Adam, a malicious hacker has successfully gained unauthorized access to the Linux system ofUmbrella Inc. Web server of the company runs on Apache. He has downloaded sensitive documents and database files from the computer. After performing these malicious tasks, Adam finally runs the following command on the Linux command box before disconnecting. for (( i = 0;i<11;i++ )); do dd if=/dev/random of=/dev/hda && dd if=/dev/zero of=/dev/hda doneWhich of the following actions does Adam want to perform by the above command?
#1
Answer: C✅ Correct❌ Incorrect
Adam works as a Computer Hacking Forensic Investigator for a garment company in the United States. A project has been assigned to him to investigate a case of a disloyal employee who is suspected of stealing design of the garments, which belongs to the company and selling those garments of the same design under different brand name. Adam investigated that the company does not have any policy related to the copy of design of the garments. He also investigated that the trademark under which the employee is selling the garments is almost identical to the original trademark of the company. On the grounds of which of the following laws can the employee be prosecuted?
#2
Answer: A✅ Correct❌ Incorrect
You work as a Network Administrator for Perfect Solutions Inc. You install Windows 98 on a computer. By default, which of the following folders does Windows 98 setup use to keep the registry tools?
#3
Answer: B✅ Correct❌ Incorrect
Which of the following tools can be used to perform tasks such as Windows password cracking, Windows enumeration, and VoIP session sniffing?
#4
Answer: D✅ Correct❌ Incorrect
Which of the following type of file systems is not supported by Linux kernel?
#5
Answer: C✅ Correct❌ Incorrect
Which of the following modules of OS X kernel (XNU) provides the primary system program interface?
#6
Answer: A✅ Correct❌ Incorrect
You work as a Network Administrator for Blue Bell Inc. You want to install Windows XP Professional on your computer, which already has Windows Me installed.You want to configure your computer to dual boot between Windows Me and Windows XP Professional. You have a single 40GB hard disk.Which of the following file systems will you choose to dual-boot between the two operating systems?
#7
Answer: B✅ Correct❌ Incorrect
John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He receives the following e- mail:The e-mail that John has received is an example of __________.
#8
Answer: D✅ Correct❌ Incorrect
Which of the following Acts enacted in United States allows the FBI to issue National Security Letters (NSLs) to Internet service providers (ISPs) ordering them to disclose records about their customers?
#9
Answer: D✅ Correct❌ Incorrect
TCP FIN scanning is a type of stealth scanning through which the attacker sends a FIN packet to the target port. If the port is closed, the victim assumes that this packet was sent mistakenly by the attacker and sends the RST packet to the attacker. If the port is open, the FIN packet will be ignored and the port will drop the packet. Which of the following operating systems can be easily identified with the help of TCP FIN scanning?
#10
Answer: D✅ Correct❌ Incorrect
Which of the following encryption methods uses AES technology?
#11
Answer: D✅ Correct❌ Incorrect
Mark works as a security manager for SofTech Inc. He is using a technique for monitoring what the employees are doing with corporate resources. Which of the following techniques is being used by Mark to gather evidence of an ongoing computer crime if a member of the staff is e-mailing company's secrets to an opponent?
#12
Answer: A✅ Correct❌ Incorrect
Which of the following is the first computer virus that was used to infect the boot sector of storage media formatted with the DOS File Allocation Table (FAT) file system?
#13
Answer: C✅ Correct❌ Incorrect
Which of the following attacks saturates network resources and disrupts services to a specific computer?
#14
Answer: C✅ Correct❌ Incorrect
Peter works as a Technical Representative in a CSIRT for SecureEnet Inc. His team is called to investigate the computer of an employee, who is suspected for classified data theft. Suspect's computer runs on Windows operating system. Peter wants to collect data and evidences for further analysis. He knows that inWindows operating system, the data is searched in pre-defined steps for proper and efficient analysis. Which of the following is the correct order for searching data on a Windows based system?
#15
Answer: A✅ Correct❌ Incorrect
The MBR of a hard disk is a collection of boot records that contain disk information such as disk architecture, cluster size, and so on. The main work of the MBR is to locate and run necessary operating system files that are required to run a hard disk. In the context of the operating system, MBR is also known as the boot loader. Which of the following viruses can infect the MBR of a hard disk?Each correct answer represents a complete solution. Choose two.
#16
Answer: B✅ Correct❌ Incorrect
Which of the following methods is used by forensic investigators to acquire an image over the network in a secure manner?
#17
Answer: C✅ Correct❌ Incorrect
You company suspects an employee of sending unauthorized emails to competitors. These emails are alleged to contain confidential company data. Which of the following is the most important step for you to take in preserving the chain of custody?
#18
Answer: A✅ Correct❌ Incorrect
Which of the following is the correct order of loading system files into the main memory of the system, when the computer is running on Microsoft's Windows XP operating system?
#19
Answer: B✅ Correct❌ Incorrect
Which of the following file systems provides file-level security?
#20
Answer: D✅ Correct❌ Incorrect
Adam works as an Incident Handler for Umbrella Inc. He is informed by the senior authorities that the server of the marketing department has been affected by a malicious hacking attack. Supervisors are also claiming that some sensitive data are also stolen. Adam immediately arrived to the server room of the marketing department and identified the event as an incident. He isolated the infected network from the remaining part of the network and started preparing to image the entire system. He captures volatile data, such as running process, ram, and network connections.Which of the following steps of the incident handling process is being performed by Adam?
#21
Answer: D✅ Correct❌ Incorrect
An executive in your company reports odd behavior on her PDA. After investigation you discover that a trusted device is actually copying data off the PDA. The executive tells you that the behavior started shortly after accepting an e-business card from an unknown person. What type of attack is this?
#22
Answer: B✅ Correct❌ Incorrect
Which of the following two cryptography methods are used by NTFS Encrypting File System (EFS) to encrypt the data stored on a disk on a file-by-file basis?
#23
Answer: A✅ Correct❌ Incorrect
Which of the following switches of the XCOPY command copies attributes while copying files?
#24
Answer: D✅ Correct❌ Incorrect
Mark works as a Network Administrator for Net Perfect Inc. The company has a Linux-based network. Mark installs a Checkpoint Firewall NGX on aSecurePlatform device. He performs a scheduled backup of his system settings and products configuration. Where are these backup files stored?Each correct answer represents a complete solution. Choose all that apply.
#25
Answer: A✅ Correct❌ Incorrect
Which of the following tools are used for footprinting?Each correct answer represents a complete solution. Choose all that apply.
#26
Answer: A✅ Correct❌ Incorrect
John works for an Internet Service Provider (ISP) in the United States. He discovered child pornography material on a Web site hosted by the ISP. John immediately informed law enforcement authorities about this issue. Under which of the following Acts is John bound to take such an action?
#27
Answer: D✅ Correct❌ Incorrect
Adam works as a professional Computer Hacking Forensic Investigator with the local police of his area. A project has been assigned to him to investigate a PDA seized from a local drug dealer. It is expected that many valuable and important information are stored in this PDA. Adam follows investigative methods, which are required to perform in a pre-defined sequential manner for the successful forensic investigation of the PDA. Which of the following is the correct order to perform forensic investigation of PDA?
#28
Answer: D✅ Correct❌ Incorrect
The incident response team has turned the evidence over to the forensic team. Now, it is the time to begin looking for the ways to improve the incident response process for next time. What are the typical areas for improvement?Each correct answer represents a complete solution. Choose all that apply.
#29
Answer: A✅ Correct❌ Incorrect
Nathan works as a professional Ethical Hacker. He wants to see all open TCP/IP and UDP ports of his computer. Nathan uses the netstat command for this purpose but he is still unable to map open ports to the running process with PID, process name, and path. Which of the following commands will Nathan use to accomplish the task?