Weekend Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: netbudy65

GD0-100 Certification Exam For ENCE North America Questions and Answers

Questions 4

Which of the following would be a true statement about the function of the BIOS?

Options:

A.

The BIOS integrates compressed executable files with memory addresses for faster execution.

B.

The BIOS is responsible for checking and configuring the system after the power is turned on.

C.

The BIOS is responsible for swapping out memory pages when RAM fills up.

D.

Both a and c.

Buy Now
Questions 5

EnCase can build a hash set of a selected group of files.

Options:

A.

True

B.

False

Buy Now
Questions 6

Which of the following is commonly used to encode e-mail attachments?

Options:

A.

GIF

B.

EMF

C.

JPEG

D.

Base64

Buy Now
Questions 7

An evidence file was archived onto five CD-Rom disks with the third file segment on disk number three. Can the contents of the third file segment be verified by itself while still on the CD?

Options:

A.

No. Archived files are compressed and cannot be verified until un-archived.

B.

No. All file segments must be put back together.

C.

Yes. Any segment of an evidence file can be verified through re-computing and comparing the CRCs, even if it is on a CD.

D.

No. EnCase cannot verify files on CDs.

Buy Now
Questions 8

A logical file would be best described as:

Options:

A.

The data taken from the starting cluster to the end of the last cluster that is occupied by the file.

B.

A file including any RAM and disk slack.

C.

A file including only RAM slack.

D.

The data from the beginning of the starting cluster to the length of the file.

Buy Now
Questions 9

The acronym ASCII stands for:

Options:

A.

American Standard Communication Information Index

B.

American Standard Code for Information Interchange

C.

Accepted Standard Code for Information Interchange

D.

Accepted Standard Communication Information Index

Buy Now
Questions 10

When a non-compressed evidence file is reacquired with compression, the acquisition and verification hash values for the evidence will remain the same for both files.

Options:

A.

True

B.

False

Buy Now
Questions 11

Select the appropriate name for the highlighted area of the binary numbers.

Options:

A.

Byte

B.

Dword

C.

Bit

D.

Word

E.

Nibble

Buy Now
Questions 12

An EnCase evidence file of a hard drive ________ be restored to another hard drive of equal or greater size.

Options:

A.

can

B.

cannot

Buy Now
Questions 13

The EnCase case file can be best described as:

Options:

A.

The file that runs EnCase for Windows.

B.

A filecontain configuration settings for cases.

C.

None of the above.

D.

A file that contains information specific to one case.

Buy Now
Questions 14

How does EnCase verify that the evidence file contains an exact copy of the suspect hard drive? How does

EnCase verify that the evidence file contains an exact copy of the suspect's hard drive?

Options:

A.

By means of a CRC value of the suspect hard drive compared to a CRC value of the data stored in the evidence file.By means of a CRC value of the suspect? hard drive compared to a CRC value of the data stored in the evidence file.

B.

By means of an MD5 hash of the suspect hard drive compared to an MD5 hash of the data stored in the evidence file.By means of an MD5 hash of the suspect? hard drive compared to an MD5 hash of the data stored in the evidence file.

C.

By means of a CRC value of the evidence file itself.

D.

By means of an MD5 hash value of the evidence file itself.

Buy Now
Questions 15

When a file is deleted in the FAT or NTFS file systems, what happens to the data on the hard drive?

Options:

A.

Nothing

B.

It is moved to a special area.

C.

It is overwritten with zeroes.

D.

The file header is marked with a Sigma so the file is not recognized by the operating system.

Buy Now
Questions 16

Using good forensic practices, when seizing a computer at a business running Windows 2000 Server you should:

Options:

A.

Pull the plug from the back of the computer.

B.

Press the power button and hold it in.

C.

Shut it down normally.

D.

Pull the plug from the wall.

Buy Now
Questions 17

The results of a hash analysis on an evidence file that has been added to a case will be stored in which of the following files?

Options:

A.

The evidence file

B.

All of the above

C.

The case file

D.

The configuration HashAnalysis.ini file

Buy Now
Questions 18

Within EnCase for Windows, the search process is:

Options:

A.

a search of the physical disk in unallocated clusters and other unused disk areas

B.

a search of the logical files

C.

None of the above

D.

both a and b

Buy Now
Questions 19

When a document is printed using EMF in Windows, what file(s) are generated in the spooling process?

Options:

A.

The .SHD file

B.

The .SPL file

C.

Neither a or b

D.

Both a and b

Buy Now
Questions 20

Changing the filename of a file will change the hash value of the file.

Options:

A.

True

B.

False

Buy Now
Questions 21

What are the EnCase configuration .ini files used for?

Options:

A.

Storing information that will be available to EnCase each time it is opened, regardless of the active case(s).

B.

Storing the results of a signature analysis.

C.

Storing information that is specific to a particular case.

D.

Storing pointers to acquired evidence.

Buy Now
Questions 22

Consider the following path in a FAT file system:

Options:

A.

From the My Pictures directory

B.

From the My Documents directory

C.

From the root directory c:\

D.

From itself

Buy Now
Questions 23

You are working in a computer forensic lab. A law enforcement investigator brings you a computer and a valid search warrant. You have legal authority to search the computer. The investigator hands you a piece of paper that has three printed checks on it. All three checks have the same check and account number. You image the suspect computer and open the evidence file with EnCase. You checks have the same check and account number. You image the suspect's computer and open the evidence file with EnCase. You perform a text search for the account number and check number. Nothing returns on the search results. You perform a text search for all other information found on the printed checks and there is still nothing returned in the search results. You run a signature analysis and check the gallery. You cannot locate any graphical copies of the printed checks in the gallery. At this point, is it safe to say that the checks are not located on the suspect computer?

Options:

A.

No. The images could be located a compressed file.

B.

No. The images could be embedded in a document.

C.

No. The images could be in unallocated clusters.

D.

No. The images could be in an image format not viewable inside EnCase.

E.

All of the above.

Buy Now
Questions 24

The first sector on a volume is called the:

Options:

A.

Master file table

B.

Volume boot device

C.

Volume boot sector or record

D.

Master boot record

Buy Now
Questions 25

A suspect typed a file on his computer and saved it to a floppy diskette. The filename was MyNote.txt. You receive the floppy and the suspect computer. The suspect denies that the floppy disk belongs to him. You search the suspect computer and locate only the suspect? computer. The suspect denies that the floppy disk belongs to him. You search the suspect? computer and locate only the filename within a .LNK file. The .LNK file is located in the folder C:\Windows\Recent. How you would use the .LNK file to establish a connection between the file on the floppy diskette and the suspect computer? connection between the file on the floppy diskette and the suspect? computer?

Options:

A.

Both a and b

B.

The dates and time of the file found in the .LNK file, at file offset 28

C.

The full path of the file, found in the .LNK file

D.

The file signature found in the .LNK file

Buy Now
Questions 26

EnCase marks a file as overwritten when _____________ has been allocated to another file.

Options:

A.

all of the file

B.

the starting cluster of the file

C.

the directory entry for the file

D.

any part of the file

Buy Now
Exam Code: GD0-100
Exam Name: Certification Exam For ENCE North America
Last Update: May 19, 2024
Questions: 176

PDF + Testing Engine

$130

Testing Engine

$95

PDF (Q&A)

$80