Winter Special Sale - Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 575363r9

Welcome To DumpsPedia

GD0-110 Sample Questions Answers

Questions 4

The following keyword was typed in exactly as shown. Choose the answer(s) that would be found. All search criteria have default settings. Tom

Options:

A.

Tomorrow

B.

Tom

C.

Stomp

D.

TomJ@hotmail.com

Buy Now
Questions 5

Select the appropriate name for the highlighted area of the binary numbers.

Options:

A.

Word

B.

Nibble

C.

Bit

D.

Dword

E.

Byte

Buy Now
Questions 6

When a drive letter is assigned to a logical volume, that information is temporarily written the volume boot record on the hard drive.

Options:

A.

True

B.

False

Buy Now
Questions 7

The EnCase case file can be best described as:

Options:

A.

The file that runs EnCase for Windows.

B.

A file contain configuration settings for cases.

C.

A file that contains information specific to one case.

D.

None of the above.

Buy Now
Questions 8

A sector on a hard drive contains how many bytes?

Options:

A.

512

B.

1024

C.

2048

D.

4096

Buy Now
Questions 9

A file extension and signature can be manually added by:

Options:

A.

Using the new set feature under hash sets.

B.

Using the new file signature feature under file signatures.

C.

Using the new library feature under hash libraries.

D.

Right-clicking on a file and selecting add.

Buy Now
Questions 10

Search terms are case sensitive by default.

Options:

A.

True

B.

False

Buy Now
Questions 11

The EnCase default export folder is:

Options:

A.

A global setting that can be changed.

B.

A case-specific setting that can be changed.

C.

A global setting that cannot be changed.

D.

A case-specific setting that cannot be changed.

Buy Now
Questions 12

In Windows 2000 and XP, which of the following directories contain user personal folders?

Options:

A.

C:\Windows\Users

B.

C:\Personnel Folders

C.

C:\Documents and Settings

D.

C:\WINNT\Profiles

Buy Now
Questions 13

4 bits allows what number of possibilities?

Options:

A.

2

B.

4

C.

8

D.

16

Buy Now
Questions 14

A standard Windows 98 boot disk is acceptable for booting a suspect drive.

Options:

A.

True

B.

False

Buy Now
Questions 15

An evidence file was archived onto five CD-Rom disks with the third file segment on disk number three. Can the contents of the third file segment be verified by itself while still on the CD?

Options:

A.

No. All file segments must be put back together.

B.

Yes. Any segment of an evidence file can be verified through re-computing and comparing the CRCs, even if it is on a CD.

C.

No. EnCase cannot verify files on CDs.

D.

No. Archived files are compressed and cannot be verified until un-archived.

Buy Now
Questions 16

How many clusters can a FAT 16 system address?

Options:

A.

4,096

B.

65,536

C.

268,435,456

D.

4,294,967,296

Buy Now
Questions 17

The default export folder remains the same for all cases.

Options:

A.

True

B.

False

Buy Now
Questions 18

The end of a logical file to the end of the cluster that the file ends in is called:

Options:

A.

Unallocated space

B.

Allocated space

C.

Available space

D.

Slack

Buy Now
Questions 19

During the power-up sequence, which of the following happens first?

Options:

A.

The boot sector is located on the hard drive.

B.

The power On Self-Test.

C.

The floppy drive is checked for a diskette.

D.

The BIOS on an add-in card is executed.

Buy Now
Questions 20

If cluster number 10 in the FAT contains the number 55, this means:

Options:

A.

That there is a cross-linked file.

B.

That cluster 10 is used and the file continues in cluster number 55.

C.

The cluster number 55 is the end of an allocated file.

D.

That the file starts in cluster number 55 and continues to cluster number 10.

Buy Now
Questions 21

Select the appropriate name for the highlighted area of the binary numbers.

Options:

A.

Word

B.

Nibble

C.

Bit

D.

Dword

E.

Byte

Buy Now
Questions 22

By default, what color does EnCase use for the contents of a logical file?

Options:

A.

Black

B.

Red

C.

Black on red

D.

Red on black

Buy Now
Questions 23

To undelete a file in the FAT file system, EnCase obtains the starting extent from the:

Options:

A.

FAT

B.

File header

C.

Operating system

D.

Directory entry

Buy Now
Questions 24

Assume that MyNote.txt has been deleted. The FAT file system directory entry for that file has been overwritten. The data for MyNote.txt is now:

Options:

A.

Allocated

B.

Overwritten

C.

Unallocated

D.

Cross-linked

Buy Now
Questions 25

When an EnCase user double-clicks on a file within EnCase what determines the action that will result?

Options:

A.

The settings in the case file.

B.

The setting in the evidence file.

C.

The settings in the FileTypes.ini file.

D.

Both a and b.

Buy Now
Questions 26

EnCase can build a hash set of a selected group of files.

Options:

A.

True

B.

False

Buy Now
Questions 27

When a document is printed using EMF in Windows, what file(s) are generated in the spooling process?

Options:

A.

The .SPL file

B.

The .SHD file

C.

Both a and b

D.

Neither a or b

Buy Now
Questions 28

You are investigating a case involving fraud. You seized a computer from a suspect who stated that the computer is not used by anyone other than himself. The computer has Windows 98 installed on the hard drive. You find the filename C:\downloads\check01.jpg?that EnCase shows as being moved. The starting extent is 0C4057. You find another filename C:\downloads\chk1.dll with the starting extent 0C4057, which EnCase also shows as being moved. In the C:\windows\System folder you find an allocated file named chk1.dll with the starting extent 0C4057. The chk1.dll file is a JPEG image of a counterfeit check. Could this information be used to refute the suspect claim that he never knew it was on the computer?

Options:

A.

Yes, because the chk1.dll file was moved and renamed.

B.

No, because the Windows operating system likely moved and renamed the chk1.dll file during disk maintenance.

C.

No, because the chk1.dll file has no evidentiary value.

D.

Yes, because the ch1.dll is all the evidence required to prove the case.

Buy Now
Questions 29

When a file is deleted in the FAT file system, what happens to the FAT?

Options:

A.

It is deleted as well.

B.

Nothing.

C.

The FAT entries for that file are marked as allocated.

D.

The FAT entries for that file are marked as available.

Buy Now
Questions 30

The Unicode system can address ____ characters?

Options:

A.

256

B.

1024

C.

16,384

D.

65,536

Buy Now
Questions 31

A signature analysis has been run on a case. The result !Bad Signature means:

Options:

A.

The file signature is known and the file extension is known.

B.

The file signature is known and does not match a known file extension.

C.

The file signature is unknown and the file extension is known.

D.

The file signature is known and does not match a known file header.

Buy Now
Questions 32

A personal data assistant was placed in a evidence locker until an examiner has time to examine it. Which of the following areas would require special attention?

Options:

A.

Cross-contamination

B.

Storage

C.

Chain-of-custody

D.

There is no concern

Buy Now
Questions 33

The term signature and header as they relate to a signature analysis are:

Options:

A.

Areas compared with each other to verify the correct file type.

B.

Synonymous.

C.

The signature is the file extension. The header is a standard pattern normally found at the beginning of a file.

D.

None of the above

Buy Now
Questions 34

You are conducting an investigation and have encountered a computer that is running in the field. The operating system is Windows XP. A software program is currently running and is visible on the screen. You should:

Options:

A.

Photograph the screen and pull the plug from the back of the computer.

B.

Navigate through the program and see what the program is all about, then pull the plug.

C.

Pull the plug from the back of the computer.

D.

Pull the plug from the wall.

Buy Now
Questions 35

A hash library would most accurately be described as:

Options:

A.

A file containing hash values from one or more selected hash sets.

B.

A master table of file headers and extensions.

C.

A list of the all the MD5 hash values used to verify the evidence files.

D.

Both a and b.

Buy Now
Questions 36

The following GREP expression was typed in exactly as shown. Choose the answer(s) that would result. [^a-z]Tom[^a-z]

Options:

A.

Stomp

B.

Tomato

C.

Tom

D.

Toms

Buy Now
Questions 37

A sector on a floppy disk is the same size as a sector on a NTFS formatted hard drive.

Options:

A.

True

B.

False

Buy Now
Questions 38

Which of the following is commonly used to encode e-mail attachments?

Options:

A.

JPEG

B.

GIF

C.

EMF

D.

Base64

Buy Now
Questions 39

You are investigating a case involving fraud. You seized a computer from a suspect who stated that the computer is not used by anyone other than himself. The computer has Windows 98 installed on the hard drive. You find the filename C:\downloads\check01.jpg that EnCase shows as being moved. The starting extent is 0C4057. You find another filename :\downloads\chk1.dll with the starting extent 0C4057, which EnCase also shows as being moved. In the C:\Windows\System folder you find an allocated file named chk1.dll with the starting extent 0C4057. The chk1.dll file is a JPEG image of a counterfeit check. What can be deduced from your findings?

Options:

A.

The presence and location of the files is strong evidence the suspect committed the crime.

B.

The presence and location of the files is not strong evidence the suspect committed the crime.

Buy Now
Questions 40

Assume that an evidence file is added to a case, the case is saved, and the case is closed. What happens if the evidence file is moved, and the case is then opened?

Options:

A.

EnCase reports that the file integrity has been compromised and renders the file useless.

B.

EnCase reports a different hash value for the evidence file.

C.

EnCase asks for the location of the evidence file the next time the case is opened.

D.

EnCase opens the case, excluding the moved evidence.

Buy Now
Questions 41

Select the appropriate name for the highlighted area of the binary numbers.

Options:

A.

Word

B.

Nibble

C.

Bit

D.

Dword

E.

Byte

Buy Now
Questions 42

Using good forensic practices, when seizing a computer at a business running Windows 2000 Server you should:

Options:

A.

Shut it down normally.

B.

Pull the plug from the wall.

C.

Pull the plug from the back of the computer.

D.

Press the power button and hold it in.

Buy Now
Questions 43

If an evidence file has been added to a case and completely verified, what happens if the data area within the evidence file is later changed?

Options:

A.

EnCase will detect the error when that area of the evidence file is accessed by the user.

B.

EnCase detect the error if the evidence file is manually re-verified.

C.

EnCase will allow the examiner to continue to access the rest of the evidence file that has not been changed.

D.

All of the above.

Buy Now
Questions 44

A hard drive was imaged using EnCase. The original drive was placed into evidence. The restore feature was used to make a copy of the original hard drive. EnCase verifies the restored copy using:

Options:

A.

An MD5 hash

B.

A 32 bit CRC

C.

A running log

D.

Nothing. Restored volumes are not verified.

Buy Now
Questions 45

How does EnCase verify that the evidence file contains an exact copy of the suspect hard drive?

Options:

A.

By means of an MD5 hash of the suspect hard drive compared to an MD5 hash of the data stored in the evidence file.

B.

By means of a CRC value of the suspect hard drive compared to a CRC value of the data stored in the evidence file.

C.

By means of an MD5 hash value of the evidence file itself.

D.

By means of a CRC value of the evidence file itself.

Buy Now
Questions 46

The MD5 hash algorithm produces a _____ number.

Options:

A.

32 bit

B.

64 bit

C.

128 bit

D.

256 bit

Buy Now
Questions 47

Which of the following statements is more accurate?

Options:

A.

The Recycle Bin increases the chance of locating the existence of a file on a computer.

B.

The Recycle Bin reduces the chance of locating the existence of a file on a computer.

Buy Now
Questions 48

The BIOS chip on an IBM clone computer is most commonly located on:

Options:

A.

The motherboard

B.

The controller card

C.

The microprocessor

D.

The RAM chip

Buy Now
Questions 49

Which of the following selections is NOT found in the case file?

Options:

A.

External viewers

B.

Pointers to evidence files

C.

Signature analysis results

D.

Search results

Buy Now
Questions 50

Before utilizing an analysis technique on computer evidence, the investigator should:

Options:

A.

Be trained in the employment of the technique.

B.

Test the technique on simulated evidence in a controlled environment to confirm that the results are consistent.

C.

Both a and b.

D.

Neither a or b.

Buy Now
Questions 51

If a floppy diskette is in the a drive, the computer will always boot to that drive before any other device.

Options:

A.

True

B.

False

Buy Now
Questions 52

What information in a FAT file system directory entry refers to the location of a file on the hard drive?

Options:

A.

The file size

B.

The file attributes

C.

The starting cluster

D.

The fragmentation settings

Buy Now
Exam Code: GD0-110
Exam Name: Certification Exam for EnCE Outside North America
Last Update: Nov 20, 2024
Questions: 174
$64  $159.99
$48  $119.99
$40  $99.99
buy now GD0-110