New Year Special Sale - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: spcl70

Practice Free GD0-110 Certification Exam for EnCE Outside North America Exam Questions Answers With Explanation

We at Crack4sure are committed to giving students who are preparing for the Guidance Software GD0-110 Exam the most current and reliable questions . To help people study, we've made some of our Certification Exam for EnCE Outside North America exam materials available for free to everyone. You can take the Free GD0-110 Practice Test as many times as you want. The answers to the practice questions are given, and each answer is explained.

Question # 6

Using good forensic practices, when seizing a computer at a business running Windows 2000 Server you should:

A.

Shut it down normally.

B.

Pull the plug from the wall.

C.

Pull the plug from the back of the computer.

D.

Press the power button and hold it in.

Question # 7

Which of the following is commonly used to encode e-mail attachments?

A.

JPEG

B.

GIF

C.

EMF

D.

Base64

Question # 8

By default, what color does EnCase use for the contents of a logical file?

A.

Black

B.

Red

C.

Black on red

D.

Red on black

Question # 9

You are examining a hard drive that has Windows XP installed as the operating system. You see a file that has a date and time in the deleted column. Where does that date and time come from?

A.

Inode Table

B.

Info2 file

C.

Directory Entry

D.

Master File Table

Question # 10

When undeleting a file in the FAT file system, EnCase will check the _____________ to see if it has already been overwritten.

A.

directory entry

B.

FAT

C.

data on the hard drive

D.

deletion table

Question # 11

The default export folder remains the same for all cases.

A.

True

B.

False

Question # 12

If cases are worked on a lab drive in a secure room, without any cleaning of the contents of the drive, which of the following areas would be of most concern?

A.

Cross-contamination

B.

Storage

C.

Chain-of-custody

D.

There is no concern

Question # 13

What files are reconfigured or deleted by EnCase during the creation of an EnCase boot disk?

A.

command.com

B.

io.sys

C.

drvspace.bin

D.

autoexec.bat

Question # 14

A suspect typed a file on his computer and saved it to a floppy diskette. The filename was MyNote.txt. You receive the floppy and the suspect's computer. The suspect denies that the floppy disk belongs to him. You search the suspect's computer and locate only the filename within a .LNK file. The .LNK file is located in the folder C:\Windows\Recent. How you would use the .LNK file to establish a connection between the file on the floppy diskette and the suspect computer?

A.

The dates and time of the file found in the .LNK file, at file offset 28

B.

The full path of the file, found in the .LNK file

C.

The file signature found in the .LNK file

D.

Both a and b

Question # 15

When Unicode is selected for a search keyword, EnCase:

A.

Will only find the keyword if it is Unicode.

B.

Will find the keyword if it is either Unicode or ASCII.

C.

Unicode is not a search option for EnCase.

D.

None of the above.

Question # 16

Pressing the power button on a computer that is running could have which of the following results?

A.

The operating system will shut down normally.

B.

The computer will instantly shut off.

C.

The computer will go into stand-by mode.

D.

Nothing will happen.

E.

All of the above could happen.

Question # 17

You are investigating a case involving fraud. You seized a computer from a suspect who stated that the computer is not used by anyone other than himself. The computer has Windows 98 installed on the hard drive. You find the filename C:\downloads\check01.jpg?that EnCase shows as being moved. The starting extent is 0C4057. You find another filename C:\downloads\chk1.dll with the starting extent 0C4057, which EnCase also shows as being moved. In the C:\windows\System folder you find an allocated file named chk1.dll with the starting extent 0C4057. The chk1.dll file is a JPEG image of a counterfeit check. Could this information be used to refute the suspect claim that he never knew it was on the computer?

A.

Yes, because the chk1.dll file was moved and renamed.

B.

No, because the Windows operating system likely moved and renamed the chk1.dll file during disk maintenance.

C.

No, because the chk1.dll file has no evidentiary value.

D.

Yes, because the ch1.dll is all the evidence required to prove the case.

Question # 18

How are the results of a signature analysis examined?

A.

By sorting on the signature column in the table view.

B.

By sorting on the hash library column in the table view.

C.

By sorting on the hash sets column in the table view

D.

By sorting on the category column in the table view.

Question # 19

Two allocated files can occupy one cluster, as long as they can both fit within the allotted number of bytes.

A.

True

B.

False

Question # 20

Creating an image of a hard drive that was seized as evidence:

A.

May be done by anyone because it is a relatively simple procedure.

B.

May only be done by trained personnel because the process has the potential to alter the original evidence.

C.

May only be done by computer scientists.

D.

Should be done by the user, as they are most familiar with the hard drive.

Question # 21

In DOS and Windows, how many bytes are in one FAT directory entry?

A.

8

B.

16

C.

32

D.

64

E.

Variable

Question # 22

The maximum file segment size for an EnCase evidence file is:

A.

500 MB

B.

1000 MB

C.

1500 MB

D.

2000 MB

E.

There is no limit.

Question # 23

Which of the following would most likely be an add-in card?

A.

A motherboard

B.

The board that connects to the power supply

C.

A video card that is connected to the motherboard in the AGP slot

D.

Anything plugged into socket 7

Question # 24

When a document is printed using EMF in Windows, what file(s) are generated in the spooling process?

A.

The .SPL file

B.

The .SHD file

C.

Both a and b

D.

Neither a or b

Question # 25

The EnCase case file can be best described as:

A.

The file that runs EnCase for Windows.

B.

A file contain configuration settings for cases.

C.

A file that contains information specific to one case.

D.

None of the above.

Question # 26

The following keyword was typed in exactly as shown. Choose the answer(s) that would be found. All search criteria have default settings. Tom

A.

Tomorrow

B.

Tom

C.

Stomp

D.

TomJ@hotmail.com

Question # 27

Changing the filename of a file will change the hash value of the file.

A.

True

B.

False

Question # 28

To undelete a file in the FAT file system, EnCase obtains the starting extent from the:

A.

FAT

B.

File header

C.

Operating system

D.

Directory entry

Question # 29

Searches and bookmarks are stored in the evidence file.

A.

True

B.

False

Question # 30

RAM is tested during which phase of the power-up sequence?

A.

Pre-POST

B.

During POST

C.

After POST

D.

None of the above.

Question # 31

A logical file would be best described as:

A.

The data from the beginning of the starting cluster to the length of the file.

B.

The data taken from the starting cluster to the end of the last cluster that is occupied by the file.

C.

A file including any RAM and disk slack.

D.

A file including only RAM slack.

Question # 32

The following GREP expression was typed in exactly as shown. Choose the answer(s) that would result. Jan 1 st , 2?0?00

A.

Jan 1st, 1900

B.

Jan 1st, 2000

C.

Jan 1st, 2001

D.

Jan 1st, 2100

Question # 33

To later verify the contents of an evidence file?

A.

EnCase writes an MD5 hash value for every 32 sectors copied.

B.

EnCase writes a CRC value for every 64 sectors copied.

C.

EnCase writes a CRC value for every 128 sectors copied.

D.

EnCase writes an MD5 hash value every 64 sectors copied.

Question # 34

When a file is deleted in the FAT or NTFS file systems, what happens to the data on the hard drive?

A.

It is overwritten with zeroes.

B.

It is moved to a special area.

C.

Nothing.

D.

The file header is marked with a Sigma so the file is not recognized by the operating system.

Question # 35

In Unicode, one printed character is composed of ____ bytes of data.

A.

1

B.

2

C.

4

D.

8

Question # 36

Which of the following would be a true statement about the function of the BIOS?

A.

The BIOS is responsible for swapping out memory pages when RAM fills up.

B.

The BIOS is responsible for checking and configuring the system after the power is turned on.

C.

The BIOS integrates compressed executable files with memory addresses for faster execution.

D.

Both a and c.

Question # 37

Which of the following statements is more accurate?

A.

The Recycle Bin increases the chance of locating the existence of a file on a computer.

B.

The Recycle Bin reduces the chance of locating the existence of a file on a computer.

Question # 38

EnCase is able to read and examine which of the following file systems?

A.

NTFS

B.

FAT

C.

EXT3

D.

HFS

Question # 39

The EnCase default export folder is:

A.

A global setting that can be changed.

B.

A case-specific setting that can be changed.

C.

A global setting that cannot be changed.

D.

A case-specific setting that cannot be changed.

Question # 40

How many copies of the FAT are located on a FAT 32, Windows 98-formatted partition?

A.

1

B.

2

C.

3

D.

4

Question # 41

EnCase can build a hash set of a selected group of files.

A.

True

B.

False

Question # 42

The signature table data is found in which of the following files?

A.

The case file

B.

The configuration FileSignatures.ini file

C.

The evidence file

D.

All of the above

Question # 43

Which of the following selections would be used to keep track of a fragmented file in the FAT file system?

A.

The File Allocation Table

B.

The directory entry for the fragmented file

C.

The partition table of extents

D.

All of the above

Question # 44

During the power-up sequence, which of the following happens first?

A.

The boot sector is located on the hard drive.

B.

The power On Self-Test.

C.

The floppy drive is checked for a diskette.

D.

The BIOS on an add-in card is executed.

Question # 45

When a file is deleted in the FAT file system, what happens to the FAT?

A.

It is deleted as well.

B.

Nothing.

C.

The FAT entries for that file are marked as allocated.

D.

The FAT entries for that file are marked as available.

Question # 46

A restored floppy diskette will have the same hash value as the original diskette.

A.

True

B.

False

Question # 47

Which of the following is found in the FileSignatures.ini configuration file?

A.

Pointers to an evidence file

B.

The results of a signature analysis

C.

The results of a hash analysis

D.

The information contained in the signature table

Question # 48

All investigators using EnCase should run tests on the evidence file acquisition and verification process to:

A.

Further the investigator understanding of the evidence file.

B.

Give more weight to the investigator testimony in court.

C.

Insure that the investigator is using the proper method of acquisition.

D.

All of the above.

Question # 49

This question addresses the EnCase for Windows search process. If a target word is within a logical file, and it begins in cluster 10 and ends in cluster 15 (the word is fragmented), the search:

A.

Will not find it because the letters of the keyword are not contiguous.

B.

Will not find it unless File slack is checked on the search dialog box.

C.

Will find it because EnCase performs a logical search.

D.

Will not find it because EnCase performs a physical search only.

Question # 50

The EnCase evidence file logical filename can be changed without affecting the verification of the acquired evidence.

A.

True

B.

False

Question # 51

If cluster #3552 entry in the FAT table contains a value of this would mean:

A.

The cluster is allocated

B.

The cluster is unallocated

C.

The cluster is marked bad

D.

The cluster is the end of a file

Question # 52

Select the appropriate name for the highlighted area of the binary numbers.

GD0-110 question answer
A.

Word

B.

Nibble

C.

Bit

D.

Dword

E.

Byte

GD0-110 PDF

$33

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

GD0-110 PDF + Testing Engine

$52.8

$175.99

3 Months Free Update

  • Exam Name: Certification Exam for EnCE Outside North America
  • Last Update: Dec 15, 2025
  • Questions and Answers: 174
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

GD0-110 Engine

$39.6

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included