Q: 11
During a digital forensics investigation, an investigator is tasked with collecting data from servers and
shared drives within an organization's infrastructure. The investigator accesses and retrieves relevant
electronic evidence from these central storage locations to assist in the investigation. This data
collection includes files, user logs, and other system artifacts necessary for understanding the scope
of the incident. Which eDiscovery collection methodology is the investigator employing in this
scenario?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 12
Sophia, a network security analyst, is reviewing the logs from a Cisco router in an attempt to identify
suspicious traffic patterns. She encounters a log entry that matches the criteria for an access control
list (ACL) filter, showing that a TCP or UDP packet was detected based on the applied rules. Based on
the log entry description, which of the following is the correct mnemonic for this log message?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 13
Alice, a seasoned iOS developer, dives into her latest project, an immersive gaming app. She delves
into utilizing cutting-edge technologies like OpenGL ES, OpenAL, and AV Foundation. As the lines of
code intertwine with her creativity, she inches closer to realizing her dream of delivering an app that
mesmerizes users on every level. Which layer of the iOS architecture is Alice primarily focusing on for
implementing functionalities?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 14
In a digital forensics investigation, persistent malware is discovered on a compromised system
despite repeated attempts to remove it. The malware reinstalls itself upon system reboot, indicating
sophisticated persistence mechanisms.
In digital forensics, why is identifying malware persistence important?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 15
During a forensic investigation involving an Android device, the investigator needs to establish
communication between the device and a computer running the Android Software Developer Kit
(SDK). This communication will allow the investigator to access system files, logs, and other relevant
data for analysis. To facilitate this, the investigator enables a specific Android developer feature on
the device.
Which feature must be enabled to allow the device to communicate with the workstation running
the Android SDK?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 16
Forensic investigators respond to a smart home burglary. They identify, collect, and preserve IoT
devices, then analyze data from cloud services and synced smartphones. A detailed report is
prepared for court presentation, outlining the investigation process and the evidence collected.
Which stage of the IoT forensic process ensures that evidence integrity is maintained by preventing
alteration before collection?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 17
In a financial institution's computer forensic investigation, suspicious activity reveals unauthorized access to GLBA (Gramm-Leach-Bliley Act)-protected customer data, raising concerns for customer safety. However, identifying the breach's source and extent poses significant challenges, complicating compliance with GLBA guidelines. What steps should be taken in a GLBA-covered computer forensic investigation when unauthorized access to sensitive customer data is discovered?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 18
A digital forensic investigator is tasked with analyzing an NTFS image file extracted from a pen drive.
They leverage The Sleuth Kit (TSK) for this task, specifically utilizing the fsstat command-line tool. By
employing fsstat, they delve into the file system’s intricate details, such as metadata, inode numbers,
and block or cluster information, thereby facilitating a comprehensive examination.
How can an investigator use TSK to analyze disk images?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 19
You're a digital forensic analyst tasked with analyzing a Portable Document Format (PDF) file to
extract information about its structure and contents. Understanding the PDF file structure is essential
for conducting a thorough analysis. What is the component of a PDF file that enables random access
to objects, includes links to all objects within the file, and aids in tracking updates made to the PDF
file?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 20
Forming a specialized cybercrime investigation team for a multinational corporation. Roles assigned
include photographer, incident responder, evidence examiner, and attorney. External support is
enlisted for complex cases. The goal is to identify perpetrators, gather evidence, and ensure justice.
What is a crucial step in forming a specialized cybercrime investigation team?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Question 11 of 20 · Page 2 / 2