Summer Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

GD0-110 PDF

$38.5

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

GD0-110 PDF + Testing Engine

$61.6

$175.99

3 Months Free Update

  • Exam Name: Certification Exam for EnCE Outside North America
  • Last Update: Sep 13, 2025
  • Questions and Answers: 174
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

GD0-110 Engine

$46.2

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

GD0-110 Practice Exam Questions with Answers Certification Exam for EnCE Outside North America Certification

Question # 6

Using good forensic practices, when seizing a computer at a business running Windows 2000 Server you should:

A.

Shut it down normally.

B.

Pull the plug from the wall.

C.

Pull the plug from the back of the computer.

D.

Press the power button and hold it in.

Full Access
Question # 7

Which of the following is commonly used to encode e-mail attachments?

A.

JPEG

B.

GIF

C.

EMF

D.

Base64

Full Access
Question # 8

By default, what color does EnCase use for the contents of a logical file?

A.

Black

B.

Red

C.

Black on red

D.

Red on black

Full Access
Question # 9

You are examining a hard drive that has Windows XP installed as the operating system. You see a file that has a date and time in the deleted column. Where does that date and time come from?

A.

Inode Table

B.

Info2 file

C.

Directory Entry

D.

Master File Table

Full Access
Question # 10

When undeleting a file in the FAT file system, EnCase will check the _____________ to see if it has already been overwritten.

A.

directory entry

B.

FAT

C.

data on the hard drive

D.

deletion table

Full Access
Question # 11

The default export folder remains the same for all cases.

A.

True

B.

False

Full Access
Question # 12

If cases are worked on a lab drive in a secure room, without any cleaning of the contents of the drive, which of the following areas would be of most concern?

A.

Cross-contamination

B.

Storage

C.

Chain-of-custody

D.

There is no concern

Full Access
Question # 13

What files are reconfigured or deleted by EnCase during the creation of an EnCase boot disk?

A.

command.com

B.

io.sys

C.

drvspace.bin

D.

autoexec.bat

Full Access
Question # 14

A suspect typed a file on his computer and saved it to a floppy diskette. The filename was MyNote.txt. You receive the floppy and the suspect's computer. The suspect denies that the floppy disk belongs to him. You search the suspect's computer and locate only the filename within a .LNK file. The .LNK file is located in the folder C:\Windows\Recent. How you would use the .LNK file to establish a connection between the file on the floppy diskette and the suspect computer?

A.

The dates and time of the file found in the .LNK file, at file offset 28

B.

The full path of the file, found in the .LNK file

C.

The file signature found in the .LNK file

D.

Both a and b

Full Access
Question # 15

When Unicode is selected for a search keyword, EnCase:

A.

Will only find the keyword if it is Unicode.

B.

Will find the keyword if it is either Unicode or ASCII.

C.

Unicode is not a search option for EnCase.

D.

None of the above.

Full Access
Question # 16

Pressing the power button on a computer that is running could have which of the following results?

A.

The operating system will shut down normally.

B.

The computer will instantly shut off.

C.

The computer will go into stand-by mode.

D.

Nothing will happen.

E.

All of the above could happen.

Full Access
Question # 17

You are investigating a case involving fraud. You seized a computer from a suspect who stated that the computer is not used by anyone other than himself. The computer has Windows 98 installed on the hard drive. You find the filename C:\downloads\check01.jpg?that EnCase shows as being moved. The starting extent is 0C4057. You find another filename C:\downloads\chk1.dll with the starting extent 0C4057, which EnCase also shows as being moved. In the C:\windows\System folder you find an allocated file named chk1.dll with the starting extent 0C4057. The chk1.dll file is a JPEG image of a counterfeit check. Could this information be used to refute the suspect claim that he never knew it was on the computer?

A.

Yes, because the chk1.dll file was moved and renamed.

B.

No, because the Windows operating system likely moved and renamed the chk1.dll file during disk maintenance.

C.

No, because the chk1.dll file has no evidentiary value.

D.

Yes, because the ch1.dll is all the evidence required to prove the case.

Full Access
Question # 18

How are the results of a signature analysis examined?

A.

By sorting on the signature column in the table view.

B.

By sorting on the hash library column in the table view.

C.

By sorting on the hash sets column in the table view

D.

By sorting on the category column in the table view.

Full Access
Question # 19

Two allocated files can occupy one cluster, as long as they can both fit within the allotted number of bytes.

A.

True

B.

False

Full Access
Question # 20

Creating an image of a hard drive that was seized as evidence:

A.

May be done by anyone because it is a relatively simple procedure.

B.

May only be done by trained personnel because the process has the potential to alter the original evidence.

C.

May only be done by computer scientists.

D.

Should be done by the user, as they are most familiar with the hard drive.

Full Access
Question # 21

In DOS and Windows, how many bytes are in one FAT directory entry?

A.

8

B.

16

C.

32

D.

64

E.

Variable

Full Access
Question # 22

The maximum file segment size for an EnCase evidence file is:

A.

500 MB

B.

1000 MB

C.

1500 MB

D.

2000 MB

E.

There is no limit.

Full Access
Question # 23

Which of the following would most likely be an add-in card?

A.

A motherboard

B.

The board that connects to the power supply

C.

A video card that is connected to the motherboard in the AGP slot

D.

Anything plugged into socket 7

Full Access
Question # 24

When a document is printed using EMF in Windows, what file(s) are generated in the spooling process?

A.

The .SPL file

B.

The .SHD file

C.

Both a and b

D.

Neither a or b

Full Access
Question # 25

The EnCase case file can be best described as:

A.

The file that runs EnCase for Windows.

B.

A file contain configuration settings for cases.

C.

A file that contains information specific to one case.

D.

None of the above.

Full Access
Question # 26

The following keyword was typed in exactly as shown. Choose the answer(s) that would be found. All search criteria have default settings. Tom

A.

Tomorrow

B.

Tom

C.

Stomp

D.

TomJ@hotmail.com

Full Access
Question # 27

Changing the filename of a file will change the hash value of the file.

A.

True

B.

False

Full Access
Question # 28

To undelete a file in the FAT file system, EnCase obtains the starting extent from the:

A.

FAT

B.

File header

C.

Operating system

D.

Directory entry

Full Access
Question # 29

Searches and bookmarks are stored in the evidence file.

A.

True

B.

False

Full Access
Question # 30

RAM is tested during which phase of the power-up sequence?

A.

Pre-POST

B.

During POST

C.

After POST

D.

None of the above.

Full Access
Question # 31

A logical file would be best described as:

A.

The data from the beginning of the starting cluster to the length of the file.

B.

The data taken from the starting cluster to the end of the last cluster that is occupied by the file.

C.

A file including any RAM and disk slack.

D.

A file including only RAM slack.

Full Access
Question # 32

The following GREP expression was typed in exactly as shown. Choose the answer(s) that would result. Jan 1 st , 2?0?00

A.

Jan 1st, 1900

B.

Jan 1st, 2000

C.

Jan 1st, 2001

D.

Jan 1st, 2100

Full Access
Question # 33

To later verify the contents of an evidence file?

A.

EnCase writes an MD5 hash value for every 32 sectors copied.

B.

EnCase writes a CRC value for every 64 sectors copied.

C.

EnCase writes a CRC value for every 128 sectors copied.

D.

EnCase writes an MD5 hash value every 64 sectors copied.

Full Access
Question # 34

When a file is deleted in the FAT or NTFS file systems, what happens to the data on the hard drive?

A.

It is overwritten with zeroes.

B.

It is moved to a special area.

C.

Nothing.

D.

The file header is marked with a Sigma so the file is not recognized by the operating system.

Full Access
Question # 35

In Unicode, one printed character is composed of ____ bytes of data.

A.

1

B.

2

C.

4

D.

8

Full Access
Question # 36

Which of the following would be a true statement about the function of the BIOS?

A.

The BIOS is responsible for swapping out memory pages when RAM fills up.

B.

The BIOS is responsible for checking and configuring the system after the power is turned on.

C.

The BIOS integrates compressed executable files with memory addresses for faster execution.

D.

Both a and c.

Full Access
Question # 37

Which of the following statements is more accurate?

A.

The Recycle Bin increases the chance of locating the existence of a file on a computer.

B.

The Recycle Bin reduces the chance of locating the existence of a file on a computer.

Full Access
Question # 38

EnCase is able to read and examine which of the following file systems?

A.

NTFS

B.

FAT

C.

EXT3

D.

HFS

Full Access
Question # 39

The EnCase default export folder is:

A.

A global setting that can be changed.

B.

A case-specific setting that can be changed.

C.

A global setting that cannot be changed.

D.

A case-specific setting that cannot be changed.

Full Access
Question # 40

How many copies of the FAT are located on a FAT 32, Windows 98-formatted partition?

A.

1

B.

2

C.

3

D.

4

Full Access
Question # 41

EnCase can build a hash set of a selected group of files.

A.

True

B.

False

Full Access
Question # 42

The signature table data is found in which of the following files?

A.

The case file

B.

The configuration FileSignatures.ini file

C.

The evidence file

D.

All of the above

Full Access
Question # 43

Which of the following selections would be used to keep track of a fragmented file in the FAT file system?

A.

The File Allocation Table

B.

The directory entry for the fragmented file

C.

The partition table of extents

D.

All of the above

Full Access
Question # 44

During the power-up sequence, which of the following happens first?

A.

The boot sector is located on the hard drive.

B.

The power On Self-Test.

C.

The floppy drive is checked for a diskette.

D.

The BIOS on an add-in card is executed.

Full Access
Question # 45

When a file is deleted in the FAT file system, what happens to the FAT?

A.

It is deleted as well.

B.

Nothing.

C.

The FAT entries for that file are marked as allocated.

D.

The FAT entries for that file are marked as available.

Full Access
Question # 46

A restored floppy diskette will have the same hash value as the original diskette.

A.

True

B.

False

Full Access
Question # 47

Which of the following is found in the FileSignatures.ini configuration file?

A.

Pointers to an evidence file

B.

The results of a signature analysis

C.

The results of a hash analysis

D.

The information contained in the signature table

Full Access
Question # 48

All investigators using EnCase should run tests on the evidence file acquisition and verification process to:

A.

Further the investigator understanding of the evidence file.

B.

Give more weight to the investigator testimony in court.

C.

Insure that the investigator is using the proper method of acquisition.

D.

All of the above.

Full Access
Question # 49

This question addresses the EnCase for Windows search process. If a target word is within a logical file, and it begins in cluster 10 and ends in cluster 15 (the word is fragmented), the search:

A.

Will not find it because the letters of the keyword are not contiguous.

B.

Will not find it unless File slack is checked on the search dialog box.

C.

Will find it because EnCase performs a logical search.

D.

Will not find it because EnCase performs a physical search only.

Full Access
Question # 50

The EnCase evidence file logical filename can be changed without affecting the verification of the acquired evidence.

A.

True

B.

False

Full Access
Question # 51

If cluster #3552 entry in the FAT table contains a value of this would mean:

A.

The cluster is allocated

B.

The cluster is unallocated

C.

The cluster is marked bad

D.

The cluster is the end of a file

Full Access
Question # 52

Select the appropriate name for the highlighted area of the binary numbers.

GD0-110 question answer
A.

Word

B.

Nibble

C.

Bit

D.

Dword

E.

Byte

Full Access