312-49Free trialFree trial

By eccouncil
Aug, 2025

Verified

25Q per page

Question 1

When an investigator contacts by telephone the domain administrator or controller listed by a Who is lookup to request all e-mails sent and received for a user account be preserved, what U.S.C. statute authorizes this phone call and obligates the ISP to preserve e-mail records?

  • A: Title 18, Section 1030
  • B: Title 18, Section 2703(d)
  • C: Title 18, Section Chapter 90
  • D: Title 18, Section 2703(f)

Question 2

You are contracted to work as a computer forensics investigator for a regional bank that has four 30 TB storage area networks that store customer data.
What method would be most efficient for you to acquire digital evidence from this network?

  • A: create a compressed copy of the file with DoubleSpace
  • B: create a sparse data copy of a folder or file
  • C: make a bit-stream disk-to-image file
  • D: make a bit-stream disk-to-disk file

Question 3

Melanie was newly assigned to an investigation and asked to make a copy of all the evidence from the compromised system. Melanie did a DOS copy of all the files on the system. What would be the primary reason for you to recommend a disk imaging tool?

  • A: A disk imaging tool would check for CRC32s for internal self-checking and validation and have MD5 checksum
  • B: Evidence file format will contain case data entered by the examiner and encrypted at the beginning of the evidence file
  • C: A simple DOS copy will not include deleted files, file slack and other information
  • D: There is no case for an imaging tool as it will use a closed, proprietary format that if compared to the original will not match up sector for sector

Question 4

You are employed directly by an attorney to help investigate an alleged sexual harassment case at a large pharmaceutical manufacture. While at the corporate office of the company, the CEO demands to know the status of the investigation. What prevents you from discussing the case with the CEO?

  • A: the attorney-work-product rule
  • B: Good manners
  • C: Trade secrets
  • D: ISO 17799

Question 5

One technique for hiding information is to change the file extension from the correct one to one that might not be noticed by an investigator. For example,
[1]
extension?

  • A: the File Allocation Table
  • B: the file header
  • C: the file footer
  • D: the sector map

Question 6

You are working as Computer Forensics investigator and are called by the owner of an accounting firm to investigate possible computer abuse by one of the firm's employees. You meet with the owner of the firm and discover that the company has never published a policy stating that they reserve the right to inspect their computing assets at will. What do you do?

  • A: Inform the owner that conducting an investigation without a policy is not a problem because the company is privately owned
  • B: Inform the owner that conducting an investigation without a policy is a violation of the 4th amendment
  • C: Inform the owner that conducting an investigation without a policy is a violation of the employee's expectation of privacy
  • D: Inform the owner that conducting an investigation without a policy is not a problem because a policy is only necessary for government agencies

Question 7

You are working for a large clothing manufacturer as a computer forensics investigator and are called in to investigate an unusual case of an employee possibly stealing clothing designs from the company and selling them under a different brand name for a different company. What you discover during the course of the investigation is that the clothing designs are actually original products of the employee and the company has no policy against an employee selling his own designs on his own time. The only thing that you can find that the employee is doing wrong is that his clothing design incorporates the same graphic symbol as that of the company with only the wording in the graphic being different. What area of the law is the employee violating?

  • A: trademark law
  • B: copyright law
  • C: printright law
  • D: brandmark law

Question 8

To preserve digital evidence, an investigator should ____________________.

  • A: Make two copies of each evidence item using a single imaging tool
  • B: Make a single copy of each evidence item using an approved imaging tool
  • C: Make two copies of each evidence item using different imaging tools
  • D: Only store the original evidence item

Question 9

Profiling is a forensics technique for analyzing evidence with the goal of identifying the perpetrator from their various activity. After a computer has been compromised by a hacker, which of the following would be most important in forming a profile of the incident?

  • A: The manufacturer of the system compromised
  • B: The logic, formatting and elegance of the code used in the attack
  • C: The nature of the attack
  • D: The vulnerability exploited in the incident

Question 10

You have completed a forensic investigation case. You would like to destroy the data contained in various disks at the forensics lab due to sensitivity of the case.
How would you permanently erase the data on the hard disk?

  • A: Throw the hard disk into the fire
  • B: Run the powerful magnets over the hard disk
  • C: Format the hard disk multiple times using a low level disk utility
  • D: Overwrite the contents of the hard disk with Junk data

Question 11

You are working as a Computer forensics investigator for a corporation on a computer abuse case. You discover evidence that shows the subject of your investigation is also embezzling money from the company. The company CEO and the corporate legal counsel advise you to contact law enforcement and provide them with the evidence that you have found. The law enforcement officer that responds requests that you put a network sniffer on your network and monitor all traffic to the subject's computer. You inform the officer that you will not be able to comply with that request because doing so would:

  • A: Violate your contract
  • B: Cause network congestion
  • C: Make you an agent of law enforcement
  • D: Write information to the subject's hard drive

Question 12

What file structure database would you expect to find on floppy disks?

  • A: NTFS
  • B: FAT32
  • C: FAT16
  • D: FAT12

Question 13

A law enforcement officer may only search for and seize criminal evidence with _______________________, which are facts or circumstances that would lead a reasonable person to believe a crime has been committed or is about to be committed, evidence of the specific crime exists and the evidence of the specific crime exists at the place to be searched.

  • A: Mere Suspicion
  • B: A preponderance of the evidence
  • C: Probable cause
  • D: Beyond a reasonable doubt

Question 14

When you are running a vulnerability scan on a network and the IDS cuts off your connection, what type of IDS is being used?

  • A: Passive IDS
  • B: Active IDS
  • C: Progressive IDS
  • D: NIPS

Question 15

You are carrying out the last round of testing for your new website before it goes live. The website has many dynamic pages and connects to a SQL backend that accesses your product inventory in a database. You come across a web security site that recommends inputting the following code into a search field on web pages to check for vulnerabilities: When you type this and click on search, you receive a pop-up window that says: "This is a test."
What is the result of this test?

  • A: Your website is vulnerable to CSS
  • B: Your website is not vulnerable
  • C: Your website is vulnerable to SQL injection
  • D: Your website is vulnerable to web bugs

Question 16

When examining a file with a Hex Editor, what space does the file header occupy?

  • A: the last several bytes of the file
  • B: the first several bytes of the file
  • C: none, file headers are contained in the FAT
  • D: one byte at the beginning of the file

Question 17

If an attacker's computer sends an IPID of 31400 to a zombie computer on an open port in IDLE scanning, what will be the response?

  • A: The zombie will not send a response
  • B: 31402
  • C: 31399
  • D: 31401

Question 18

Michael works for Kimball Construction Company as senior security analyst. As part of yearly security audit, Michael scans his network for vulnerabilities. Using
Nmap, Michael conducts XMAS scan and most of the ports scanned do not give a response. In what state are these ports?

  • A: Closed
  • B: Open
  • C: Stealth
  • D: Filtered

Question 19

You work as an IT security auditor hired by a law firm in Boston to test whether you can gain access to sensitive information about the company clients. You have rummaged through their trash and found very little information. You do not want to set off any alarms on their network, so you plan on performing passive foot printing against their Web servers. What tool should you use?

  • A: Ping sweep
  • B: Nmap
  • C: Netcraft
  • D: Dig

Question 20

You are a security analyst performing a penetration tests for a company in the Midwest. After some initial reconnaissance, you discover the IP addresses of some
Cisco routers used by the company. You type in the following URL that includes the IP address of one of the routers: http://172.168.4.131/level/99/exec/show/config
After typing in this URL, you are presented with the entire configuration file for that router. What have you discovered?

  • A: HTTP Configuration Arbitrary Administrative Access Vulnerability
  • B: HTML Configuration Arbitrary Administrative Access Vulnerability
  • C: Cisco IOS Arbitrary Administrative Access Online Vulnerability
  • D: URL Obfuscation Arbitrary Administrative Access Vulnerability

Question 21

What is the following command trying to accomplish?

  • A: Verify that UDP port 445 is open for the 192.168.0.0 network
  • B: Verify that TCP port 445 is open for the 192.168.0.0 network
  • C: Verify that NETBIOS is running for the 192.168.0.0 network
  • D: Verify that UDP port 445 is closed for the 192.168.0.0 network

Question 22

An "idle" system is also referred to as what?

  • A: PC not connected to the Internet
  • B: Zombie
  • C: PC not being used
  • D: Bot

Question 23

In the context of file deletion process, which of the following statement holds true?

  • A: When files are deleted, the data is overwritten and the cluster marked as available
  • B: The longer a disk is in use, the less likely it is that deleted files will be overwritten
  • C: While booting, the machine may create temporary files that can delete evidence
  • D: Secure delete programs work by completely overwriting the file in one go

Question 24

John and Hillary works at the same department in the company. John wants to find out Hillary's network password so he can take a look at her documents on the file server. He enables Lophtcrack program to sniffing mode. John sends Hillary an email with a link to Error! Reference source not found. What information will he be able to gather from this?

  • A: Hillary network username and password hash
  • B: The SID of Hillary network account
  • C: The SAM file from Hillary computer
  • D: The network shares that Hillary has permissions

Question 25

Kimberly is studying to be an IT security analyst at a vocational school in her town. The school offers many different programming as well as networking languages. What networking protocol language should she learn that routers utilize?

  • A: ATM
  • B: UDP
  • C: BPG
  • D: OSPF
Page 1 of 7 • Questions 1-25 of 151

Free preview mode

Enjoy the free questions and consider upgrading to gain full access!