Labour Day Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: geek65

GD0-110 Certification Exam for EnCE Outside North America Questions and Answers

Questions 4

You are working in a computer forensic lab. A law enforcement investigator brings you a computer and a valid search warrant. You have legal authority to search the computer. The investigator hands you a piece of paper that has three printed checks on it. All three checks have the same check and account number. You image the suspect's computer and open the evidence file with EnCase. You perform a text search for the account number and check number. Nothing returns on the search results. You perform a text search for all other information found on the printed checks and there is still nothing returned in the search results. You run a signature analysis and check the gallery. You cannot locate any graphical copies of the printed checks in the gallery. At this point, is it safe to say that the checks are not located on the suspect computer?

Options:

A.

No. The images could be in an image format not viewable inside EnCase.

B.

No. The images could be located a compressed file.

C.

No. The images could be embedded in a document.

D.

No. The images could be in unallocated clusters.

E.

All of the above.

Buy Now
Questions 5

The EnCase evidence file is best described as:

Options:

A.

A clone of the source hard drive.

B.

A sector-by-sector copy of the source hard drive written to the corresponding sectors of the target hard drive.

C.

A bit stream image of the source hard drive written to the corresponding sectors of the target hard drive.

D.

A bit stream image of the source hard drive written to a file, or several file segments.

Buy Now
Questions 6

When an EnCase user double-clicks on a file within EnCase what determines the action that will result?

Options:

A.

The settings in the case file.

B.

The setting in the evidence file.

C.

The settings in the FileTypes.ini file.

D.

Both a and b.

Buy Now
Questions 7

In Windows 98 and ME, Internet based e-mail, such as Hotmail, will most likely be recovered in the _____________________ folder.

Options:

A.

C:\Windows\Temp

B.

C:\Windows\Temporary Internet files

C.

C:\Windows\History\Email

D.

C:\Windows\Online\Applications\email

Buy Now
Questions 8

Creating an image of a hard drive that was seized as evidence:

Options:

A.

May be done by anyone because it is a relatively simple procedure.

B.

May only be done by trained personnel because the process has the potential to alter the original evidence.

C.

May only be done by computer scientists.

D.

Should be done by the user, as they are most familiar with the hard drive.

Buy Now
Questions 9

EnCase can build a hash set of a selected group of files.

Options:

A.

True

B.

False

Buy Now
Questions 10

When handling computer evidence, an investigator should:

Options:

A.

Avoid making any changes to the original evidence.

B.

Make any changes to the evidence that will further the investigation.

C.

Both a and b

D.

Neither a or b

Buy Now
Questions 11

The following keyword was typed in exactly as shown. Choose the answer(s) that would result. All search criteria have default settings. Tom Jones

Options:

A.

Tom

B.

Jones

C.

Tom Jones

D.

tom jones

Buy Now
Questions 12

In Windows 2000 and XP, which of the following directories contain user personal folders?

Options:

A.

C:\Windows\Users

B.

C:\Personnel Folders

C.

C:\Documents and Settings

D.

C:\WINNT\Profiles

Buy Now
Questions 13

You are conducting an investigation and have encountered a computer that is running in the field. The operating system is Windows XP. A software program is currently running and is visible on the screen. You should:

Options:

A.

Photograph the screen and pull the plug from the back of the computer.

B.

Navigate through the program and see what the program is all about, then pull the plug.

C.

Pull the plug from the back of the computer.

D.

Pull the plug from the wall.

Buy Now
Questions 14

The Unicode system can address ____ characters?

Options:

A.

256

B.

1024

C.

16,384

D.

65,536

Buy Now
Questions 15

Within EnCase, you highlight a range of data within a file. The length indicator displays the value 30. How many bytes have you actually selected?

Options:

A.

3

B.

15

C.

30

D.

60

Buy Now
Questions 16

A hash library would most accurately be described as:

Options:

A.

A file containing hash values from one or more selected hash sets.

B.

A master table of file headers and extensions.

C.

A list of the all the MD5 hash values used to verify the evidence files.

D.

Both a and b.

Buy Now
Questions 17

You are assigned to assist with the search and seizure of several computers. The magistrate ordered that the computers cannot be seized unless they are found to contain any one of ten previously identified images. You currently have the ten images in JPG format. Using the EnCase methodology, how would you best handle this situation?

Options:

A.

Use an EnCase DOS boot disk to conduct a text search for child porn

B.

Use FastBloc or a network/parallel port cable to acquire forensic images of the hard drives, then search the evidence files for the previously identified images.

C.

Use FastBloc or a network/parallel port cable to preview the hard drives. Go to the Gallery view and search for the previously identified images.

D.

Use FastBloc or a network/parallel port cable to preview the hard drives. Conduct a hash analysis of the files on the hard drives, using a hash library containing the hash values of the previously identified images.

Buy Now
Questions 18

You are at an incident scene and determine that a computer contains evidence as described in the search warrant. When you seize the computer, you should:

Options:

A.

Record the location that the computer was recovered from.

B.

Record the identity of the person(s) involved in the seizure.

C.

Record the date and time the computer was seized.

D.

Record nothing to avoid inaccuracies that might jeopardize the use of the evidence.

Buy Now
Questions 19

By default, EnCase will display the data from the end of a logical file, to the end of the cluster, in what color:

Options:

A.

Black

B.

Red

C.

Black on red

D.

Red on black

Buy Now
Questions 20

How are the results of a signature analysis examined?

Options:

A.

By sorting on the signature column in the table view.

B.

By sorting on the hash library column in the table view.

C.

By sorting on the hash sets column in the table view

D.

By sorting on the category column in the table view.

Buy Now
Questions 21

EnCase marks a file as overwritten when _____________ has been allocated to another file.

Options:

A.

any part of the file

B.

all of the file

C.

the starting cluster of the file

D.

the directory entry for the file

Buy Now
Questions 22

Calls to the C:\ volume of the hard drive are not made by DOS when a computer is booted with a standard DOS 6.22 boot disk.

Options:

A.

True

B.

False

Buy Now
Questions 23

Within EnCase, what is purpose of the default export folder?

Options:

A.

This is the folder that will automatically store an evidence file when the acquisition is made in DOS.

B.

This is the folder that temporarily stores all bookmark and search results.

C.

This is the folder used to hold copies of files that are sent to external viewers.

D.

This is the folder that will be automatically selected when the copy/unerase feature is used.

Buy Now
Questions 24

If cluster #3552 entry in the FAT table contains a value of this would mean:

Options:

A.

The cluster is allocated

B.

The cluster is unallocated

C.

The cluster is marked bad

D.

The cluster is the end of a file

Buy Now
Questions 25

Which of the following is found in the FileSignatures.ini configuration file?

Options:

A.

Pointers to an evidence file

B.

The results of a signature analysis

C.

The results of a hash analysis

D.

The information contained in the signature table

Buy Now
Questions 26

The EnCase evidence file logical filename can be changed without affecting the verification of the acquired evidence.

Options:

A.

True

B.

False

Buy Now
Exam Code: GD0-110
Exam Name: Certification Exam for EnCE Outside North America
Last Update: May 5, 2024
Questions: 174
GD0-110 pdf

GD0-110 PDF

$28  $80
GD0-110 Engine

GD0-110 Testing Engine

$33.25  $95
GD0-110 PDF + Engine

GD0-110 PDF + Testing Engine

$45.5  $130