The MBR of a hard disk is a collection of boot records that contain disk information such as disk architecture, cluster size, and so on. The main work of the MBR is to locate and run necessary operating system files that are required to run a hard disk. In the context of the operating system, MBR is also known as the boot loader. Which of the following viruses can infect the MBR of a hard disk?
Each correct answer represents a complete solution. Choose two.
A. Stealth
B. Boot sector
C. Multipartite
D. File
Adam works as an Incident Handler for Umbrella Inc. He is informed by the senior authorities that the server of the marketing department has been affected by a malicious hacking attack. Supervisors are also claiming that some sensitive data are also stolen. Adam immediately arrived to the server room of the marketing department and identified the event as an incident. He isolated the infected network from the remaining part of the network and started preparing to image the entire system. He captures volatile data, such as running process, ram, and network connections.
Which of the following steps of the incident handling process is being performed by Adam?
A. Recovery
B. Eradication
C. Identification
D. Containment
Peter works as a Computer Hacking Forensic Investigator. He has been called by an organization to conduct a seminar to give necessary information related to sexual harassment within the work place. Peter started with the definition and types of sexual harassment. He then wants to convey that it is important that records of the sexual harassment incidents should be maintained, which helps in further legal prosecution. Which of the following data should be recorded in this documentation?
Each correct answer represents a complete solution. Choose all that apply.
A. Names of the victims
B. Date and time of incident
C. Nature of harassment
D. Location of each incident
Which of the following sections of an investigative report covers the background and summary of the report including the outcome of the case and the list of allegations?
A. Section 2
B. Section 4
C. Section 3
D. Section 1
Adam works as a professional Computer Hacking Forensic Investigator. A project has been assigned to him to investigate the BlackBerry, which is suspected to be used to hide some important information. Which of the following is the first step taken to preserve the information in forensic investigation of the BlackBerry?
A. Keep BlackBerry in 'ON' state.
B. Remove the storage media.
C. Eliminate the ability of the device to receive the push data.
D. Turn off the BlackBerry.
Which of the following prevents malicious programs from attacking a system?
A. Anti-virus program
B. Smart cards
C. Biometric devices
D. Firewall
John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. Which of the following commands will John use to display information about all mounted file systems?
Each correct answer represents a complete solution. Choose all that apply.
A. du
B. ls
C. df
D. df -m
Sarah has created a site on which she publishes a copyrighted material. She is ignorant that she is infringing copyright. Is she guilty under copyright laws?
A. Yes
B. No
John used to work as a Network Administrator for We-are-secure Inc. Now he has resigned from the company for personal reasons. He wants to send out some secret information of the company. To do so, he takes an image file and simply uses a tool image hide and embeds the secret file within an image file of the famous actress, Jennifer Lopez, and sends it to his Yahoo mail id. Since he is using the image file to send the data, the mail server of his company is unable to filter this mail. Which of the following techniques is he performing to accomplish his task?
A. Email spoofing
B. Social engineering
C. Steganography
D. Web ripping
Which of the following directories contains administrative commands on a UNIX computer?
A. /usr/local
B. /sbin
C. /bin
D. /export
You work as a Network Administrator for McNeel Inc. You want to encrypt each user's MY DOCUMENTS folder. You decide to use Encrypting File System (EFS). You plan to write a script for encryption. Which of the following tools will you use to encrypt specified folders?
A. EFSINFO
B. SYSKEY
C. CIPHER
D. Windows Explorer
Which of the following are advantages of NTFS file system over FAT32 and FAT? Each correct answer represents a part of the solution. Choose two.
A. Support for file and folder level permissions.
B. Support for audio files.
C. Support for Encrypting File System (EFS).
D. Support for dual-booting.
Which of the following files in LILO booting process of Linux operating system stores the location of Kernel on the hard drive?
A. /boot/map
B. /boot/boot.b
C. /etc/lilo.conf
D. /sbin/lilo
Which of the following steps should be performed in order to optimize a system performance? Each correct answer represents a complete solution. Choose three.
A. Run anti-spyware program regularly
B. Defragment the hard disk drive
C. Edit registry regularly
D. Delete the temporary files
John works as a contract Ethical Hacker. He has recently got a project to do security checking for www.we-are-secure.com. He wants to find out the operating system of the we-are-secure server in the information gathering step. Which of the following commands will he use to accomplish the task?
Each correct answer represents a complete solution. Choose two.
A. nc 208.100.2.25 23
B. nmap -v -O www.we-are-secure.com
C. nc -v -n 208.100.2.25 80
D. nmap -v -O 208.100.2.25