Digital Forensics in Cybersecurity (D431/C840DQO1) Course Exam Questions and Answers
Which method is used to implement steganography through pictures?
A forensic scientist is examining a computer for possible evidence of a cybercrime.
Why should the forensic scientist copy files at the bit level instead of the OS level when copying files from the computer to a forensic computer?
Which file stores local Windows passwords in the Windows\System32\ directory and is subject to being cracked by using a live CD?
On which file does the Windows operating system store hashed passwords?
Which storage format is a magnetic drive?
Which description applies to the Advanced Forensic Format (AFF)?
A digital forensic examiner receives a computer used in a hacking case. The examiner is asked to extract information from the computer's Registry.
How should the examiner proceed when obtaining the requested digital evidence?
A computer involved in a crime is infected with malware. The computer is on and connected to the company's network. The forensic investigator arrives at the scene.
Which action should be the investigator's first step?
The following line of code is an example of how to make a forensic copy of a suspect drive:
dd if=/dev/mem of=/evidence/image.memory1
Which operating system should be used to run this command?
Which law is related to the disclosure of personally identifiable protected health information (PHI)?
What are the three basic tasks that a systems forensic specialist must keep in mind when handling evidence during a cybercrime investigation?
A forensic scientist arrives at a crime scene to begin collecting evidence.
What is the first thing the forensic scientist should do?
Which operating system creates a swap file to temporarily store information from memory on the hard drive when needed?
Which technique allows a cybercriminal to hide information?
Which U.S. law criminalizes the act of knowingly using a misleading domain name with the intent to deceive a minor into viewing harmful material?
An employee sends an email message to a fellow employee. The message is sent through the company's messaging server.
Which protocol is used to send the email message?
Which tool should be used with sound files, video files, and image files?
A cybercriminal communicates with his compatriots using steganography. The FBI discovers that the criminal group uses white space to hide data in photographs.
Which tool can the cybercriminals use to facilitate this type of communication?
Which characteristic applies to magnetic drives compared to solid-state drives (SSDs)?
Which Windows 7 operating system log stores events collected from remote computers?
A forensic investigator wants to collect evidence from a file created by a Macintosh computer running OS X 10.8.
Which file type can be created by this OS?
What is one purpose of steganography?
An employee is suspected of using a company Apple iPhone 4 for inappropriate activities.
Which utility should the company use to access the iPhone without knowing the passcode?