ECCouncil Computer Hacking Forensic Investigator (V8)

Similar documents
KillTest 䊾 䞣 催 ࢭ ད ᅌ㖦䊛 ᅌ㖦䊛 NZZV ]]] QORRZKYZ TKZ ϔᑈܡ䊏 ᮄ ࢭ

Exam Questions EC1-349

Vendor: ECCouncil. Exam Code: EC Exam Name: Computer Hacking Forensic Investigator Exam. Version: Demo

EXAM - CFA-001. Certified Forensic Analyst (CFA) Buy Full Product.

Product Questions: 486 Version: 12.0

Vendor: EC-COUNCIL. Exam Code: v8. Exam Name: Computer Hacking Forensic Investigator Exam. Version: Demo

Course 832 EC-Council Computer Hacking Forensic Investigator (CHFI)

Guide to Computer Forensics and Investigations Fourth Edition. Chapter 6 Working with Windows and DOS Systems

COMPUTER HACKING FORENSIC INVESTIGATOR (CHFI) V9

Wireless Attacks and Countermeasures

ECCouncil v9. ECCouncil Computer Hacking Forensic Investigator (V9)

Computer Forensics: Investigating Data and Image Files, 2nd Edition. Chapter 3 Forensic Investigations Using EnCase

Windows Core Forensics Forensic Toolkit / Password Recovery Toolkit /

Today s challenge on Wireless Networking. David Leung, CISM Solution Consultant, Security Datacraft China/Hong Kong Ltd.

AccessData Advanced Forensics

Certified Digital Forensics Examiner

Guide to Computer Forensics and Investigations Fourth Edition. Chapter 2 Understanding Computer Investigations

Exam Number/Code: Exam Name: Computer Hacking. Version: Demo. Forensic Investigator.

ETHICAL HACKING & COMPUTER FORENSIC SECURITY

Comptia.Certkey.SY0-401.v by.SANFORD.362q. Exam Code: SY Exam Name: CompTIA Security+ Certification Exam

ECCouncil EC Ethical Hacking and Countermeasures V7. Download Full Version :

The following chart provides the breakdown of exam as to the weight of each section of the exam.

NIST SP Notes Guide to Integrating Forensic Techniques into Incident Response

COMPUTER HACKING Forensic Investigator

Chapter Two File Systems. CIS 4000 Intro. to Forensic Computing David McDonald, Ph.D.

Windows Forensics Advanced

Certified Cyber Security Analyst VS-1160

CompTIA A+ Certification ( ) Study Guide Table of Contents

Financial CISM. Certified Information Security Manager (CISM) Download Full Version :

Chapter 24 Wireless Network Security

Machine Language and System Programming

The Xirrus Wi Fi Array XS4, XS8 Security Policy Document Version 1.0. Xirrus, Inc.

Certified Digital Forensics Examiner

When Recognition Matters WHITEPAPER CLFE CERTIFIED LEAD FORENSIC EXAMINER.

Wireless Security. Comp Sci 3600 Security. Attacks WEP WPA/WPA2. Authentication Encryption Vulnerabilities

EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led

Ethical Hacking and Prevention

Exam Questions SY0-401

ANALYSIS AND VALIDATION

and the Forensic Science CC Spring 2007 Prof. Nehru

FRONT RUNNER DIPLOMA PROGRAM Version 8.0 INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months

BraindumpsVCE. Best vce braindumps-exam vce pdf free download

Sources of Evidence. CSF: Forensics Cyber-Security. Part I. Foundations of Digital Forensics. Fall 2015 Nuno Santos

Forensics Challenges. Windows Encrypted Content John Howie CISA CISM CISSP Director, Security Community, Microsoft Corporation

Exactquestions v8 Homer 172q. Exam Code: v8. Exam Name: ECCouncil Computer Hacking Forensic Investigator (V8)

Cyber Security & Ethical Hacking Training. Introduction to Cyber Security Introduction to Cyber Security. Linux Operating System and Networking: LINUX

SINGLE COURSE. NH9000 Certified Ethical Hacker 104 Total Hours. COURSE TITLE: Certified Ethical Hacker

Information Security in Corporation

CEH: CERTIFIED ETHICAL HACKER v9

Wireless Network Security

Curso: Ethical Hacking and Countermeasures

Wireless technology Principles of Security

Securing Information Systems

BraindumpsIT. BraindumpsIT - IT Certification Company provides Braindumps pdf!

Syllabus: The syllabus is broadly structured as follows:

Digital Forensics Practicum CAINE 8.0. Review and User s Guide

CompTIA Security+ Certification

Digital Forensics. Also known as. General definition: Computer forensics or network forensics

OHLONE COLLEGE Ohlone Community College District OFFICIAL COURSE OUTLINE

Advanced Diploma on Information Security

Chapter 7 Forensic Duplication

Guide to Computer Forensics. Third Edition. Chapter 11 Chapter 11 Network Forensics

CNIT 121: Computer Forensics. 9 Network Evidence

DIS10.3:CYBER FORENSICS AND INVESTIGATION

CompTIA Security+ (Exam SY0-401)

Chapter 10: Security. 2. What are the two types of general threats to computer security? Give examples of each.

Basic Wireless Settings on the CVR100W VPN Router

CISSP CEH PKI SECURITY + CEHv9: Certified Ethical Hacker. Upcoming Dates. Course Description. Course Outline

VALLIAMMAI ENGINEERING COLLEGE SRM Nagar, Kattankulathur

This ethical hacking course puts you in the driver's seat of a hands-on environment with a systematic process.

Matt Danner Flashback Data

4. The transport layer

Lecture 33. Firewalls. Firewall Locations in the Network. Castle and Moat Analogy. Firewall Types. Firewall: Illustration. Security April 15, 2005

Course 831 EC-Council Certified Ethical Hacker v10 (CEH)

N exam.420q. Number: N Passing Score: 800 Time Limit: 120 min N CompTIA Network+ Certification

Network Security and Cryptography. December Sample Exam Marking Scheme

n Given a scenario, analyze and interpret output from n A SPAN has the ability to copy network traffic passing n Capacity planning for traffic

CS-435 spring semester Network Technology & Programming Laboratory. Stefanos Papadakis & Manolis Spanakis

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

Incident Response Data Acquisition Guidelines for Investigation Purposes 1

CYBER ATTACKS EXPLAINED: WIRELESS ATTACKS

D. The bank s web server is using an X.509 certificate that is not signed by a root CA, causing the user ID and password to be sent unencrypted.

Pass Microsoft Exam

Chapter 5 Live Data Collection Windows Systems

AURA ACADEMY Training With Expertised Faculty Call Us On For Free Demo

Oct 2007 Version 1.01

Chapter 7 Forensic Duplication

CEH v8 - Certified Ethical Hacker. Course Outline. CEH v8 - Certified Ethical Hacker. 12 May 2018

LESSON 12: WI FI NETWORKS SECURITY

ECCouncil Exam v9 Certified Ethical Hacker Exam V9 Version: 7.0 [ Total Questions: 125 ]

V8 - CEH v8 - Certified Ethical Hacker. Course Outline. CEH v8 - Certified Ethical Hacker. 03 Feb 2018

Course 831 Certified Ethical Hacker v9

TestsDumps. Latest Test Dumps for IT Exam Certification

jk0-022 Exam Questions Demo CompTIA Exam Questions jk0-022

Computer Forensics: Investigating File and Operating Systems, Wireless Networks, and Storage, 2nd Edition. Chapter 5 Windows Forensics II

Cisco Exam Implementing Advanced Cisco Unified Wireless Security v2.0 Version: 9.0 [ Total Questions: 206 ]

Digital Forensics Lecture 01- Disk Forensics

Mobile MOUSe HACKING REVEALED ONLINE COURSE OUTLINE

Certified Ethical Hacker

Outline : Wireless Networks Lecture 10: Management. Management and Control Services : Infrastructure Reminder.

Transcription:

ECCouncil 312-49v8 ECCouncil Computer Hacking Forensic Investigator (V8) Version: 9.0

QUESTION NO: 1 ECCouncil 312-49v8 Exam What is the First Step required in preparing a computer for forensics investigation? A. Do not turn the computer off or on, run any programs, or attempt to access data on a computer B. Secure any relevant media C. Suspend automated document destruction and recycling policies that may pertain to any relevant media or users at Issue D. Identify the type of data you are seeking, the Information you are looking for, and the urgency level of the examination QUESTION NO: 2 Network forensics can be defined as the sniffing, recording, acquisition and analysis of the network traffic and event logs in order to investigate a network security incident. A. True B. False QUESTION NO: 3 Which of the following commands shows you the names of all open shared files on a server and number of file locks on each file? A. Net sessions B. Net file C. Netconfig D. Net share Answer: B 2

QUESTION NO: 4 ECCouncil 312-49v8 Exam The Recycle Bin exists as a metaphor for throwing files away, but it also allows user to retrieve and restore files. Once the file is moved to the recycle bin, a record is added to the log file that exists in the Recycle Bin. Which of the following files contains records that correspond to each deleted file in the Recycle Bin? A. INFO2 file B. INFO1 file C. LOGINFO2 file D. LOGINFO1 file QUESTION NO: 5 Email archiving is a systematic approach to save and protect the data contained in emails so that it can be accessed fast at a later date. There are two main archive types, namely Local Archive and Server Storage Archive. Which of the following statements is correct while dealing with local archives? A. It is difficult to deal with the webmail as there is no offline archive in most cases. So consult your counsel on the case as to the best way to approach and gain access to the required data on servers B. Local archives do not have evidentiary value as the email client may alter the message data C. Local archives should be stored together with the server storage archives in order to be admissible in a court of law D. Server storage archives are the server information and settings stored on a local system whereas the local archives are the local email client information stored on the mail server QUESTION NO: 6 Which of the following email headers specifies an address for mailer-generated errors, like "no such user" bounce messages, to go to (instead of the sender's address)? 3

A. Errors-To header B. Content-Transfer-Encoding header C. Mime-Version header D. Content-Type header ECCouncil 312-49v8 Exam QUESTION NO: 7 Which of the following commands shows you all of the network services running on Windowsbased servers? A. Net start B. Net use C. Net Session D. Net share QUESTION NO: 8 Email archiving is a systematic approach to save and protect the data contained in emails so that it can tie easily accessed at a later date. A. True B. False QUESTION NO: 9 Which of the following commands shows you the NetBIOS name table each? 4

ECCouncil 312-49v8 Exam A. Option A B. Option B C. Option C D. Option D QUESTION NO: 10 Windows Security Accounts Manager (SAM) is a registry file which stores passwords in a hashed format. SAM file in Windows is located at: A. C:\windows\system32\config\SAM B. C:\windows\system32\con\SAM C. C:\windows\system32\Boot\SAM D. C:\windows\system32\drivers\SAM QUESTION NO: 11 FAT32 is a 32-bit version of FAT file system using smaller clusters and results in efficient storage capacity. What is the maximum drive size supported? A. 1 terabytes B. 2 terabytes 5

C. 3 terabytes D. 4 terabytes ECCouncil 312-49v8 Exam Answer: B QUESTION NO: 12 In which step of the computer forensics investigation methodology would you run MD5 checksum on the evidence? A. Obtain search warrant B. Evaluate and secure the scene C. Collect the evidence D. Acquire the data Answer: D QUESTION NO: 13 Network forensics allows Investigators 10 inspect network traffic and logs to identify and locate the attack system Network forensics can reveal: (Select three answers) A. Source of security incidents and network attacks B. Path of the attack C. Intrusion techniques used by attackers D. Hardware configuration of the attacker's system,b,c QUESTION NO: 14 Determine the message length from following hex viewer record: 6

ECCouncil 312-49v8 Exam A. 6E2F B. 13 C. 27 D. 810D Answer: D QUESTION NO: 15 TCP/IP (Transmission Control Protocol/Internet Protocol) is a communication protocol used to connect different hosts in the Internet. It contains four layers, namely the network interface layer. Internet layer, transport layer, and application layer. Which of the following protocols works under the transport layer of TCP/IP? A. UDP B. HTTP C. FTP D. SNMP QUESTION NO: 16 Which of the following statements does not support the case assessment? 7

A. Review the case investigator's request for service B. Identify the legal authority for the forensic examination request C. Do not document the chain of custody D. Discuss whether other forensic processes need to be performed on the evidence Answer: C ECCouncil 312-49v8 Exam QUESTION NO: 17 Wireless access control attacks aim to penetrate a network by evading WLAN access control measures, such as AP MAC filters and Wi-Fi port access controls. Which of the following wireless access control attacks allows the attacker to set up a rogue access point outside the corporate perimeter, and then lure the employees of the organization to connect to it? A. War driving B. Rogue access points C. MAC spoofing D. Client mis-association Answer: D QUESTION NO: 18 File deletion is a way of removing a file from a computer's file system. What happens when a file is deleted in windows7? A. The last letter of a file name is replaced by a hex byte code E5h B. The operating system marks the file's name in the MFT with a special character that indicates that the file has been deleted C. Corresponding clusters in FAT are marked as used D. The computer looks at the clusters occupied by that file and does not avails space to store a new file Answer: B 8

ECCouncil 312-49v8 Exam QUESTION NO: 19 What is cold boot (hard boot)? A. It is the process of starting a computer from a powered-down or off state B. It is the process of restarting a computer that is already turned on through the operating system C. It is the process of shutting down a computer from a powered-on or on state D. It is the process of restarting a computer that is already in sleep mode QUESTION NO: 20 When a file or folder is deleted, the complete path, including the original file name, is stored in a special hidden file called "INF02" in the Recycled folder. If the INF02 file is deleted, it is re-created when you. A. Restart Windows B. Kill the running processes in Windows task manager C. Run the antivirus tool on the system D. Run the anti-spyware tool on the system QUESTION NO: 21 WPA2 provides enterprise and Wi-Fi users with stronger data protection and network access control which of the following encryption algorithm is used DVWPA2? A. RC4-CCMP B. RC4-TKIP C. AES-CCMP D. AES-TKIP Answer: C 9

ECCouncil 312-49v8 Exam QUESTION NO: 22 The disk in the disk drive rotates at high speed, and heads in the disk drive are used only to read data. A. True B. False Answer: B QUESTION NO: 23 What is a bit-stream copy? A. Bit-Stream Copy is a bit-by-bit copy of the original storage medium and exact copy of the original disk B. A bit-stream image is the file that contains the NTFS files and folders of all the data on a disk or partition C. A bit-stream image is the file that contains the FAT32 files and folders of all the data on a disk or partition D. Creating a bit-stream image transfers only non-deleted files from the original disk to the image disk QUESTION NO: 24 System software password cracking is defined as cracking the operating system and all other utilities that enable a computer to function A. True B. False 10