ECCouncil 312-49v10 Practice Test - Questions Answers, Page 12

List of questions
Question 111

What is the name of the Standard Linux Command that is also available as windows application that can be used to create bit-stream images?
Question 112

To preserve digital evidence, an investigator should ____________________.
Question 113

Profiling is a forensics technique for analyzing evidence with the goal of identifying the perpetrator from their various activity. After a computer has been compromised by a hacker, which of the following would be most important in forming a profile of the incident?
Question 114

Printing under a Windows Computer normally requires which one of the following files types to be created?
Question 115

An Expert witness give an opinion if:
Question 116

When using Windows acquisitions tools to acquire digital evidence, it is important to use a welltested hardware write-blocking device to:
Question 117

Office Documents (Word, Excel and PowerPoint) contain a code that allows tracking the MAC or unique identifier of the machine that created the document. What is that code called?
Question 118

You have completed a forensic investigation case. You would like to destroy the data contained in various disks at the forensics lab due to sensitivity of the case. How would you permanently erase the data on the hard disk?
Question 119

You have been asked to investigate after a user has reported a threatening e-mail they have received from an external source. Which of the following are you most interested in when trying to trace the source of the message?
Question 120

You are working as a Computer forensics investigator for a corporation on a computer abuse case.
You discover evidence that shows the subject of your investigation is also embezzling money from the company. The company CEO and the corporate legal counsel advise you to contact law enforcement and provide them with the evidence that you have found. The law enforcement officer that responds requests that you put a network sniffer on your network and monitor all traffic to the subject's computer. You inform the officer that you will not be able to comply with that request because doing so would:
Question