ECCouncil 312-49v10 Practice Test - Questions Answers, Page 11
List of questions
Question 101
One way to identify the presence of hidden partitions on a suspect's hard drive is to:
Question 102
What information do you need to recover when searching a victim's computer for a crime committed with specific e-mail message?
Question 103
Melanie was newly assigned to an investigation and asked to make a copy of all the evidence from the compromised system. Melanie did a DOS copy of all the files on the system. What would be the primary reason for you to recommend a disk imaging tool?
Question 104
You are employed directly by an attorney to help investigate an alleged sexual harassment case at a large pharmaceutical manufacture. While at the corporate office of the company, the CEO demands to know the status of the investigation. What prevents you from discussing the case with the CEO?
Question 105
One technique for hiding information is to change the file extension from the correct one to one that might not be noticed by an investigator. For example, changing a .jpg extension to a .doc extension so that a picture file appears to be a document. What can an investigator examine to verify that a file has the correct extension?
Question 106
This organization maintains a database of hash signatures for known software.
Question 107
The ____________________ refers to handing over the results of private investigations to the authorities because of indications of criminal activity.
Question 108
You are working as Computer Forensics investigator and are called by the owner of an accounting firm to investigate possible computer abuse by one of the firm's employees. You meet with the owner of the firm and discover that the company has never published a policy stating that they reserve the right to inspect their computing assets at will. What do you do?
Question 109
During the course of a corporate investigation, you find that an Employee is committing a crime.
Can the Employer file a criminal complaint with Police?
Question 110
____________________ is simply the application of Computer Investigation and analysis techniques in the interests of determining potential legal evidence.
Question