You work as a professional Computer Hacking Forensic Investigator for DataEnet Inc. You want to investigate e-mail information of an employee of the company. The suspected employee is using an online e-mail system such as Hotmail or Yahoo. Which of the following folders on the local computer will you review to accomplish the task?
Each correct answer represents a complete solution. Choose all that apply.
A. History folder
B. Temporary Internet Folder
C. Download folder
D. Cookies folder
Which of the following tools are used for footprinting?
Each correct answer represents a complete solution. Choose all that apply.
A. Sam spade
B. Traceroute
C. Whois
D. Brutus
Which of the following parameters is NOT used for calculating the capacity of the hard disk?
A. Bytes per sector
B. Number of heads
C. Total number of sectors
D. Number of platters
Which of the following prevents malicious programs from attacking a system?
A. Anti-virus program
B. Smart cards
C. Biometric devices
D. Firewall
Adam works as a professional Computer Hacking Forensic Investigator. A project has been assigned to him to investigate the main server of SecureEnet Inc. The server runs on Debian Linux operating system. Adam wants to investigate and review the GRUB configuration file of the server system.
Which of the following files will Adam investigate to accomplish the task?
A. /boot/grub/menu.lst
B. /boot/grub/grub.conf
C. /boot/boot.conf
D. /grub/grub.com
Which of the following file systems is used by both CD and DVD?
A. Network File System (NFS)
B. New Technology File System (NTFS)
C. Compact Disk File System (CDFS)
D. Universal Disk Format (UDF)
Peter works as a Security Administrator for SecureEnet Inc. He observes that the database server of the company has been compromised and the data is stolen. Peter immediately wants to report this crime to the law enforcement authorities. Which of the following organizations looks after the computer crimes investigations in the United States?
A. Federal Bureau of Investigation
B. Local or National office of the US secret service
C. Incident response team
D. National Institute of Standards and Technology
Which of the following cryptographic methods are used in EnCase to ensure the integrity of the data, which is acquired for the investigation? Each correct answer represents a complete solution. Choose two.
A. MD5
B. CRC
C. HAVAL
D. Twofish
What is the name of the Secondary IDE slave, fourth partition in Linux operating system according to the Linux naming convention?
A. SDB3
B. HDC4
C. HDA4
D. HDD4
Adrian, the Network Administrator for Peach Tree Inc., wants to install a new computer on the company's network. He asks his assistant to make a boot disk with minimum files. The boot disk will be used to boot the computer, which does not have an operating system installed, yet. Which of the following files will he include on the disk?
A. IO.SYS, MSDOS.SYS, COMMAND.COM, and AUTOEXEC.BAT.
B. IO.SYS, MSDOS.SYS, and COMMAND.COM.
C. IO.SYS, MSDOS.SYS, COMMAND.COM, and CONFIG.SYS.
D. IO.SYS, MSDOS.SYS, COMMAND.COM, and FDISK.