New Year Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

GD0-110 Exam Dumps - Certification Exam for EnCE Outside North America

Go to page:
Question # 17

A hash set would most accurately be described as:

A.

A group of hash libraries organized by category.

B.

A table of file headers and extensions.

C.

A group of hash values that can be added to the hash library.

D.

Both a and b.

Full Access
Question # 18

When an EnCase user double-clicks on a valid .jpg file, that file is:

A.

Copied to the EnCase specified temp folder and opened by an associated program.

B.

Copied to the default export folder and opened by an associated program.

C.

Opened by EnCase.

D.

Renamed to JPG_0001.jpg and copied to the default export folder.

Full Access
Question # 19

When a file is deleted in the FAT or NTFS file systems, what happens to the data on the hard drive?

A.

It is overwritten with zeroes.

B.

It is moved to a special area.

C.

Nothing.

D.

The file header is marked with a Sigma so the file is not recognized by the operating system.

Full Access
Question # 20

A hash library would most accurately be described as:

A.

A file containing hash values from one or more selected hash sets.

B.

A master table of file headers and extensions.

C.

A list of the all the MD5 hash values used to verify the evidence files.

D.

Both a and b.

Full Access
Question # 21

Pressing the power button on a computer that is running could have which of the following results?

A.

The operating system will shut down normally.

B.

The computer will instantly shut off.

C.

The computer will go into stand-by mode.

D.

Nothing will happen.

E.

All of the above could happen.

Full Access
Question # 22

You are at an incident scene and determine that a computer contains evidence as described in the search warrant. When you seize the computer, you should:

A.

Record the location that the computer was recovered from.

B.

Record the identity of the person(s) involved in the seizure.

C.

Record the date and time the computer was seized.

D.

Record nothing to avoid inaccuracies that might jeopardize the use of the evidence.

Full Access
Question # 23

Select the appropriate name for the highlighted area of the binary numbers.

A.

Word

B.

Nibble

C.

Bit

D.

Dword

E.

Byte

Full Access
Question # 24

A physical file size is:

A.

The total size in bytes of a logical file.

B.

The total size in sectors of an allocated file.

C.

The total size of all the clusters used by the file measured in bytes.

D.

The total size of the file including the ram slack in bytes.

Full Access
Go to page: