Spring Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

GD0-100 Certification Exam For ENCE North America Questions and Answers

Questions 4

Temp files created by EnCase are deleted when EnCase is properly closed.

Options:

A.

True

B.

False

Buy Now
Questions 5

You are an investigator and have encountered a computer that is running at the home of a suspect. The computer does not appear to be a part of a network. The operating system is Windows XP Home. No programs are visibly running. You should:

Options:

A.

Pull the plug from the back of the computer.

B.

Turn it off with the power button.

C.

Pull the plug from the wall.

D.

Shut it down with the start menu.

Buy Now
Questions 6

A standard Windows 98 boot disk is acceptable for booting a suspect drive.

Options:

A.

True

B.

False

Buy Now
Questions 7

Consider the following path in a FAT file system:

Options:

A.

From the My Pictures directory

B.

From the My Documents directory

C.

From the root directory c:\

D.

From itself

Buy Now
Questions 8

A logical file would be best described as:

Options:

A.

The data taken from the starting cluster to the end of the last cluster that is occupied by the file.

B.

A file including any RAM and disk slack.

C.

A file including only RAM slack.

D.

The data from the beginning of the starting cluster to the length of the file.

Buy Now
Questions 9

Which is the proper formula for determining the size in bytes of a hard drive that uses cylinders (C), heads (H), and sectors (S) geometry?

Options:

A.

C X H + S

B.

C X H X S + 512

C.

C X H X S X 512

D.

C X H X S

Buy Now
Questions 10

This question addresses the EnCase for Windows search process. If a target word is located in the unallocated space, and the word is fragmented between clusters 10 and 15, the search:

Options:

A.

Will not find it because the letters of the keyword are not contiguous.

B.

Will not find it because EnCase performs a physical search only.

C.

Will find it because EnCase performs a logical search.

D.

Will not find it unlessile slack?is checked on the search dialog box. Will not find it unless ?ile slack?is checked on the search dialog box.

Buy Now
Questions 11

Which statement would most accurately describe a motherboard?

Options:

A.

An add-in card that handles allRAM.

B.

Any circuit board, regardless of its function.

C.

The main circuit board that has slots for the microprocessor, RAM, ROM, and add-in cards.

D.

An add-in card that controls all hard drive activity.

Buy Now
Questions 12

Assume that an evidence file is added to a case, the case is saved, and the case is closed. What happens if the evidence file is moved, and the case is then opened?

Options:

A.

EnCase reports that the file integrity has been compromised and renders the file useless. EnCase reports that the file integrity has been compromised and renders the file useless.

B.

EnCase opens the case, excluding the moved evidence.

C.

EnCase asks for the location of the evidence file the next time the case is opened.

D.

EnCase reports a different hash value for the evidence file.

Buy Now
Questions 13

The results of a hash analysis on an evidence file that has been added to a case will be stored in which of the following files?

Options:

A.

The evidence file

B.

All of the above

C.

The case file

D.

The configuration HashAnalysis.ini file

Buy Now
Questions 14

The first sector on a volume is called the:

Options:

A.

Master file table

B.

Volume boot device

C.

Volume boot sector or record

D.

Master boot record

Buy Now
Questions 15

In Windows 2000 and XP, which of the following directories contain user personal folders?

Options:

A.

C:\Personnel Folders

B.

C:\WINNT\Profiles

C.

C:\Windows\Users

D.

C:\Documents and Settings

Buy Now
Questions 16

The spool files that are created during a print job are __________ after the print job is completed.

Options:

A.

moved

B.

wiped

C.

deleted and wiped

D.

deleted

Buy Now
Questions 17

RAM is used by the computer to:

Options:

A.

Execute the POST during start-up.

B.

Temporarily store electronic data that is being processed.

C.

Permanently store electronic data.

D.

Establish a connection with external devices.

Buy Now
Questions 18

EnCase can build a hash set of a selected group of files.

Options:

A.

True

B.

False

Buy Now
Questions 19

An evidence file was archived onto five CD-Rom disks with the third file segment on disk number three. Can the contents of the third file segment be verified by itself while still on the CD?

Options:

A.

No. Archived files are compressed and cannot be verified until un-archived.

B.

No. All file segments must be put back together.

C.

Yes. Any segment of an evidence file can be verified through re-computing and comparing the CRCs, even if it is on a CD.

D.

No. EnCase cannot verify files on CDs.

Buy Now
Questions 20

An Enhanced Metafile would best be described as:

Options:

A.

A compressed zip file.

B.

A graphics file attached to an e-mail message.

C.

A compound e-mail attachment.

D.

A file format used in the printing process by Windows.

Buy Now
Questions 21

The EnCase default export folder is:

Options:

A.

A case-specific setting that cannot be changed.

B.

A case-specific setting that can be changed.

C.

A global setting that can be changed.

D.

A global setting that cannot be changed.

Buy Now
Questions 22

Which of the following is found in the FileSignatures.ini configuration file

Options:

A.

The results of a hash analysis

B.

The information contained in the signature table

C.

The results of a signature analysis

D.

Pointers to an evidence file

Buy Now
Questions 23

You are examining a hard drive that has Windows XP installed as the operating system. You see a file that has a date and time in the deleted column. Where does that date and time come from?

Options:

A.

Directory Entry

B.

Master File Table

C.

Info2 file

D.

Inode Table

Buy Now
Questions 24

To generate an MD5 hash value for a file, EnCase:

Options:

A.

Computes the hash value including the logical file and filename.

B.

Computes the hash value including the physical file and filename.

C.

Computes the hash value based on the logical file.

D.

Computes the hash value based on the physical file.

Buy Now
Questions 25

The Windows 98 Start Menu has a selection called documents which displays a list of recently used files. Which of the following The Windows 98 Start Menu has a selection called documents which displays a list of recently used files. Which of the following folders contain those files?

Options:

A.

C:\Windows\History

B.

C:\Windows\Start menu\Documents

C.

C:\Windows\Documents

D.

C:\Windows\Recent

Buy Now
Questions 26

Pressing the power button on a computer that is running could have which of the following results?

Options:

A.

The computer will instantly shut off.

B.

The computer will go into stand-by mode.

C.

Nothing will happen.

D.

All of the above could happen.

E.

The operating system will shut down normally.

Buy Now
Questions 27

When handling computer evidence, an investigator should:

Options:

A.

Make any changes to the evidence that will further the investigation.

B.

Avoid making any changes to the original evidence.

C.

Both a and b

D.

Neither a or b

Buy Now
Questions 28

Which of the following aspects of the EnCase evidence file can be changed during a reacquire of the evidence file?

Options:

A.

The evidence number

B.

The acquisition notes

C.

The investigator name

D.

None of the above

Buy Now
Questions 29

When can an evidence file containing a NTFS partition be logically restored to a FAT 32 partition?

Options:

A.

Never

B.

When the FAT 32 has the same number of sectors / clusters.

C.

When the FAT 32 is the same size or bigger.

D.

Both a and b

Buy Now
Questions 30

By default, EnCase will display the data from the end of a logical file, to the end of the cluster, in what color:

Options:

A.

Red

B.

Red on black

C.

Black on red

D.

Black

Buy Now
Questions 31

The following keyword was typed in exactly as shown. Choose the answer(s) that would result. All search criteria have default settings. Tom Jones

Options:

A.

tom jones

B.

Tom

C.

Jones

D.

Tom Jones

Buy Now
Questions 32

When an EnCase user double-clicks on a valid .jpg file, that file is:

Options:

A.

Copied to the default export folder and opened by an associated program.

B.

Renamed to JPG_0001.jpg and copied to the default export folder.

C.

Copied to the EnCase specified temp folder and opened by an associated program.

D.

Opened by EnCase.

Buy Now
Questions 33

By default, what color does EnCase use for the contents of a logical file

Options:

A.

Red

B.

Red on black

C.

Black

D.

Black on red

Buy Now
Questions 34

For an EnCase evidence file acquired with a hash value to pass verification, which of the following must be true?

Options:

A.

The MD5 hash value must verify.

B.

The CRC values must verify.

C.

The CRC values and the MD5 hash value both must verify.

D.

Either the CRC or MD5 hash values must verify.

Buy Now
Questions 35

The signature table data is found in which of the following files?

Options:

A.

The evidence file

B.

The configuration FileSignatures.ini file

C.

All of the above

D.

The case file

Buy Now
Questions 36

The following GREP expression was typed in exactly as shown. Choose the answer(s) that would result.[\x00-\x05]\x00\x00? & gt;[?[@?[?[?[

Options:

A.

FF 0000 00 00 FF BA

B.

0000 00 01 FF FF BA

C.

04 06 0000 00 FF FF BA

D.

04 0000 00 FF FF BA

Buy Now
Questions 37

Before utilizing an analysis technique on computer evidence, the investigator should:

Options:

A.

Test the technique on simulated evidence in a controlled environment to confirm that the results are consistent.

B.

Be trained in the employment of the technique.

C.

Botha and b.

D.

Neithera or b.

Buy Now
Questions 38

4 bits allows what number of possibilities?

Options:

A.

16

B.

4

C.

2

D.

8

Buy Now
Questions 39

When a document is printed using EMF in Windows, what file(s) are generated in the spooling process?

Options:

A.

The .SHD file

B.

The .SPL file

C.

Neither a or b

D.

Both a and b

Buy Now
Questions 40

The EnCase signature analysis is used to perform which of the following actions?

Options:

A.

Analyzing the relationship of a file signature to its file extension.Analyzing the relationship of a file signature to its file extension.

B.

Analyzing the relationship of a file signature to its file header.Analyzing the relationship of a file signature to its file header.

C.

Analyzing the relationship of a file signature to a list of hash sets.Analyzing the relationship of a file signature to a list of hash sets.

D.

Analyzing the relationship of a file signature to its computed MD5 hash value.Analyzing the relationship of a file signature to its computed MD5 hash value.

Buy Now
Questions 41

When a file is deleted in the FAT or NTFS file systems, what happens to the data on the hard drive?

Options:

A.

Nothing

B.

It is moved to a special area.

C.

It is overwritten with zeroes.

D.

The file header is marked with a Sigma so the file is not recognized by the operating system.

Buy Now
Questions 42

A CPU is:

Options:

A.

A chip that would be considered the brain of a computer, which is installed on a motherboard.

B.

A Central Programming Unit.

C.

A motherboard with all required devices connected.

D.

An entire computer box, not including the monitor and other attached peripheral devices.

Buy Now
Questions 43

How many copies of the FAT are located on a FAT 32, Windows 98-formatted partition?

Options:

A.

2

B.

3

C.

1

D.

4

Buy Now
Questions 44

How are the results of a signature analysis examined?

Options:

A.

By sorting on the category column in the Table view. By sorting on the category column in the Table view.

B.

By sorting on the signature column in the Table view. By sorting on the signature column in the Table view.

C.

By sorting on the hash sets column in the Table view. By sorting on the hash sets column in the Table view.

D.

By sorting on the hash library column in the Table view. By sorting on the hash library column in the Table view.

Buy Now
Questions 45

The default export folder remains the same for all cases.

Options:

A.

True

B.

False

Buy Now
Questions 46

Which of the following statements is more accurate?

Options:

A.

The Recycle Bin increases the chance of locating the existence of a file on a computer.

B.

The Recycle Bin reduces the chance of locating the existence of a file on a computer.

Buy Now
Questions 47

You are at an incident scene and determine that a computer contains evidence as described in the search warrant. When you seize the computer, you should:

Options:

A.

Record nothing to avoid inaccuracies that might jeopardize the use of the evidence.

B.

Record the location that the computer was recovered from.

C.

Record the identity of the person(s) involved in the seizure.

D.

Record the date and time the computer was seized.

Buy Now
Questions 48

If cluster #3552 entry in the FAT table contains a value of ?? this would mean:

Options:

A.

The cluster is unallocated

B.

The cluster is the end of a file

C.

The cluster is allocated

D.

The cluster is marked bad

Buy Now
Questions 49

The EnCase evidence file logical filename can be changed without affecting the verification of the acquired evidence.

Options:

A.

True

B.

False

Buy Now
Questions 50

Which of the following items could contain digital evidence?

Options:

A.

Credit card readers

B.

Personal assistant devices

C.

Cellular phones

D.

Digital cameras

Buy Now
Questions 51

The EnCase methodology dictates that ________ be created prior to acquiring evidence.

Options:

A.

a unique directory on the lab drive for case management

B.

a text file for notes

C.

All of the above

D.

an .E01 file on the lab drive

Buy Now
Questions 52

Which of the following selections is NOT found in the case file

Options:

A.

External viewers

B.

Pointers to evidence files

C.

Signature analysis results

D.

Search results

Buy Now
Exam Code: GD0-100
Exam Name: Certification Exam For ENCE North America
Last Update: Apr 30, 2026
Questions: 176

PDF + Testing Engine

$63.52  $181.49

Testing Engine

$50.57  $144.49
buy now GD0-100 testing engine

PDF (Q&A)

$43.57  $124.49
buy now GD0-100 pdf