Which of the following Windows system files is created in the system drive after OS installation to support the internal functions and system service dispatch stubs to executive functions?
Philip, a forensic officer, was tasked with investigating a crime scene. In this process, he created bit-by-bit copies of the suspect drive and retrieved all the disk images using the dd command.
Which of the following data acquisition image formats is extracted by Philip in the above scenario?
Which of the following techniques is defined as the art of hiding data “behind” other data without the target’s knowledge, thereby hiding the existence of the message itself?
A government organization decided to establish a computer forensics lab to perform transparent investigation processes on highly sensitive cases. The organization also decided to establish strong physical security around the premises of the forensics lab.
Which of the following security measures helps the organization in providing strong physical security to the forensics lab?
Bob, a forensic investigator, was instructed to review a Windows machine and identify any anonymous activities performed using it. In this process, Bob used the command “netstat -ano” to view all the active connections in the system and determined that the connections established by the Tor browser were closed.
Which of the following states of the connections established by Tor indicates that the Tor browser is closed?
Which of the following measures is defined as the time to move read or write disc heads from one point to another on the disk?
Kane, an investigation specialist, was appointed to investigate an incident in an organization's network. In this process, Kane executed a command and identified that a network interface is running in the promiscuous mode and is allowing all incoming packets without any restriction.
In the above scenario, which of the following commands did Kane use to check whether the network interface is set to the promiscuous mode?
In which of the following attacks does an attacker trick high-profile executives such as CEOs, CFOs, politicians, and celebrities to reveal critical corporate and personal information through email or website spoofing?
Which of the following file systems of Windows replaces the first letter of a deleted file name with the hex byte code “e5h”?
Which of the following files belonging to the Extensible Storage Engine (ESE) stores the mail data in Microsoft Exchange Server?
Alice and John are close college friends. Alice frequently sends emails to John attaching her pics with friends. One day, Alice sent an email to John describing all the details related to the final year project without specifying the actual purpose. John missed the message as he frequently receives emails from her and did not arrive for a project seminar.
Which of the following email fields could Alice have used in the above scenario to highlight the importance of the email?
Which of the following tools helps forensic experts analyze user activity in the Microsoft Edge browser?
Identify the investigation team member who is responsible for evidence gathered at the crime scene and maintains a record of the evidence, making it admissible in a court of law.
Jennifer, a forensics investigation team member, was inspecting a compromised system. After gathering all the evidence related to the compromised system, she disconnected the system from the network to stop the spread of the incident to other systems.
Identify the role played by Jennifer in the forensics investigation.
Cooper, a forensic analyst, was examining a RAM dump extracted from a Linux system. In this process, he employed an automated tool, Volatility Framework, to identify any malicious code hidden inside the memory.
Which of the following plugins of the Volatility Framework helps Cooper detect hidden or injected files in the memory?
Which of the following folders of macOS stores all the files, documents, applications, library folders, etc. pertaining to a particular user?
Williams, a forensic specialist, was tasked with performing a static malware analysis on a suspect system in an organization. For this purpose, Williams used an automated tool to perform a string search and saved all the identified strings in a text file. After analyzing the strings, he determined all the harmful actions that were performed by malware.
Identify the tool employed by Williams in the above scenario.
Michael, a forensic expert, was assigned to investigate an incident that involved unauthorized intrusion attempts. In this process, Michael identified all the open ports on a system and disabled them because these open ports can allow attackers to install malicious services and compromise the security of the system or network.
Which of the following commands assisted Michael in identifying open ports in the above scenario?
In which of the following malware distribution techniques does the attacker use tactics such as keyword stuffing, doorway pages, page swapping, and adding unrelated keywords to improve the search-engine ranking of their malware pages?