Which of the following are you most interested in when trying to trace the source of the message?

You have been asked to investigate after a user has reported a threatening e-mail they have received from an external source. Which of the following are you most interested in when trying to trace the source of the message?A . The X509 Address B. The SMTP reply Address C. The...

January 20, 2023 No Comments READ MORE +

How would you permanently erase the data on the hard disk?

You have completed a forensic investigation case. You would like to destroy the data contained in various disks at the forensics lab due to sensitivity of the case. How would you permanently erase the data on the hard disk?A . Throw the hard disk into the fire B. Run the...

January 20, 2023 No Comments READ MORE +

How would you answer?

You just passed your ECSA exam and are about to start your first consulting job running security audits for a financial institution in Los Angeles. The IT manager of the company you will be working for tries to see if you remember your ECSA class. He asks about the methodology...

January 19, 2023 No Comments READ MORE +

When investigating a Windows System, it is important to view the contents of the page or swap file because:

When investigating a Windows System, it is important to view the contents of the page or swap file because:A . Windows stores all of the systems configuration information in this file B. This is file that windows use to communicate directly with Registry C. A Large volume of data can...

January 19, 2023 No Comments READ MORE +

Which of the following formats correctly specifies these sectors?

You are using DriveSpy, a forensic tool and want to copy 150 sectors where the starting sector is 1709 on the primary hard drive. Which of the following formats correctly specifies these sectors?A . 0:1000, 150 B. 0:1709, 150 C. 1:1709, 150 D. 0:1709-1858View AnswerAnswer: B

January 19, 2023 No Comments READ MORE +

How will the packet get to its proper destination?

A packet is sent to a router that does not have the packet destination address in its route table. How will the packet get to its proper destination?A . Root Internet servers B. Border Gateway Protocol C. Gateway of last resort D. Reverse DNSView AnswerAnswer: C

January 19, 2023 No Comments READ MORE +

What tool should you use?

You work as an IT security auditor hired by a law firm in Boston to test whether you can gain access to sensitive information about the company clients. You have rummaged through their trash and found very little information. You do not want to set off any alarms on their...

January 19, 2023 No Comments READ MORE +

In what state are these ports?

Michael works for Kimball Construction Company as senior security analyst. As part of yearly security audit, Michael scans his network for vulnerabilities. Using Nmap, Michael conducts XMAS scan and most of the ports scanned do not give a response. In what state are these ports?A . Closed B. Open C....

January 18, 2023 No Comments READ MORE +

When using Windows acquisitions tools to acquire digital evidence, it is important to use a well-tested hardware write-blocking device to:

When using Windows acquisitions tools to acquire digital evidence, it is important to use a well-tested hardware write-blocking device to:A . Automate Collection from image files B. Avoiding copying data from the boot partition C. Acquire data from host-protected area on a disk D. Prevent Contamination to the evidence driveView...

January 18, 2023 No Comments READ MORE +

When obtaining a warrant, it is important to:

When obtaining a warrant, it is important to:A . particularlydescribe the place to be searched and particularly describe the items to be seized B. generallydescribe the place to be searched and particularly describe the items to be seized C. generallydescribe the place to be searched and generally describe the items...

January 18, 2023 No Comments READ MORE +