Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

GD0-100 Exam Dumps - Certification Exam For ENCE North America

Question # 4

Which of the following is found in the FileSignatures.ini configuration file

A.

The results of a hash analysis

B.

The information contained in the signature table

C.

The results of a signature analysis

D.

Pointers to an evidence file

Full Access
Question # 5

A CPU is:

A.

A chip that would be considered the brain of a computer, which is installed on a motherboard.

B.

A Central Programming Unit.

C.

A motherboard with all required devices connected.

D.

An entire computer box, not including the monitor and other attached peripheral devices.

Full Access
Question # 6

When a file is deleted in the FAT or NTFS file systems, what happens to the data on the hard drive?

A.

Nothing

B.

It is moved to a special area.

C.

It is overwritten with zeroes.

D.

The file header is marked with a Sigma so the file is not recognized by the operating system.

Full Access
Question # 7

The BIOS chip on an IBM clone computer is most commonly located on:

A.

The RAM chip

B.

The controller card

C.

The motherboard

D.

The microprocessor

Full Access
Question # 8

When a file is deleted in the FAT file system, what happens to the filename?

A.

It is zeroed out.

B.

The first character of the directory entry is marked with a hex 00.

C.

It is wiped from the directory.

D.

The first character of the directory entry is marked with a hex E5.

Full Access
Question # 9

Search terms are stored in what .ini configuration file

A.

FileSignatures.ini

B.

Keywords.ini

C.

TextStyle.ini

D.

FileTypes.ini

Full Access
Question # 10

The following GREP expression was typed in exactly as shown. Choose the answer(s) that would result.[\x00-\x05]\x00\x00?>[?[@?[?[?[

A.

FF 0000 00 00 FF BA

B.

0000 00 01 FF FF BA

C.

04 06 0000 00 FF FF BA

D.

04 0000 00 FF FF BA

Full Access
Question # 11

This question addresses the EnCase for Windows search process. If a target word is located in the unallocated space, and the word is fragmented between clusters 10 and 15, the search:

A.

Will not find it because the letters of the keyword are not contiguous.

B.

Will not find it because EnCase performs a physical search only.

C.

Will find it because EnCase performs a logical search.

D.

Will not find it unlessile slack?is checked on the search dialog box. Will not find it unless ?ile slack?is checked on the search dialog box.

Full Access
Question # 12

Before utilizing an analysis technique on computer evidence, the investigator should:

A.

Test the technique on simulated evidence in a controlled environment to confirm that the results are consistent.

B.

Be trained in the employment of the technique.

C.

Botha and b.

D.

Neithera or b.

Full Access
Question # 13

The following keyword was typed in exactly as shown. Choose the answer(s) that would be found. All search criteria have default settings. Tom

A.

Tomorrow

B.

TomJ@hotmail.com

C.

Tom

D.

Stomp

Full Access
Question # 14

By default, what color does EnCase use for the contents of a logical file

A.

Red

B.

Red on black

C.

Black

D.

Black on red

Full Access
Question # 15

This question addresses the EnCase for Windows search process. If a target word is within a logical file, and it begins in cluster 10 and ends in cluster 15 (the word is fragmented), the search:

A.

Will not find it unlessile slack is checked on the search dialog box.

B.

Will find it because EnCase performs a logical search.

C.

Will not find it because EnCase performs a physical search only.

D.

Will not find it because the letters of the keyword are not contiguous.

Full Access
Question # 16

When can an evidence file containing a NTFS partition be logically restored to a FAT 32 partition?

A.

Never

B.

When the FAT 32 has the same number of sectors / clusters.

C.

When the FAT 32 is the same size or bigger.

D.

Both a and b

Full Access
Question # 17

When Unicode is selected for a search keyword, EnCase:

A.

Will find the keyword if it is either Unicode or ASCII.

B.

Unicode is not a search option for EnCase.

C.

Will only find the keyword if it is Unicode.

D.

None of the above.

Full Access
Question # 18

A signature analysis has been run on a case. The result ?*JPEG ?in the signature column means:

A.

The file signature is unknown and the header is a JPEG.

B.

The file signature is a JPEG signature and the file extension is incorrect.

C.

The file signature is unknown and the file extension is JPEG.

D.

None of the above.

Full Access
Question # 19

A case file can contain ____ hard drive images?

A.

5

B.

1

C.

any number of

D.

10

Full Access
Question # 20

To generate an MD5 hash value for a file, EnCase:

A.

Computes the hash value including the logical file and filename.

B.

Computes the hash value including the physical file and filename.

C.

Computes the hash value based on the logical file.

D.

Computes the hash value based on the physical file.

Full Access
Question # 21

The EnCase methodology dictates that ________ be created prior to acquiring evidence.

A.

a unique directory on the lab drive for case management

B.

a text file for notes

C.

All of the above

D.

an .E01 file on the lab drive

Full Access
Question # 22

Select the appropriate name for the highlighted area of the binary numbers.

A.

Word

B.

Byte

C.

Bit

D.

Nibble

E.

Dword

Full Access
Question # 23

When a document is printed using EMF in Windows, what file(s) are generated in the spooling process?

A.

The .SHD file

B.

The .SPL file

C.

Neither a or b

D.

Both a and b

Full Access
Question # 24

ROM is an acronym for:

A.

Read Open Memory

B.

Random Open Memory

C.

Read Only Memory

D.

Relative Open Memory

Full Access
Question # 25

RAM is tested during which phase of the power-up sequence?

A.

Pre-POST

B.

After POST

C.

During POST

D.

None of the above.

Full Access
Question # 26

Which statement would most accurately describe a motherboard?

A.

An add-in card that handles allRAM.

B.

Any circuit board, regardless of its function.

C.

The main circuit board that has slots for the microprocessor, RAM, ROM, and add-in cards.

D.

An add-in card that controls all hard drive activity.

Full Access