ECCouncil 312-49v10 Practice Test - Questions Answers, Page 11
List of questions
Question 101

One way to identify the presence of hidden partitions on a suspect's hard drive is to:
Question 102

What information do you need to recover when searching a victim's computer for a crime committed with specific e-mail message?
Question 103

Melanie was newly assigned to an investigation and asked to make a copy of all the evidence from the compromised system. Melanie did a DOS copy of all the files on the system. What would be the primary reason for you to recommend a disk imaging tool?
Question 104

You are employed directly by an attorney to help investigate an alleged sexual harassment case at a large pharmaceutical manufacture. While at the corporate office of the company, the CEO demands to know the status of the investigation. What prevents you from discussing the case with the CEO?
Question 105

One technique for hiding information is to change the file extension from the correct one to one that might not be noticed by an investigator. For example, changing a .jpg extension to a .doc extension so that a picture file appears to be a document. What can an investigator examine to verify that a file has the correct extension?
Question 106

This organization maintains a database of hash signatures for known software.
Question 107

The ____________________ refers to handing over the results of private investigations to the authorities because of indications of criminal activity.
Question 108

You are working as Computer Forensics investigator and are called by the owner of an accounting firm to investigate possible computer abuse by one of the firm's employees. You meet with the owner of the firm and discover that the company has never published a policy stating that they reserve the right to inspect their computing assets at will. What do you do?
Question 109

During the course of a corporate investigation, you find that an Employee is committing a crime.
Can the Employer file a criminal complaint with Police?
Question 110

____________________ is simply the application of Computer Investigation and analysis techniques in the interests of determining potential legal evidence.
Question