Labour Day Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

Guidance Software GD0-110 Certification Exam for EnCE Outside North America Exam Practice Test

Demo: 26 questions
Total 174 questions

Certification Exam for EnCE Outside North America Questions and Answers

Question 1

An evidence file was archived onto five CD-Rom disks with the third file segment on disk number three. Can the contents of the third file segment be verified by itself while still on the CD?

Options:

A.

No. All file segments must be put back together.

B.

Yes. Any segment of an evidence file can be verified through re-computing and comparing the CRCs, even if it is on a CD.

C.

No. EnCase cannot verify files on CDs.

D.

No. Archived files are compressed and cannot be verified until un-archived.

Question 2

You are working in a computer forensic lab. A law enforcement investigator brings you a computer and a valid search warrant. You have legal authority to search the computer. The investigator hands you a piece of paper that has three printed checks on it. All three checks have the same check and account number. You image the suspect's computer and open the evidence file with EnCase. You perform a text search for the account number and check number. Nothing returns on the search results. You perform a text search for all other information found on the printed checks and there is still nothing returned in the search results. You run a signature analysis and check the gallery. You cannot locate any graphical copies of the printed checks in the gallery. At this point, is it safe to say that the checks are not located on the suspect computer?

Options:

A.

No. The images could be in an image format not viewable inside EnCase.

B.

No. The images could be located a compressed file.

C.

No. The images could be embedded in a document.

D.

No. The images could be in unallocated clusters.

E.

All of the above.

Question 3

Changing the filename of a file will change the hash value of the file.

Options:

A.

True

B.

False

Question 4

The following GREP expression was typed in exactly as shown. Choose the answer(s) that would result. Bob@[a-z]+.com

Options:

A.

Bob@America.com

B.

Bob@New zealand.com

C.

Bob@a-z.com

D.

Bob@My-Email.com

Question 5

By default, what color does EnCase use for slack?

Options:

A.

Black

B.

Red

C.

Black on red

D.

Red on black

Question 6

The following GREP expression was typed in exactly as shown. Choose the answer(s) that would result. Jan 1 st , 2?0?00

Options:

A.

Jan 1st, 1900

B.

Jan 1st, 2000

C.

Jan 1st, 2001

D.

Jan 1st, 2100

Question 7

The term signature and header as they relate to a signature analysis are:

Options:

A.

Areas compared with each other to verify the correct file type.

B.

Synonymous.

C.

The signature is the file extension. The header is a standard pattern normally found at the beginning of a file.

D.

None of the above

Question 8

The EnCase case file can be best described as:

Options:

A.

The file that runs EnCase for Windows.

B.

A file contain configuration settings for cases.

C.

A file that contains information specific to one case.

D.

None of the above.

Question 9

In Windows, the file MyNote.txt is deleted from C Drive and is automatically sent to the recycle Bin. The long filename was MyNote.txt and the short filename was MYNOTE.TXT. When viewing the recycle Bin with EnCase, how will the long filename and short filename appear?

Options:

A.

MyNote.del, DC0.del

B.

MyNote.txt, CD0.txt

C.

MyNote.txt, DC0.txt

D.

MyNote.del, DC1.del

Question 10

When does the POST operation occur?

Options:

A.

When the power button to a computer is turned on.

B.

After a computer begins to boot from a device.

C.

When Windows starts up.

D.

When SCSI devices are configured.

Question 11

The boot partition table found at the beginning of a hard drive is located in what sector?

Options:

A.

Volume boot record

B.

Master boot record

C.

Master file table

D.

Volume boot sector

Question 12

A physical file size is:

Options:

A.

The total size in bytes of a logical file.

B.

The total size in sectors of an allocated file.

C.

The total size of all the clusters used by the file measured in bytes.

D.

The total size of the file including the ram slack in bytes.

Question 13

In the EnCase environment, the term uxternal viewers is best described as:

Options:

A.

Programs that are exported out of an evidence file.

B.

Programs that are associated with EnCase to open specific file types.

C.

Any program that is loaded on the lab hard drive.

D.

Any program that will work with EnCase.

Question 14

If cluster #3552 entry in the FAT table contains a value of this would mean:

Options:

A.

The cluster is allocated

B.

The cluster is unallocated

C.

The cluster is marked bad

D.

The cluster is the end of a file

Question 15

When can an evidence file containing a NTFS partition be logically restored to a FAT 32 partition?

Options:

A.

When the FAT 32 is the same size or bigger.

B.

When the FAT 32 has the same number of sectors / clusters.

C.

Never

D.

Both a and b

Question 16

Select the appropriate name for the highlighted area of the binary numbers.

Options:

A.

Word

B.

Nibble

C.

Bit

D.

Dword

E.

Byte

Question 17

To later verify the contents of an evidence file?

Options:

A.

EnCase writes an MD5 hash value for every 32 sectors copied.

B.

EnCase writes a CRC value for every 64 sectors copied.

C.

EnCase writes a CRC value for every 128 sectors copied.

D.

EnCase writes an MD5 hash value every 64 sectors copied.

Question 18

You are investigating a case involving fraud. You seized a computer from a suspect who stated that the computer is not used by anyone other than himself. The computer has Windows 98 installed on the hard drive. You find the filename C:\downloads\check01.jpg?that EnCase shows as being moved. The starting extent is 0C4057. You find another filename C:\downloads\chk1.dll with the starting extent 0C4057, which EnCase also shows as being moved. In the C:\windows\System folder you find an allocated file named chk1.dll with the starting extent 0C4057. The chk1.dll file is a JPEG image of a counterfeit check. Could this information be used to refute the suspect claim that he never knew it was on the computer?

Options:

A.

Yes, because the chk1.dll file was moved and renamed.

B.

No, because the Windows operating system likely moved and renamed the chk1.dll file during disk maintenance.

C.

No, because the chk1.dll file has no evidentiary value.

D.

Yes, because the ch1.dll is all the evidence required to prove the case.

Question 19

The temporary folder of a case cannot be changed once it has been set.

Options:

A.

True

B.

False

Question 20

GREP terms are automatically recognized as GREP by EnCase.

Options:

A.

True

B.

False

Question 21

EnCase marks a file as overwritten when _____________ has been allocated to another file.

Options:

A.

any part of the file

B.

all of the file

C.

the starting cluster of the file

D.

the directory entry for the file

Question 22

To generate an MD5 hash value for a file, EnCase:

Options:

A.

Computes the hash value based on the logical file.

B.

Computes the hash value based on the physical file.

C.

Computes the hash value including the logical file and filename.

D.

Computes the hash value including the physical file and filename.

Question 23

A standard DOS 6.22 boot disk is acceptable for booting a suspect drive.

Options:

A.

True

B.

False

Question 24

A logical file would be best described as:

Options:

A.

The data from the beginning of the starting cluster to the length of the file.

B.

The data taken from the starting cluster to the end of the last cluster that is occupied by the file.

C.

A file including any RAM and disk slack.

D.

A file including only RAM slack.

Question 25

You are at an incident scene and determine that a computer contains evidence as described in the search warrant. When you seize the computer, you should:

Options:

A.

Record the location that the computer was recovered from.

B.

Record the identity of the person(s) involved in the seizure.

C.

Record the date and time the computer was seized.

D.

Record nothing to avoid inaccuracies that might jeopardize the use of the evidence.

Question 26

When a non-compressed evidence file is reacquired with compression, the acquisition and verification hash values for the evidence will remain the same for both files.

Options:

A.

True

B.

False

Demo: 26 questions
Total 174 questions