Peter works as a Computer Hacking Forensic Investigator. He has been called by an organization to conduct a seminar to give necessary information related to sexual harassment within the work place. Peter started with the definition and types of sexual harassment. He then wants to convey that it is important that records of the sexual harassment incidents should be maintained, which helps in further legal prosecution. Which of the following data should be recorded in this documentation?
Each correct answer represents a complete solution. Choose all that apply.
A. Names of the victims
B. Date and time of incident
C. Nature of harassment
D. Location of each incident
Which of the following is used to detect the bad sectors in a hard disk under Linux environment?
A. Badblocks
B. CheckDisk
C. ScanDisk
D. CHKDSK
Allen works as a professional Computer Hacking Forensic Investigator. A project has been assigned to him to investigate a computer, which is used by the suspect to sexually harass the victim using instant messenger program. Suspect's computer runs on Windows operating system. Allen wants to recover password from instant messenger program, which suspect is using, to collect the evidence of the crime. Allen is using Helix Live for this purpose. Which of the following utilities of Helix will he use to accomplish the task?
A. Mail Pass View
B. MessenPass
C. Asterisk Logger
D. Access PassView
Adam, a malicious hacker, hides a hacking tool from a system administrator of his company by using Alternate Data Streams (ADS) feature. Which of the following statements is true in context with the above scenario?
A. Alternate Data Streams is a feature of Linux operating system.
B. Adam is using FAT file system.
C. Adam is using NTFS file system.
D. Adam's system runs on Microsoft Windows 98 operating system.
You are responsible for all computer security at your company. This includes initial investigation into alleged unauthorized activity. Which of the following are possible results of improperly gathering forensic evidence in an alleged computer crime by an employee?
Each correct answer represents a complete solution. Choose three.
A. Your company is sued for defaming the character of an accused party.
B. You falsely accuse an innocent employee.
C. Your company is unable to pursue the case against a perpetrator.
D. You are charged with criminal acts.
The promiscuous mode is a configuration of a network card that makes the card pass all traffic it receives to the central processing unit rather than just packets addressed to it. Which of the following tools works by placing the host system network card into the promiscuous mode?
A. Snort
B. THC-Scan
C. Sniffer
D. NetStumbler
Which of the following switches of the XCOPY command copies file ownerships and NTFS permissions on files while copying the files?
A. /r
B. /p
C. /s
D. /o
What is the name of the Secondary IDE slave, fourth partition in Linux operating system according to the Linux naming convention?
A. SDB3
B. HDC4
C. HDA4
D. HDD4
Which of the following Linux file systems is a journaled file system?
A. ext3
B. ext4
C. ext2
D. ext
Which of the following articles defines illegal access to the computer or network in Chapter 2 of Section 1, i.e., Substantive criminal law of the Convention on Cybercrime passed by the Council of Europe?
A. Article 2
B. Article 5
C. Article 16
D. Article 3