ECCouncil EC0-479 - EC-Council Certified Security Analyst (ECSA)
One technique for hiding information is to change the file extension from the correct one to one that might not be noticed by an investigator. For example, changing a .jpg extension to a .doc extension so that a picture file appears to be a document. What can an investigator examine to verify that a file has the correct extension?
What does mactime, an essential part of the coroner‟s toolkit do?
How many characters long is the fixed-length MD5 algorithm checksum of a critical system file?
E-mail logs contain which of the following information to help you in your investigation? (Select up to 4)
You are contracted to work as a computer forensics investigator for a regional bank that has four 30 TB storage area networks that store customer data. What method would be most efficient for you to acquire digital evidence from this network?
Which part of the Windows Registry contains the user‟s password file?
In a forensic examination of hard drives for digital evidence, what type of user is most likely to have the most file slack to analyze?
Lance wants to place a honeypot on his network. Which of the following would be your recommendations?
The newer Macintosh Operating System is based on:
When examining a file with a Hex Editor, what space does the file header occupy?