Join the discussion
Question 1/186
Kyle is performing the final testing of an application he developed for the accounting department.
His last round of testing is to ensure that the program is as secure as possible. Kyle runs the following command. What is he testing at this point?
#include #include int main(int argc, char
*argv[]) { char buffer[10]; if (argc < 2) { fprintf (stderr, "USAGE: %s string\n", argv[0]); return 1; } strcpy(buffer, argv[1]); return 0; }
His last round of testing is to ensure that the program is as secure as possible. Kyle runs the following command. What is he testing at this point?
#include #include int main(int argc, char
*argv[]) { char buffer[10]; if (argc < 2) { fprintf (stderr, "USAGE: %s string\n", argv[0]); return 1; } strcpy(buffer, argv[1]); return 0; }
Correct Answer: D
Add Comments
- Other Question (186q)
- Q1. Kyle is performing the final testing of an application he developed for the accounting dep...
- Q2. How many characters long is the fixed-length MD5 algorithm checksum of a critical system f...
- Q3. In the following directory listing, (Exhibit) Which file should be used to restore archive...
- Q4. The rule of thumb when shutting down a system is to pull the power plug. However, it has c...
- Q5. Dumpster Diving refers to:
- Q6. You are working as Computer Forensics investigator and are called by the owner of an accou...
- Q7. Which of the following refers to the data that might still exist in a cluster even though ...
- Q8. John is working as a computer forensics investigator for a consulting firm in Canada. He i...
- Q9. What is the CIDR from the following screenshot? (Exhibit)...
- Q10. A forensics investigator is searching the hard drive of a computer for files that were rec...
- Q11. You are conducting an investigation of fraudulent claims in an insurance company that invo...
- Q12. When collecting electronic evidence at the crime scene, the collection should proceed from...
- Q13. After passing her CEH exam, Carol wants to ensure that her network is completely secure. S...
- Q14. When examining a hard disk without a write-blocker, you should not start windows because W...
- Q15. Graphics Interchange Format (GIF) is a ___________RGB bitmap Image format for Images with ...
- Q16. Diskcopy is:
- Q17. This is original file structure database that Microsoft originally designed for floppy dis...
- Q18. After passively scanning the network of Department of Defense (DoD), you switch over to ac...
- Q19. Bob has been trying to penetrate a remote production system for the past two weeks. This t...
- Q20. In the following email header, where did the email first originate from? (Exhibit)...
- Q21. The newer Macintosh Operating System is based on:...
- Q22. What technique is used by JPEGs for compression?...
- Q23. A small law firm located in the Midwest has possibly been breached by a computer hacker lo...
- Q24. Jacob is a computer forensics investigator with over 10 years experience in investigations...
- Q25. Cylie is investigating a network breach at a state organization in Florida. She discovers ...
- Q26. Heather, a computer forensics investigator, is assisting a group of investigators working ...
- Q27. Which legal document allows law enforcement to search an office, place of business, or oth...
- Q28. A picture file is recovered from a computer under investigation. During the investigation ...
- Q29. After attending a CEH security seminar, you make a list of changes you would like to perfo...
- Q30. What does mactime, an essential part of the coroner's toolkit do?...
- Q31. A(n) _____________________ is one that's performed by a computer program rather than the a...
- Q32. Before you are called to testify as an expert, what must an attorney do first?...
- Q33. A forensics investigator needs to copy data from a computer to some type of removable medi...
- Q34. What layer of the OSI model do TCP and UDP utilize?...
- Q35. What is a chain of custody?
- Q36. In Microsoft file structures, sectors are grouped together to form:...
- Q37. When conducting computer forensic analysis, you must guard against ______________ So that ...
- Q38. Buffer Overflow occurs when an application writes more data to a block of memory, or buffe...
- Q39. You setup SNMP in multiple offices of your company. Your SNMP software manager is not rece...
- Q40. If you plan to startup a suspect's computer, you must modify the ___________ to ensure tha...
- Q41. You have been asked to investigate after a user has reported a threatening e-mail they hav...
- Q42. In conducting a computer abuse investigation you become aware that the suspect of the inve...
- Q43. Which of the following passwords are sent over the wire (and wireless) network, or stored ...
- Q44. When reviewing web logs, you see an entry for resource not found in the HTTP status code f...
- Q45. Microsoft Security IDs are available in Windows Registry Editor. The path to locate IDs in...
- Q46. The following excerpt is taken from a honeypot log that was hosted at lab.wiretrip.net. Sn...
- Q47. When NTFS Is formatted, the format program assigns the __________ sectors to the boot sect...
- Q48. Why is it Important to consider health and safety factors in the work carried out at all s...
- Q49. Office Documents (Word, Excel and PowerPoint) contain a code that allows tracking the MAC ...
- Q50. Identify the attack from following sequence of actions? Step 1: A user logs in to a truste...
- Q51. A mobile operating system is the operating system that operates a mobile device like a mob...
- Q52. To make sure the evidence you recover and analyze with computer forensics software can be ...
- Q53. The use of warning banners helps a company avoid litigation by overcoming an employees ass...
- Q54. Harold is a security analyst who has just run the rdisk /s command to grab the backup SAM ...
- Q55. While presenting his case to the court, Simon calls many witnesses to the stand to testify...
- Q56. What will the following command accomplish? C:\> nmap -v -sS -Po 172.16.28.251 - data_l...
- Q57. What is the CIDR from the following screenshot? (Exhibit)...
- Q58. Larry is an IT consultant who works for corporations and government agencies. Larry plans ...
- Q59. John is using Firewalk to test the security of his Cisco PIX firewall. He is also utilizin...
- Q60. Microsoft Outlook maintains email messages in a proprietary format in what type of file?...
- Q61. When monitoring for both intrusion and security events between multiple computers, it is e...
- Q62. You are contracted to work as a computer forensics investigator for a regional bank that h...
- Q63. Why would you need to find out the gateway of a device when investigating a wireless attac...
- Q64. You are a security analyst performing a penetration tests for a company in the Midwest. Af...
- Q65. During an investigation, an employee was found to have deleted harassing emails that were ...
- Q66. Which of the following commands shows you the username and IP address used to access the s...
- Q67. Deposition enables opposing counsel to preview an expert witness's testimony at trial. Whi...
- Q68. First responder is a person who arrives first at the crime scene and accesses the victim's...
- Q69. You are assisting in the investigation of a possible Web Server Hack. The company who call...
- Q70. Harold is a computer forensics investigator working for a consulting firm out of Atlanta G...
- Q71. Volatile information can be easily modified or lost when the system is shut down or reboot...
- Q72. When should an MD5 hash check be performed when processing evidence?...
- Q73. Smith, an employee of a reputed forensic Investigation firm, has been hired by a private o...
- Q74. What does the superblock in Linux define?
- Q75. Jonathan is a network administrator who is currently testing the internal security of his ...
- Q76. When performing a forensics analysis, what device is used to prevent the system from recor...
- Q77. Why should you note all cable connections for a computer you want to seize as evidence?...
- Q78. Under which Federal Statutes does FBI investigate for computer crimes involving e-mail sca...
- Q79. The MD5 program is used to:
- Q80. An on-site incident response team is called to investigate an alleged case of computer tam...
- Q81. John is working on his company policies and guidelines. The section he is currently workin...
- Q82. How many sectors will a 125 KB file use in a FAT32 file system?...
- Q83. Harold is a computer forensics investigator working for a consulting firm out of Atlanta G...
- Q84. You are a security analyst performing reconnaissance on a company you will be carrying out...
- Q85. In the following directory listing, (Exhibit) which file should be used to restore archive...
- Q86. Determine the message length from following hex viewer record: (Exhibit)...
- Q87. In a FAT32 system, a 123 KB file will use how many sectors?...
- Q88. You are trying to locate Microsoft Outlook Web Access Default Portal using Google search o...
- Q89. What will the following command accomplish?
- Q90. When a router receives an update for its routing table, what is the metric value change to...
- Q91. A picture file is recovered from a computer under investigation. During the investigation ...
- Q92. When investigating a network that uses DHCP to assign IP addresses, where would you look t...
- Q93. Why would you need to find out the gateway of a device when investigating a wireless attac...
- Q94. The rule of thumb when shutting down a system is to pull the power plug. However, it has c...
- Q95. Software firewalls work at which layer of the OSI model?...
- Q96. In a forensic examination of hard drives for digital evidence, what type of user is most l...
- Q97. Jason has set up a honeypot environment by creating a DMZ that has no physical or logical ...
- Q98. Meyer Electronics Systems just recently had a number of laptops stolen out of their office...
- Q99. Heather, a computer forensics investigator, is assisting a group of investigators working ...
- Q100. Which one of the following statements is not correct while preparing for testimony?...
- Q101. Which of the following statements is incorrect related to acquiring electronic evidence at...
- Q102. Which of the following statements is incorrect when preserving digital evidence?...
- Q103. What is kept in the following directory? HKLM\SECURITY\Policy\Secrets...
- Q104. Study the log given below and answer the following question: Apr 24 14:46:46 [4663]: spp_p...
- Q105. Data Acquisition is the process of imaging or otherwise obtaining information from a digit...
- Q106. When an investigator contacts by telephone the domain administrator or controller listed b...
- Q107. Ever-changing advancement or mobile devices increases the complexity of mobile device exam...
- Q108. The following excerpt is taken from a honeypot log. The log captures activities across thr...
- Q109. The newer Macintosh Operating System (MacOS X) is based on:...
- Q110. Click on the Exhibit Button To test your website for vulnerabilities, you type in a Quotat...
- Q111. Lance wants to place a honeypot on his network. Which of the following would be your recom...
- Q112. In General, __________________ Involves the investigation of data that can be retrieved fr...
- Q113. What file is processed at the end of a Windows XP boot to initialize the logon dialog box?...
- Q114. You are working as Computer Forensics investigator and are called by the owner of an accou...
- Q115. How many sectors will a 125 KB file use in a FAT32 file system?...
- Q116. Data acquisition system is a combination of tools or processes used to gather, analyze and...
- Q117. What feature of Decryption Collection allows an investigator to crack a password as quickl...
- Q118. What advantage does the tool Evidor have over the built-in Windows search?...
- Q119. An Employee is suspected of stealing proprietary information belonging to your company tha...
- Q120. Digital evidence validation involves using a hashing algorithm utility to create a binary ...
- Q121. To preserve digital evidence, an investigator should ____________...
- Q122. Harold is a computer forensics investigator working for a consulting firm out of Atlanta G...
- Q123. Hash injection attack allows attackers to inject a compromised hash into a local session a...
- Q124. How many sectors will a 125 KB file use in a FAT32 file system?...
- Q125. What file structure database would you expect to find on floppy disks?...
- Q126. All the Information about the user activity on the network, like details about login and l...
- Q127. You are contracted to work as a computer forensics investigator for a regional bank that h...
- Q128. Which of the following file system is used by Mac OS X?...
- Q129. This type of testimony is presented by someone who does the actual fieldwork and does not ...
- Q130. While looking through the IIS log file of a web server, you find the following entries: (E...
- Q131. How often must a company keep log files for them to be admissible in a court of law?...
- Q132. When operating systems mark a cluster as used but not allocated, the cluster is considered...
- Q133. A packet is sent to a router that does not have the packet destination address in its rout...
- Q134. Which of the following password cracking techniques works like a dictionary attack, but ad...
- Q135. What operating system would respond to the following command?...
- Q136. You are called in to assist the police in an investigation involving a suspected drug deal...
- Q137. You work as an IT security auditor hired by a law firm in Boston to test whether you can g...
- Q138. A computer forensics investigator is inspecting the firewall logs for a large financial in...
- Q139. When examining the log files from a Windows IIS Web Server, how often is a new log file cr...
- Q140. You are trying to locate Microsoft Outlook Web Access Default Portal using Google search o...
- Q141. While working for a prosecutor, what do you think you should do if the evidence you found ...
- Q142. Harold is a security analyst who has just run the rdisk /s command to grab the backup SAM ...
- Q143. Which response organization tracks hoaxes as well as viruses?...
- Q144. What file is processed at the end of a Windows XP boot to initialize the logon dialog box?...
- Q145. What type of file is represented by a colon (:) with a name following it in the Master Fil...
- Q146. Quality of a raster Image is determined by the _________________and the amount of informat...
- Q147. An investigator is searching through the firewall logs of a company and notices ICMP packe...
- Q148. Which response organization tracks hoaxes as well as viruses?...
- Q149. What is the first step that needs to be carried out to crack the password?...
- Q150. Data files from original evidence should be used for forensics analysis...
- Q151. Using Internet logging software to investigate a case of malicious use of computers, the i...
- Q152. BMP (Bitmap) is a standard file format for computers running the Windows operating system....
- Q153. While looking through the IIS log file of a web server, you find the following entries: (E...
- Q154. Jack Smith is a forensics investigator who works for Mason Computer Investigation Services...
- Q155. You are working for a large clothing manufacturer as a computer forensics investigator and...
- Q156. SMTP (Simple Mail Transfer protocol) receives outgoing mail from clients and validates sou...
- Q157. George is the network administrator of a large Internet company on the west coast. Per cor...
- Q158. Travis, a computer forensics investigator, is finishing up a case he has been working on f...
- Q159. Which of the following Wi-Fi chalking methods refers to drawing symbols in public places t...
- Q160. What header field in the TCP/IP protocol stack involves the hacker exploit known as the Pi...
- Q161. On an Active Directory network using NTLM authentication, where on the domain controllers ...
- Q162. With the standard Linux second extended file system (Ext2fs), a file is deleted when the i...
- Q163. During the seizure of digital evidence, the suspect can be allowed touch the computer syst...
- Q164. LBA (Logical Block Address) addresses data by allotting a ___________to each sector of the...
- Q165. ____________________ is simply the application of Computer Investigation and analysis tech...
- Q166. What is a bit-stream copy?
- Q167. What operating system would respond to the following command? C:\> nmap -sW 10.10.145.6...
- Q168. An investigator is searching through the firewall logs of a company and notices ICMP packe...
- Q169. Digital evidence is not fragile in nature.
- Q170. When examining a file with a Hex Editor, what space does the file header occupy?...
- Q171. When using Windows acquisitions tools to acquire digital evidence, it is important to use ...
- Q172. Netstat is a tool for collecting Information regarding network connections. It provides a ...
- Q173. An image is an artifact that reproduces the likeness of some subject. These are produced b...
- Q174. Law enforcement officers are conducting a legal search for which a valid warrant was obtai...
- Q175. Your company's network just finished going through a SAS 70 audit. This audit reported tha...
- Q176. Which of the following standard is based on a legal precedent regarding the admissibility ...
- Q177. You have been asked to investigate the possibility of computer fraud in the finance depart...
- Q178. Event correlation is a procedure that is assigned with a new meaning for a set of events t...
- Q179. An "idle" system is also referred to as what?
- Q180. What binary coding is used most often for e-mail purposes?...
- Q181. What file structure database would you expect to find on floppy disks?...
- Q182. Study the log given below and answer the following question: Apr 24 14:46:46 [4663]: spp_p...
- Q183. You have been given the task to investigate web attacks on a Windows-based server. Which o...
- Q184. What will the following command accomplish in Linux? fdisk /dev/hda...
- Q185. You are carrying out the last round of testing for your new website before it goes live. T...
- Q186. George is a senior security analyst working for a state agency in Florida. His state's con...
