory in chronological order based on their date of installation.
19.
Andie, a network administrator, suspects unusual network services running on a windows system. Which of the following commands should he use to verify unusual network services started on a Windows system?
Correct Answer
D. Net start
Explanation
The correct answer is "net start". This command is used to display a list of running services on a Windows system. By using this command, Andie can verify if there are any unusual network services running on the system.
20.
Why should you note all cable connections for a computer you want to seize as evidence?
Correct Answer
A. To know what outside connections existed
Explanation
When seizing a computer as evidence, it is important to note all cable connections in order to determine what outside connections existed. This information can be crucial for understanding the potential sources of data transfer or communication, such as external storage devices or network connections. It can also help identify any additional devices that may have been connected to the computer, providing a more comprehensive picture of the digital environment and potential evidence sources.
21.
What stage of the incident handling process involves reporting events?
Correct Answer
C. Identification
Explanation
The stage of the incident handling process that involves reporting events is the "Identification" stage. This is the initial step where the incident is detected and recognized as an actual security event. Reporting events involves documenting and notifying the appropriate individuals or teams about the incident, providing them with the necessary information to begin the incident response process.
22.
Which of the following is a MAC-based File Recovery Tool?
Correct Answer
C. Cisdem DataRecovery 3
Explanation
Cisdem DataRecovery 3 is a MAC-based File Recovery Tool.
23.
What does the superblock in Linux define?
Correct Answer
C. Location of the firstinode
Explanation
The superblock in Linux defines the location of the first inode. The inode is a data structure that contains information about a file or directory, such as its permissions, size, and location on the disk. The superblock is a crucial part of the file system as it helps in locating the first inode, which is the starting point for accessing and managing files and directories in the file system.
24.
With the standard Linux second extended file system (Ext2fs), a file is deleted when the inode internal link count reaches .
Correct Answer
A. 0
Explanation
In the standard Linux second extended file system (Ext2fs), a file is deleted when the inode internal link count reaches 0. The inode internal link count represents the number of hard links pointing to a particular file. When the link count reaches 0, it means that there are no more hard links pointing to the file, indicating that the file is no longer in use and can be safely deleted.
25.
Chong-lee, a forensics executive, suspects that a malware is continuously making copies of files and folders on a victim system to consume the available disk space. What type of test would confirm his claim?
Correct Answer
A. File fingerprinting
Explanation
File fingerprinting would confirm Chong-lee's claim that a malware is continuously making copies of files and folders on the victim system to consume disk space. File fingerprinting involves generating unique hash values or signatures for each file, allowing for comparison and identification of duplicate files. By conducting file fingerprinting, Chong-lee can determine if there are multiple copies of the same files, supporting his suspicion of malware activity.
26.
From the following spam mail header, identify the host IP that sent this spam?
From [email protected] [email protected] Tue Nov 27 17:27:11 2001
Received: from viruswall.ie.cuhk.edu.hk (viruswall [137.189.96.52]) by eng.ie.cuhk.edu.hk (8.11.6/8.11.6) with ESMTP id
fAR9RAP23061 for; Tue, 27 Nov 2001 17:27:10 +0800 (HKT)
Received: from mydomain.com (pcd249020.netvigator.com [203.218.39.20]) by viruswall.ie.cuhk.edu.hk (8.12.1/8.12.1)
with SMTP id fAR9QXwZ018431 for ; Tue, 27 Nov 2001 17:26:36 +0800 (HKT)
Message-Id: >200111270926.fAR9QXwZ018431 @viruswall.ie.cuhk.edu.hk From: "china hotel web"
To: "Shlam"
Subject: SHANGHAI (HILTON HOTEL) PACKAGE
Date: Tue, 27 Nov 2001 17:25:58 +0800 MIME-Version: 1.0
Priority: 3 X-MSMail- Priority: Normal
Reply-To: ' china hotel web"
Correct Answer
C. 203.218.39.20
Explanation
The spam mail header shows that the email was received from viruswall.ie.cuhk.edu.hk (137.189.96.52), which then received it from pcd249020.netvigator.com (203.218.39.20). Therefore, the host IP that sent this spam is 203.218.39.20.
27.
Preparing an image drive to copy files to is the first step in Linux forensics. For this purpose, what would the following command accomplish?
dcfldd if=/dev/zero of=/dev/hda bs=4096 conv=noerror, sync
Correct Answer
A. Fill the disk with zeros
Explanation
The command "dcfldd if=/dev/zero of=/dev/hda bs=4096 conv=noerror, sync" would fill the disk with zeros. This is achieved by using the input file "/dev/zero" which contains null bytes and writing it to the output file "/dev/hda" which represents the disk. The option "bs=4096" specifies the block size of 4096 bytes, and "conv=noerror, sync" ensures that any errors encountered during the process are ignored and the data is synchronized.
28.
What is cold boot (hard boot)?
Correct Answer
D. It is the process of starting a computer from a powered-down or off state
Explanation
A cold boot, also known as a hard boot, refers to the process of starting a computer from a powered-down or off state. This means that the computer is completely shut down and then powered on again. It is different from restarting a computer that is already turned on through the operating system or restarting a computer that is in sleep mode. In a cold boot, the computer goes through the full startup process, including loading the operating system and initializing all hardware components.
29.
Diskcopy is:
Correct Answer
B. A standard MS-DOS command
Explanation
Diskcopy is a standard MS-DOS command. MS-DOS is an operating system developed by Microsoft for IBM-compatible personal computers. The diskcopy command is used to make a copy of an entire floppy disk onto another floppy disk. It is a built-in utility in MS-DOS and does not require any additional software or tools.
30.
The surface of a hard disk consists of several concentric rings known as tracks; each of these tracks has smaller partitions called disk blocks. What is the size of each block?
Correct Answer
B. 512 bytes
Explanation
The size of each block on a hard disk is 512 bytes. This means that each partition within a track on the surface of the hard disk is divided into blocks, with each block being 512 bytes in size.
31.
In Linux, what is the smallest possible shellcode?
Correct Answer
A. 24 bytes
Explanation
The smallest possible shellcode in Linux is 24 bytes. Shellcode is a small piece of code that is used to exploit vulnerabilities and execute arbitrary commands. In Linux, shellcode is typically written in assembly language and injected into a program to gain unauthorized access or perform malicious actions. The size of shellcode is important because it needs to fit within the memory space allocated for the exploit. The smaller the shellcode, the more likely it is to succeed in exploiting a vulnerability without being detected. Therefore, the smallest possible shellcode is preferred for stealthy attacks.
32.
A small law firm located in the Midwest has possibly been breached by a computer hacker looking to obtain information on their clientele. The law firm does not have any on-site IT employees, but wants to search for evidence of the breach themselves to prevent any possible media attention. Why would this not be recommended?
Correct Answer
D. Searching can change date/time stamps
Explanation
Searching can change date/time stamps. When searching for evidence of a breach, it is important to preserve the integrity of the data. Searching can potentially alter the date/time stamps associated with the files and make it difficult to establish a timeline of events. This can hinder the investigation and make it harder to determine the extent of the breach and the actions taken by the hacker. It is recommended to involve professionals with expertise in digital forensics to ensure that the investigation is conducted properly and the evidence is preserved accurately.
33.
Which among the following search warrants allows the first responder to get the victim’s computer information such as service records, billing records, and subscriber information from the service provider?
Correct Answer
B. Electronic Storage Device Search Warrant
Explanation
An Electronic Storage Device Search Warrant allows the first responder to obtain the victim's computer information from the service provider. This warrant specifically authorizes the search and seizure of electronic storage devices, such as computers, to collect evidence related to a crime. It enables the first responder to access the victim's service records, billing records, and subscriber information, which can be crucial in the investigation process. The other search warrants mentioned in the options do not specifically pertain to obtaining computer information from a service provider.
34.
Which of the following is a responsibility of the first responder?
Correct Answer
B. Collect as much information about the incident as possible
Explanation
The responsibility of the first responder is to collect as much information about the incident as possible. This is important because it allows the first responder to assess the situation accurately and make informed decisions about the appropriate course of action. By gathering information, the first responder can determine the severity of the incident, identify potential risks or hazards, and provide accurate and timely information to other responders or authorities. Additionally, collecting information helps in documenting the findings for future reference or analysis.
35.
Harold wants to set up a firewall on his network but is not sure which one would be the most appropriate. He knows he needs to allow FTP traffic to one of the servers on his network, but he wants to only allow FTP-PUT. Which firewall would be most appropriate for Harold? needs?
Correct Answer
C. Application-level proxy firewall
Explanation
An application-level proxy firewall would be the most appropriate for Harold because it operates at the application layer of the network stack. This means that it can inspect the content of the FTP traffic and only allow FTP-PUT requests while blocking other types of FTP traffic. Circuit-level proxy firewalls, packet filtering firewalls, and data link layer firewalls do not have the ability to inspect the content of the traffic at the application layer, making them less suitable for Harold's needs.
36.
Which one do you like?
Correct Answer
C. Electronic Storage Device Search Warrant
Explanation
An electronic storage device search warrant is likely the correct answer because it is specifically focused on searching electronic devices for evidence. This type of warrant would be used when law enforcement suspects that electronic devices, such as computers or smartphones, may contain information relevant to an investigation. It allows them to legally search and seize these devices in order to gather evidence. The other options, such as John Doe Search Warrant or Citizen Informant Search Warrant, do not provide any specific information about the nature of the search or the type of evidence being sought. The Service Provider Search Warrant may be relevant in cases where law enforcement needs to access information stored by a service provider, but it does not necessarily involve searching electronic devices.
37.
When marking evidence that has been collected with the “aaa/ddmmyy/nnnn/zz" format, what does the “nnnn” denote?
Correct Answer
D. The sequential number of the exhibits seized by the analyst
Explanation
The "nnnn" in the "aaa/ddmmyy/nnnn/zz" format denotes the sequential number of the exhibits seized by the analyst. This number is used to keep track of the order in which the exhibits were collected, allowing for easy reference and organization of the evidence.
38.
A forensic examiner is examining a Windows system seized from a crime scene. During the examination of a suspect file, he discovered that the file is password protected. He tried guessing the password using the suspect's available information but without any success. Which of the following tool can help the investigator to solve this issue?
Correct Answer
A. Cain & Abel
Explanation
Cain & Abel is a password recovery tool that can help the forensic examiner in solving the issue of a password-protected file. This tool is specifically designed for recovering various types of passwords, including network passwords and password-protected files. It uses different methods such as brute-force attacks and dictionary attacks to crack the password. By using Cain & Abel, the forensic examiner can increase the chances of successfully unlocking the suspect file and gaining access to its contents for further investigation.
39.
When obtaining a warrant, it is important to:
Correct Answer
A. Particularlydescribe the place to be searched and particularly describe the items to be seized
Explanation
When obtaining a warrant, it is important to particularly describe the place to be searched and particularly describe the items to be seized. This requirement ensures that the warrant is specific and does not give the authorities unlimited power to search any location or seize any item. By specifically describing the place and items, it provides a clear limit to the search and seizure, protecting individuals' rights and preventing potential abuse of power.
40.
What type of analysis helps to identify the time and sequence of events in an investigation?
Correct Answer
D. Temporal
Explanation
Temporal analysis is the type of analysis that helps to identify the time and sequence of events in an investigation. Temporal analysis involves examining the timestamps, dates, and chronological order of events to understand the timeline and sequence of activities. This analysis can be useful in various fields such as forensic investigations, historical research, and data analysis, where understanding the temporal aspect is crucial for drawing accurate conclusions and uncovering patterns or trends.
41.
Which tool can help the investigator if he wants to examine changes made to the system’s registry by the suspect program?
Correct Answer
C. Regshot
Explanation
Regshot is a tool that can help the investigator examine changes made to the system's registry by the suspect program. It takes snapshots of the registry before and after the program is executed and then compares the two snapshots to identify any changes. This allows the investigator to analyze and understand the modifications made by the program, which can be crucial in determining its behavior and potential impact on the system.
42.
When making the preliminary investigations in a sexual harassment case, how many investigators are you recommended having?
Correct Answer
B. Two
Explanation
In a sexual harassment case, it is recommended to have two investigators during the preliminary investigations. This is because having two investigators allows for a more objective and unbiased investigation. It also ensures that multiple perspectives are considered and helps to prevent any potential conflicts of interest. Having two investigators can also help to ensure that all aspects of the case are thoroughly examined and that no important details are overlooked.
43.
Which of the following tasks DOES NOT come under the investigation phase of a cybercrime forensics investigation case?
Correct Answer
C. First response
Explanation
During the investigation phase of a cybercrime forensics investigation case, various tasks are performed to gather evidence and analyze data. Data collection involves gathering relevant information and evidence related to the cybercrime. Secure the evidence involves ensuring the preservation and protection of the collected evidence to maintain its integrity. Data analysis involves examining and interpreting the collected data to identify patterns, anomalies, and other important information. However, the first response is not a task that falls under the investigation phase. The first response refers to the initial actions taken immediately after the detection of a cybercrime, such as reporting the incident and securing the affected systems.
44.
You have compromised a lower-level administrator account on an Active Directory network of a small company in Dallas, Texas. You discover Domain Controllers through enumeration. You connect to one of the Domain Controllers on port 389 using ldp.exe. What are you trying to accomplish here?
Correct Answer
D. Enumerate domain user accounts and built-in groups
Explanation
By connecting to the Domain Controller on port 389 using ldp.exe, the attacker is attempting to enumerate domain user accounts and built-in groups. This allows them to gather information about the users and groups present in the Active Directory network, which can be used for further exploitation or privilege escalation. The other options, such as poisoning DNS records or establishing a remote connection, are not relevant to the given scenario and do not align with the attacker's objectives.
45.
Which of the following is a database in which information about every file and directory on an NT File System (NTFS) volume is stored?
Correct Answer
D. Master File Table
Explanation
The Master File Table (MFT) is a database in which information about every file and directory on an NT File System (NTFS) volume is stored. It acts as a directory for the file system, keeping track of the location and metadata of each file and directory on the volume. The MFT is a crucial component of the NTFS file system and is used by the operating system to access and manage files and directories efficiently.
46.
When monitoring for both intrusion and security events between multiple computers, it is essential that the computers' clocks are synchronized. Synchronized time allows an administrator to reconstruct what took place during an attack against multiple computers. Without synchronized time, it is very difficult to determine exactly when specific events took place, and how events interlace. What is the name of the service used to synchronize time among multiple computers?
Correct Answer
B. Network Time Protocol
Explanation
The correct answer is Network Time Protocol. Network Time Protocol (NTP) is a service used to synchronize time among multiple computers. It ensures that the clocks of different computers are aligned, allowing administrators to accurately reconstruct events during an attack or security incident. Without synchronized time, it becomes challenging to determine the exact timing and sequence of events.
47.
Shane has started the static analysis of a malware and is using the tool ResourcesExtract to find more details of the malicious program What part of the analysis is he performing?
Correct Answer
B. Strings search
Explanation
Shane is using the tool ResourcesExtract to find more details of the malicious program. This tool is specifically designed to extract strings from binary files, which can provide valuable information about the malware. Therefore, Shane is performing a strings search as part of the static analysis to uncover important details about the malicious program.
48.
On Linux/Unix based Web servers, what privilege should the daemon service be run under?
Correct Answer
D. Something other than root
Explanation
The daemon service on Linux/Unix based Web servers should be run under a privilege other than root. Running the daemon service as root can pose a security risk as it grants extensive permissions and control over the system. By running the daemon service under a different privilege, the potential damage that can be caused by any vulnerabilities or malicious actions is limited. This helps to ensure the overall security and stability of the server.
49.
Gill is a computer forensics investigator who has been called upon to examine a seized computer. This computer, according to the police, was used by a hacker who gained access to numerous banking institutions to steal customer information. After preliminary investigations, Gill finds in the computer’s log files that the hacker was able to gain access to these banks through the use of Trojan horses. The hacker then used these Trojan horses to obtain remote access to the companies’ domain controllers. From this point, Gill found that the hacker pulled off the SAM files from the domain controllers to then attempt and crack network passwords. What is the most likely password cracking technique used by this hacker to break the user passwords from the SAM files?
Correct Answer
D. Dictionary attack
Explanation
The most likely password cracking technique used by the hacker to break the user passwords from the SAM files is a dictionary attack. This is because the hacker gained access to the domain controllers and pulled off the SAM files, which contain the hashed passwords of the users. In a dictionary attack, the hacker uses a pre-built list of commonly used passwords or words from a dictionary to try and match the hashed passwords and gain unauthorized access.
50.
In the context of file deletion process, which of the following statement holds true?
Correct Answer
C. While booting, the machine may create temporary files that can delete evidence
Explanation
The correct answer is "While booting, the machine may create temporary files that can delete evidence." This statement is true because during the booting process, the machine may generate temporary files that can unintentionally delete evidence or overwrite existing data. This can occur if the temporary files are stored in the same location as the files that need to be preserved. Therefore, it is important to be cautious during the booting process to prevent the loss of important data.