00:00

QUESTION 11

- (Exam Topic 1)
Volatile Memory is one of the leading problems for forensics. Worms such as code Red are memory resident and do write themselves to the hard drive, if you turn the system off they disappear. In a lab environment, which of the following options would you suggest as the most appropriate to overcome the problem of capturing volatile memory?

Correct Answer: C

QUESTION 12

- (Exam Topic 2)
When carrying out a forensics investigation, why should you never delete a partition on a dynamic disk?

Correct Answer: C

QUESTION 13

- (Exam Topic 2)
What type of flash memory card comes in either Type I or Type II and consumes only five percent of the power required by small hard drives?

Correct Answer: B

QUESTION 14

- (Exam Topic 4)
An EC2 instance storing critical data of a company got infected with malware. The forensics team took the EBS volume snapshot of the affected Instance to perform further analysis and collected other data of evidentiary value. What should be their next step?

Correct Answer: D

QUESTION 15

- (Exam Topic 3)
Which of these rootkit detection techniques function by comparing a snapshot of the file system, boot records, or memory with a known and trusted baseline?

Correct Answer: B