Labour Day Special Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

Guidance Software GD0-100 Certification Exam For ENCE North America Exam Practice Test

Page: 1 / 18
Total 176 questions

Certification Exam For ENCE North America Questions and Answers

Question 1

The EnCase methodology dictates that the lab drive for evidence have a __________ prior to making an image.

Options:

A.

FAT 16 partition

B.

NTFS partition

C.

unique volume label

D.

bare, unused partition

Question 2

How many copies of the FAT are located on a FAT 32, Windows 98-formatted partition?

Options:

A.

2

B.

3

C.

1

D.

4

Question 3

The spool files that are created during a print job are __________ after the print job is completed.

Options:

A.

moved

B.

wiped

C.

deleted and wiped

D.

deleted

Question 4

EnCase can build a hash set of a selected group of files.

Options:

A.

True

B.

False

Question 5

You are working in a computer forensic lab. A law enforcement investigator brings you a computer and a valid search warrant. You have legal authority to search the computer. The investigator hands you a piece of paper that has three printed checks on it. All three checks have the same check and account number. You image the suspect computer and open the evidence file with EnCase. You checks have the same check and account number. You image the suspect's computer and open the evidence file with EnCase. You perform a text search for the account number and check number. Nothing returns on the search results. You perform a text search for all other information found on the printed checks and there is still nothing returned in the search results. You run a signature analysis and check the gallery. You cannot locate any graphical copies of the printed checks in the gallery. At this point, is it safe to say that the checks are not located on the suspect computer?

Options:

A.

No. The images could be located a compressed file.

B.

No. The images could be embedded in a document.

C.

No. The images could be in unallocated clusters.

D.

No. The images could be in an image format not viewable inside EnCase.

E.

All of the above.

Question 6

The case number in an evidence file can be changed without causing the verification feature to report an error, if:

Options:

A.

The user utilizes a text editor.

B.

The case information cannot be changed in an evidence file, without causing the verification feature to report an error.

C.

The user utilizes the case information editor within EnCase.

D.

The evidence file is reacquired.

Question 7

The default export folder remains the same for all cases.

Options:

A.

True

B.

False

Question 8

A logical file would be best described as:

Options:

A.

The data taken from the starting cluster to the end of the last cluster that is occupied by the file.

B.

A file including any RAM and disk slack.

C.

A file including only RAM slack.

D.

The data from the beginning of the starting cluster to the length of the file.

Question 9

This question addresses the EnCase for Windows search process. If a target word is within a logical file, and it begins in cluster 10 and ends in cluster 15 (the word is fragmented), the search:

Options:

A.

Will not find it unlessile slack is checked on the search dialog box.

B.

Will find it because EnCase performs a logical search.

C.

Will not find it because EnCase performs a physical search only.

D.

Will not find it because the letters of the keyword are not contiguous.

Question 10

Temp files created by EnCase are deleted when EnCase is properly closed.

Options:

A.

True

B.

False

Question 11

Which statement would most accurately describe a motherboard?

Options:

A.

An add-in card that handles allRAM.

B.

Any circuit board, regardless of its function.

C.

The main circuit board that has slots for the microprocessor, RAM, ROM, and add-in cards.

D.

An add-in card that controls all hard drive activity.

Question 12

The first sector on a hard drive is called the:

Options:

A.

Master file table

B.

Master boot record

C.

Volume boot record

D.

Volume boot sector

Question 13

When an EnCase user double-clicks on a valid .jpg file, that file is:

Options:

A.

Copied to the default export folder and opened by an associated program.

B.

Renamed to JPG_0001.jpg and copied to the default export folder.

C.

Copied to the EnCase specified temp folder and opened by an associated program.

D.

Opened by EnCase.

Question 14

In Windows 2000 and XP, which of the following directories contain user personal folders?

Options:

A.

C:\Personnel Folders

B.

C:\WINNT\Profiles

C.

C:\Windows\Users

D.

C:\Documents and Settings

Question 15

In the FAT file system, the size of a deleted file can be found:

Options:

A.

In the FAT

B.

In the directory entry

C.

In the file footer

D.

In the file header

Question 16

Which is the proper formula for determining the size in bytes of a hard drive that uses cylinders (C), heads (H), and sectors (S) geometry?

Options:

A.

C X H + S

B.

C X H X S + 512

C.

C X H X S X 512

D.

C X H X S

Question 17

In Windows, the file MyNote.txt is deleted from C Drive and is automatically sent to the Recycle Bin. The long filename was MyNote.txt and the short filename was MYNOTE.TXT. When viewing the Recycle Bin with EnCase, how will the long filename and MyNote.txt and the short filename was MYNOTE.TXT?

Options:

A.

MyNote.txt, CD0.txt

B.

MyNote.txt, DC0.txt

C.

MyNote.del, DC1.del

D.

MyNote.del, DC0.del

Question 18

Changing the filename of a file will change the hash value of the file.

Options:

A.

True

B.

False

Question 19

The following GREP expression was typed in exactly as shown. Choose the answer(s) that would result. Bob@ [a-z]+.com

Options:

A.

Bob@New zealand.com

B.

Bob@My-Email.com

C.

Bob@America.com

D.

Bob@a-z.com

Question 20

A signature analysis has been run on a case. The result "Bad Signature " means:

Options:

A.

The file signature is known and does not match a known file header.

B.

The file signature is known and the file extension is known.

C.

The file signature is known and does not match a known file extension.

D.

The file signature is unknown and the file extension is known.

Question 21

EnCase can build a hash set of a selected group of files.

Options:

A.

True

B.

False

Question 22

The following GREP expression was typed in exactly as shown. Choose the answer(s) that would result.[\x00-\x05]\x00\x00?>[?[@?[?[?[

Options:

A.

FF 0000 00 00 FF BA

B.

0000 00 01 FF FF BA

C.

04 06 0000 00 FF FF BA

D.

04 0000 00 FF FF BA

Question 23

The temporary folder of a case cannot be changed once it has been set.

Options:

A.

False

B.

True

Question 24

Assume that MyNote.txt has been deleted. The FAT file system directory entry for that file has been overwritten.

The data for MyNote.txt is now:

Options:

A.

Overwritten

B.

Allocated

C.

Cross-linked

D.

Unallocated

Question 25

A personal data assistant was placed in a evidence locker until an examiner has time to examine it. Which of the following areas would require special attention?

Options:

A.

Chain-of-custody

B.

Storage

C.

There is no concern

D.

Cross-contamination

Question 26

The case file should be archived with the evidence files at the termination of a case.

Options:

A.

True

B.

False

Page: 1 / 18
Total 176 questions