Winter Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

GD0-100 PDF

$38.5

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

GD0-100 PDF + Testing Engine

$61.6

$175.99

3 Months Free Update

  • Exam Name: Certification Exam For ENCE North America
  • Last Update: Jan 22, 2025
  • Questions and Answers: 176
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

GD0-100 Engine

$46.2

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

GD0-100 Practice Exam Questions with Answers Certification Exam For ENCE North America Certification

Question # 6

How does EnCase verify that the case information (Case Number, Evidence Number, Investigator Name, etc) in an evidence file has not been damaged or changed, after the evidence file has been written?

A.

EnCase writes a CRC value of the case information and verifies the CRC value when the evidence is added to a case.

B.

EnCase does not verify the case information and case information can be changed by the user as it becomes necessary.

C.

The .case file writes a CRC value for the case information and verifies it when the case is opened.

D.

EnCase writes an MD5 hash value for the entire evidence file, which includes the case information, and verifies the MD5 hash when the evidence is added to a case.

Full Access
Question # 7

A signature analysis has been run on a case. The result "Bad Signature " means:

A.

The file signature is known and does not match a known file header.

B.

The file signature is known and the file extension is known.

C.

The file signature is known and does not match a known file extension.

D.

The file signature is unknown and the file extension is known.

Full Access
Question # 8

If a floppy diskette is in the ?drive, the computer will always boot to that drive before any other device. If a floppy diskette is in the ??drive, the computer will always boot to that drive before any other device.

A.

False

B.

True

Full Access
Question # 9

To later verify the contents of an evidence file 7RODWHUYHULI\WKHFRQWHQWVRIDQHYLGHQFHILOH

A.

EnCase writes a CRC value for every 64 sectors copied.

B.

EnCase writes a CRC value for every 128 sectors copied.

C.

EnCase writes an MD5 hash value every 64 sectors copied.

D.

EnCase writes an MD5 hash value for every 32 sectors copied.

Full Access
Question # 10

A hard drive has been formatted as NTFS and Windows XP was installed. The user used fdisk to remove all partitions from that drive. Nothing else was done. You have imaged the drive and have opened the evidence file with EnCase. What would be the best way to examine this hard drive?

A.

Use the add Partition feature to rebuild the partition and then examine the system. Use the add Partition feature to rebuild the partition and then examine the system.

B.

EnCase will not see a drive that has beenfdisked.

C.

Conduct a physical search of the hard drive and bookmark any evidence.

D.

Use the Recovered Deleted Partitions feature and then examine the system.

Full Access
Question # 11

When Unicode is selected for a search keyword, EnCase:

A.

Will find the keyword if it is either Unicode or ASCII.

B.

Unicode is not a search option for EnCase.

C.

Will only find the keyword if it is Unicode.

D.

None of the above.

Full Access
Question # 12

The following GREP expression was typed in exactly as shown. Choose the answer(s) that would result. 800[) \-]+555-1212

A.

(800) 555-1212

B.

800-555 1212

C.

8005551212

D.

800.555.1212

Full Access
Question # 13

When an EnCase user double-clicks on a file within EnCase what determines the action that will result? Select all that apply

A.

The settings in the case file.

B.

The settings in the FileTypes.ini file.

C.

The setting in the evidence file.

Full Access
Question # 14

Within EnCase, clicking on Save on the toolbar affects what file(s)?

A.

All of the above

B.

The evidence files

C.

The open case file

D.

The configuration .ini files

Full Access
Question # 15

EnCase is able to read and examine which of the following file systems?

A.

NTFS

B.

EXT3

C.

FAT

D.

HFS

Full Access
Question # 16

You are working in a computer forensic lab. A law enforcement investigator brings you a computer and a valid search warrant. You have legal authority to search the computer. The investigator hands you a piece of paper that has three printed checks on it. All three checks have the same check and account number. You image the suspect computer and open the evidence file with EnCase. You checks have the same check and account number. You image the suspect's computer and open the evidence file with EnCase. You perform a text search for the account number and check number. Nothing returns on the search results. You perform a text search for all other information found on the printed checks and there is still nothing returned in the search results. You run a signature analysis and check the gallery. You cannot locate any graphical copies of the printed checks in the gallery. At this point, is it safe to say that the checks are not located on the suspect computer?

A.

No. The images could be located a compressed file.

B.

No. The images could be embedded in a document.

C.

No. The images could be in unallocated clusters.

D.

No. The images could be in an image format not viewable inside EnCase.

E.

All of the above.

Full Access
Question # 17

All investigators using EnCase should run tests on the evidence file acquisition and verification process to:

A.

Insure that the investigator is using the proper method of acquisition.

B.

All of the above.

C.

Further the investigator understanding of the evidence file. Further the investigator?understanding of the evidence file.

D.

Give more weight to the investigator testimony in court. Give more weight to the investigator?testimony in court.

Full Access
Question # 18

Select the appropriate name for the highlighted area of the binary numbers.

A.

Word

B.

Dword

C.

Byte

D.

Nibble

E.

Bit

Full Access
Question # 19

Temp files created by EnCase are deleted when EnCase is properly closed.

A.

True

B.

False

Full Access
Question # 20

Assume that MyNote.txt was allocated to clusters 5, 9, and 11. Cluster 6, 7, and 8 belong to MyResume.doc. Both files have been deleted and the directory entry in the FAT file system for MyResume.doc has been overwritten. What clusters would EnCase use to undelete MyNote.txt?

A.

5,9,11

B.

5,6,7

C.

7,8,9

D.

6,7,8

Full Access
Question # 21

When a file is deleted in the FAT file system, what happens to the filename?

A.

It is zeroed out.

B.

The first character of the directory entry is marked with a hex 00.

C.

It is wiped from the directory.

D.

The first character of the directory entry is marked with a hex E5.

Full Access
Question # 22

Search results are found in which of the following files? Select all that apply.

A.

The evidence file

B.

The configuration Searches.ini file

C.

The case file

Full Access
Question # 23

The case number in an evidence file can be changed without causing the verification feature to report an error, if:

A.

The user utilizes a text editor.

B.

The case information cannot be changed in an evidence file, without causing the verification feature to report an error.

C.

The user utilizes the case information editor within EnCase.

D.

The evidence file is reacquired.

Full Access
Question # 24

If a hard drive is left in a room while acquiring, and several persons have access to that room, which of the following areas would be of most concern?

A.

Storage

B.

There is no concern

C.

Cross-contamination

D.

Chain-of-custody

Full Access
Question # 25

EnCase can build a hash set of a selected group of files.

A.

True

B.

False

Full Access
Question # 26

Searches and bookmarks are stored in the evidence file.

A.

False

B.

True

Full Access
Question # 27

A personal data assistant was placed in a evidence locker until an examiner has time to examine it. Which of the following areas would require special attention?

A.

Chain-of-custody

B.

Storage

C.

There is no concern

D.

Cross-contamination

Full Access
Question # 28

The boot partition table found at the beginning of a hard drive is located in what sector?

A.

Volume boot sector

B.

Master boot record

C.

Master file table

D.

Volume boot record

Full Access
Question # 29

A FAT directory has as a logical size of:

A.

0 bytes

B.

One cluster

C.

128 bytes

D.

64 bytes

Full Access
Question # 30

In Windows, the file MyNote.txt is deleted from C Drive and is automatically sent to the Recycle Bin. The long filename was MyNote.txt and the short filename was MYNOTE.TXT. When viewing the Recycle Bin with EnCase, how will the long filename and MyNote.txt and the short filename was MYNOTE.TXT?

A.

MyNote.txt, CD0.txt

B.

MyNote.txt, DC0.txt

C.

MyNote.del, DC1.del

D.

MyNote.del, DC0.del

Full Access
Question # 31

This question addresses the EnCase for Windows search process. If a target word is within a logical file, and it begins in cluster 10 and ends in cluster 15 (the word is fragmented), the search:

A.

Will not find it unlessile slack is checked on the search dialog box.

B.

Will find it because EnCase performs a logical search.

C.

Will not find it because EnCase performs a physical search only.

D.

Will not find it because the letters of the keyword are not contiguous.

Full Access
Question # 32

The EnCase signature analysis is used to perform which of the following actions?

A.

Analyzing the relationship of a file signature to its file extension.Analyzing the relationship of a file signature to its file extension.

B.

Analyzing the relationship of a file signature to its file header.Analyzing the relationship of a file signature to its file header.

C.

Analyzing the relationship of a file signature to a list of hash sets.Analyzing the relationship of a file signature to a list of hash sets.

D.

Analyzing the relationship of a file signature to its computed MD5 hash value.Analyzing the relationship of a file signature to its computed MD5 hash value.

Full Access
Question # 33

A restored floppy diskette will have the same hash value as the original diskette.

A.

True

B.

False

Full Access
Question # 34

You are examining a hard drive that has Windows XP installed as the operating system. You see a file that has a date and time in the deleted column. Where does that date and time come from?

A.

Directory Entry

B.

Master File Table

C.

Info2 file

D.

Inode Table

Full Access
Question # 35

Within EnCase, what is purpose of the default export folder?

A.

This is the folder that will be automatically selected when the copy/unerase feature is used.

B.

This is the folder that will automatically store an evidence file when the acquisition is made in DOS.

C.

This is the folder that temporarily stores all bookmark and search results.

D.

This is the folder used to hold copies of files that are sent to external viewers.

Full Access
Question # 36

When a file is deleted in the FAT file system, what happens to the FAT?

A.

The FAT entries for that file are marked as allocated.

B.

Nothing.

C.

It is deleted as well.

D.

The FAT entries for that file are marked as available.

Full Access
Question # 37

Which of the following would most likely be an add-in card?

A.

A video card that is connected to the motherboard in the AGP slot

B.

Anything plugged into socket 7

C.

A motherboard

D.

The board that connects to the power supply

Full Access
Question # 38

In DOS and Windows, how many bytes are in one FAT directory entry?

A.

Variable

B.

32

C.

16

D.

64

E.

8

Full Access
Question # 39

Changing the filename of a file will change the hash value of the file.

A.

True

B.

False

Full Access
Question # 40

You are an investigator and have encountered a computer that is running at the home of a suspect. The computer does not appear to be a part of a network. The operating system is Windows XP Home. No programs are visibly running. You should:

A.

Pull the plug from the back of the computer.

B.

Turn it off with the power button.

C.

Pull the plug from the wall.

D.

Shut it down with the start menu.

Full Access
Question # 41

Which of the following is commonly used to encode e-mail attachments?

A.

GIF

B.

EMF

C.

JPEG

D.

Base64

Full Access
Question # 42

Within EnCase for Windows, the search process is:

A.

a search of the physical disk in unallocated clusters and other unused disk areas

B.

a search of the logical files

C.

None of the above

D.

both a and b

Full Access
Question # 43

4 bits allows what number of possibilities?

A.

16

B.

4

C.

2

D.

8

Full Access
Question # 44

A hard drive has 8 sectors per cluster. File Mystuff.doc has a logical file size of 13,000 bytes. How many clusters will be used by Mystuff.doc?

A.

4

B.

1

C.

2

D.

3

Full Access
Question # 45

The case file should be archived with the evidence files at the termination of a case.

A.

True

B.

False

Full Access
Question # 46

Which of the following aspects of the EnCase evidence file can be changed during a reacquire of the evidence file?

A.

The evidence number

B.

The acquisition notes

C.

The investigator name

D.

None of the above

Full Access
Question # 47

Which of the following selections is NOT found in the case file

A.

External viewers

B.

Pointers to evidence files

C.

Signature analysis results

D.

Search results

Full Access
Question # 48

How many clusters can a FAT 16 system address?

A.

65,536

B.

4,096

C.

268,435,456

D.

4,294,967,296

Full Access
Question # 49

In Unicode, one printed character is composed of ____ bytes of data.

A.

8

B.

4

C.

2

D.

1

Full Access
Question # 50

This question addresses the EnCase for Windows search process. If a target word is located in the unallocated space, and the word is fragmented between clusters 10 and 15, the search:

A.

Will not find it because the letters of the keyword are not contiguous.

B.

Will not find it because EnCase performs a physical search only.

C.

Will find it because EnCase performs a logical search.

D.

Will not find it unlessile slack?is checked on the search dialog box. Will not find it unless ?ile slack?is checked on the search dialog box.

Full Access
Question # 51

What files are reconfigured or deleted by EnCase during the creation of an EnCase boot disk?

A.

command.com

B.

autoexec.bat

C.

drvspace.bin

D.

io.sys

Full Access
Question # 52

A suspect typed a file on his computer and saved it to a floppy diskette. The filename was MyNote.txt. You receive the floppy and the suspect computer. The suspect denies that the floppy disk belongs to him. You search the suspect computer and locate only the suspect? computer. The suspect denies that the floppy disk belongs to him. You search the suspect? computer and locate only the filename within a .LNK file. The .LNK file is located in the folder C:\Windows\Recent. How you would use the .LNK file to establish a connection between the file on the floppy diskette and the suspect computer? connection between the file on the floppy diskette and the suspect? computer?

A.

Both a and b

B.

The dates and time of the file found in the .LNK file, at file offset 28

C.

The full path of the file, found in the .LNK file

D.

The file signature found in the .LNK file

Full Access