Q: 1
Sarah, a forensic investigator, is conducting a post-compromise investigation on a company’s server
that contains sensitive dat
a. To ensure the deleted files do not fall into the wrong hands, she follows a media sanitization
procedure. The process involves overwriting the deleted data 6 times with alternating sequences of
0x00 and 0xFF, followed by a final overwrite using the pattern 0xAA.
Which of the following media sanitization standards has Sarah followed in this scenario?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 2
During a forensic investigation on an iOS device, you are tasked with retrieving geolocation data for
various applications and system services. After examining the device, you come across several files.
Which of the following files contains the geolocation data of applications and system services on iOS
devices?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 3
An investigator is reviewing an NTFS file system for evidence of file activity during a cybercrime
investigation. The investigator uses The Sleuth Kit’s fls and mactime tools to extract and analyze
timestamps related to file actions. These timestamps can provide critical insights into the sequence
of events leading up to and during the incident. What kind of file information is the investigator likely
focusing on to reconstruct the timeline?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 4
Alex, a system administrator, is tasked with converting an existing EXT2 file system to an EXT3 file
system on a Linux machine. The EXT2 file system is currently in use, and Alex needs to enable
journaling to convert it to EXT3. Which of the following commands should Alex use to achieve this
conversion?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 5
As a forensic investigator specializing in cybersecurity, you've been assigned to analyze a suspicious
PDF document named “infected.pdf.” This document was discovered on a company server and is
suspected to contain malicious scripts that could pose a threat to the organization's systems and
network. As part of your investigation into the PDF document, what initial step would you take to
identify potential malicious components within the file?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 6
During a network security audit, an investigator is tasked with assessing the security of nearby
wireless networks. The investigator needs to gather real-time information about nearby wireless
access points (APs) and display this data using diagnostic views and charts. The tool should allow
them to visualize details such as signal strength, AP names, and other relevant characteristics of the
networks in the are
a. Which of the following tools would be most appropriate for this task?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 7
During a security audit of a web application, suspicious activity indicative of a directory traversal
attack is detected in the server logs. The attack appears to exploit vulnerabilities to gain
unauthorized access to sensitive files and directories.
In digital forensics, what is the primary objective of investigating a directory traversal attack?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 8
During a forensic investigation into suspicious activities within an organization's AWS environment,
the investigator uses Amazon CloudWatch to adjust the storage duration of specific log data sets. This
action is crucial for managing the lifespan of logs and ensuring that critical logs are preserved for
further analysis during the investigation. Which feature of Amazon CloudWatch is the investigator
using in this scenario?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 9
Sarah, a commuter, relies on her mobile device for entertainment during her daily train ride. She
prefers streaming high-definition videos to pass the time. With her need for seamless and high-
speed data transfer, she benefits greatly from cellular network technology that ensures smooth
streaming without buffering interruptions.
Which cellular network technology would be most suitable for Sarah for her mobile device?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 10
In a country where the government tightly controls internet access, a cybersecurity analyst suspects
that sensitive communications are being monitored. To circumvent this surveillance, the analyst
decides to use the Tor network. However, accessing the Tor network directly is impossible due to
government restrictions. How can the cybersecurity analyst overcome government surveillance and
access the Tor network in this scenario?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Question 1 of 20 · Page 1 / 2