Labour Day Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Guidance Software > EnCE > GD0-100

GD0-100 Certification Exam For ENCE North America Question and Answers

Question # 4

If a hard drive is left in a room while acquiring, and several persons have access to that room, which of the following areas would be of most concern?

A.

Storage

B.

There is no concern

C.

Cross-contamination

D.

Chain-of-custody

Full Access
Question # 5

The following keyword was typed in exactly as shown. Choose the answer(s) that would be found. All search criteria have default settings. Tom

A.

Tomorrow

B.

TomJ@hotmail.com

C.

Tom

D.

Stomp

Full Access
Question # 6

Before utilizing an analysis technique on computer evidence, the investigator should:

A.

Test the technique on simulated evidence in a controlled environment to confirm that the results are consistent.

B.

Be trained in the employment of the technique.

C.

Botha and b.

D.

Neithera or b.

Full Access
Question # 7

The case file should be archived with the evidence files at the termination of a case.

A.

True

B.

False

Full Access
Question # 8

EnCase marks a file as overwritten when _____________ has been allocated to another file.

A.

all of the file

B.

the starting cluster of the file

C.

the directory entry for the file

D.

any part of the file

Full Access
Question # 9

The MD5 hash algorithm produces a _____ number.

A.

32 bit

B.

256 bit

C.

64 bit

D.

128 bit

Full Access
Question # 10

Which of the following items could contain digital evidence?

A.

Credit card readers

B.

Personal assistant devices

C.

Cellular phones

D.

Digital cameras

Full Access
Question # 11

A sector on a hard drive contains how many bytes?

A.

2048

B.

4096

C.

1024

D.

512

Full Access
Question # 12

If a floppy diskette is in the ?drive, the computer will always boot to that drive before any other device. If a floppy diskette is in the ??drive, the computer will always boot to that drive before any other device.

A.

False

B.

True

Full Access
Question # 13

This question addresses the EnCase for Windows search process. If a target word is within a logical file, and it begins in cluster 10 and ends in cluster 15 (the word is fragmented), the search:

A.

Will not find it unlessile slack is checked on the search dialog box.

B.

Will find it because EnCase performs a logical search.

C.

Will not find it because EnCase performs a physical search only.

D.

Will not find it because the letters of the keyword are not contiguous.

Full Access
Question # 14

Consider the following path in a FAT file system:

A.

From the My Pictures directory

B.

From the My Documents directory

C.

From the root directory c:\

D.

From itself

Full Access
Question # 15

A sector on a floppy disk is the same size as a sector on a NTFS formatted hard drive.

A.

False

B.

True

Full Access
Question # 16

Using good forensic practices, when seizing a computer at a business running Windows 2000 Server you should:

A.

Pull the plug from the back of the computer.

B.

Press the power button and hold it in.

C.

Shut it down normally.

D.

Pull the plug from the wall.

Full Access
Question # 17

A hard drive was imaged using EnCase. The original drive was placed into evidence. The restore feature was used to make a copy of the original hard drive. EnCase verifies the restored copy using:

A.

An MD5 hash

B.

A 32 bit CRC

C.

Nothing. Restored volumes are not verified.

D.

A running log

Full Access
Question # 18

You are working in a computer forensic lab. A law enforcement investigator brings you a computer and a valid search warrant. You have legal authority to search the computer. The investigator hands you a piece of paper that has three printed checks on it. All three checks have the same check and account number. You image the suspect computer and open the evidence file with EnCase. You checks have the same check and account number. You image the suspect's computer and open the evidence file with EnCase. You perform a text search for the account number and check number. Nothing returns on the search results. You perform a text search for all other information found on the printed checks and there is still nothing returned in the search results. You run a signature analysis and check the gallery. You cannot locate any graphical copies of the printed checks in the gallery. At this point, is it safe to say that the checks are not located on the suspect computer?

A.

No. The images could be located a compressed file.

B.

No. The images could be embedded in a document.

C.

No. The images could be in unallocated clusters.

D.

No. The images could be in an image format not viewable inside EnCase.

E.

All of the above.

Full Access
Question # 19

An evidence file can be moved to another directory without changing the file verification.

A.

False

B.

True

Full Access
Question # 20

To undelete a file in the FAT file system, EnCase obtains the starting extent from the:

A.

Directory entry

B.

FAT

C.

Operating system

D.

File header

Full Access
Question # 21

What information should be obtained from the BIOS during computer forensic investigations?

A.

The video caching information

B.

The date and time

C.

The port assigned to the serial port

D.

The boot sequence

Full Access
Question # 22

Search results are found in which of the following files? Select all that apply.

A.

The evidence file

B.

The configuration Searches.ini file

C.

The case file

Full Access
Question # 23

When handling computer evidence, an investigator should:

A.

Make any changes to the evidence that will further the investigation.

B.

Avoid making any changes to the original evidence.

C.

Both a and b

D.

Neither a or b

Full Access
Question # 24

In DOS and Windows, how many bytes are in one FAT directory entry?

A.

Variable

B.

32

C.

16

D.

64

E.

8

Full Access
Question # 25

In Windows 98 and ME, Internet based e-mail, such as Hotmail, will most likely be recovered in the _____________________ folder.

A.

C:\Windows\Online\Applications\email

B.

C:\Windows\Temporary Internet files

C.

C:\Windows\History\Email

D.

C:\Windows\Temp

Full Access
Question # 26

Temp files created by EnCase are deleted when EnCase is properly closed.

A.

True

B.

False

Full Access