ExamGecko
Home Home / ECCouncil / 312-49v10

ECCouncil 312-49v10 Practice Test - Questions Answers, Page 11

Question list
Search
Search

List of questions

Search

Related questions











One way to identify the presence of hidden partitions on a suspect's hard drive is to:

A.
Add up the total size of all known partitions and compare it to the total size of the hard drive
A.
Add up the total size of all known partitions and compare it to the total size of the hard drive
Answers
B.
Examine the FAT and identify hidden partitions by noting an H in the partition Type field
B.
Examine the FAT and identify hidden partitions by noting an H in the partition Type field
Answers
C.
Examine the LILO and note an H in the partition Type field
C.
Examine the LILO and note an H in the partition Type field
Answers
D.
It is not possible to have hidden partitions on a hard drive
D.
It is not possible to have hidden partitions on a hard drive
Answers
Suggested answer: A

What information do you need to recover when searching a victim's computer for a crime committed with specific e-mail message?

A.
Internet service provider information
A.
Internet service provider information
Answers
B.
E-mail header
B.
E-mail header
Answers
C.
Username and password
C.
Username and password
Answers
D.
Firewall log
D.
Firewall log
Answers
Suggested answer: B

Melanie was newly assigned to an investigation and asked to make a copy of all the evidence from the compromised system. Melanie did a DOS copy of all the files on the system. What would be the primary reason for you to recommend a disk imaging tool?

A.
A disk imaging tool would check for CRC32s for internal self-checking and validation and have MD5 checksum
A.
A disk imaging tool would check for CRC32s for internal self-checking and validation and have MD5 checksum
Answers
B.
Evidence file format will contain case data entered by the examiner and encrypted at the beginning of the evidence file
B.
Evidence file format will contain case data entered by the examiner and encrypted at the beginning of the evidence file
Answers
C.
A simple DOS copy will not include deleted files, file slack and other information
C.
A simple DOS copy will not include deleted files, file slack and other information
Answers
D.
There is no case for an imaging tool as it will use a closed, proprietary format that if compared to the original will not match up sector for sector
D.
There is no case for an imaging tool as it will use a closed, proprietary format that if compared to the original will not match up sector for sector
Answers
Suggested answer: C

You are employed directly by an attorney to help investigate an alleged sexual harassment case at a large pharmaceutical manufacture. While at the corporate office of the company, the CEO demands to know the status of the investigation. What prevents you from discussing the case with the CEO?

A.
the attorney-work-product rule
A.
the attorney-work-product rule
Answers
B.
Good manners
B.
Good manners
Answers
C.
Trade secrets
C.
Trade secrets
Answers
D.
ISO 17799
D.
ISO 17799
Answers
Suggested answer: A

One technique for hiding information is to change the file extension from the correct one to one that might not be noticed by an investigator. For example, changing a .jpg extension to a .doc extension so that a picture file appears to be a document. What can an investigator examine to verify that a file has the correct extension?

A.
the File Allocation Table
A.
the File Allocation Table
Answers
B.
the file header
B.
the file header
Answers
C.
the file footer
C.
the file footer
Answers
D.
the sector map
D.
the sector map
Answers
Suggested answer: B

This organization maintains a database of hash signatures for known software.

A.
International Standards Organization
A.
International Standards Organization
Answers
B.
Institute of Electrical and Electronics Engineers
B.
Institute of Electrical and Electronics Engineers
Answers
C.
National Software Reference Library
C.
National Software Reference Library
Answers
D.
American National standards Institute
D.
American National standards Institute
Answers
Suggested answer: C

The ____________________ refers to handing over the results of private investigations to the authorities because of indications of criminal activity.

A.
Locard Exchange Principle
A.
Locard Exchange Principle
Answers
B.
Clark Standard
B.
Clark Standard
Answers
C.
Kelly Policy
C.
Kelly Policy
Answers
D.
Silver-Platter Doctrine
D.
Silver-Platter Doctrine
Answers
Suggested answer: D

You are working as Computer Forensics investigator and are called by the owner of an accounting firm to investigate possible computer abuse by one of the firm's employees. You meet with the owner of the firm and discover that the company has never published a policy stating that they reserve the right to inspect their computing assets at will. What do you do?

A.
Inform the owner that conducting an investigation without a policy is not a problem because the company is privately owned
A.
Inform the owner that conducting an investigation without a policy is not a problem because the company is privately owned
Answers
B.
Inform the owner that conducting an investigation without a policy is a violation of the 4th amendment
B.
Inform the owner that conducting an investigation without a policy is a violation of the 4th amendment
Answers
C.
Inform the owner that conducting an investigation without a policy is a violation of the employee's expectation of privacy
C.
Inform the owner that conducting an investigation without a policy is a violation of the employee's expectation of privacy
Answers
D.
Inform the owner that conducting an investigation without a policy is not a problem because a policy is only necessary for government agencies
D.
Inform the owner that conducting an investigation without a policy is not a problem because a policy is only necessary for government agencies
Answers
Suggested answer: C

During the course of a corporate investigation, you find that an Employee is committing a crime.

Can the Employer file a criminal complaint with Police?

A.
Yes, and all evidence can be turned over to the police
A.
Yes, and all evidence can be turned over to the police
Answers
B.
Yes, but only if you turn the evidence over to a federal law enforcement agency
B.
Yes, but only if you turn the evidence over to a federal law enforcement agency
Answers
C.
No, because the investigation was conducted without following standard police procedures
C.
No, because the investigation was conducted without following standard police procedures
Answers
D.
No, because the investigation was conducted without warrant
D.
No, because the investigation was conducted without warrant
Answers
Suggested answer: A

____________________ is simply the application of Computer Investigation and analysis techniques in the interests of determining potential legal evidence.

A.
Network Forensics
A.
Network Forensics
Answers
B.
Computer Forensics
B.
Computer Forensics
Answers
C.
Incident Response
C.
Incident Response
Answers
D.
Event Reaction
D.
Event Reaction
Answers
Suggested answer: B
Total 704 questions
Go to page: of 71