ExamGecko
Home Home / ECCouncil / 312-49v10

ECCouncil 312-49v10 Practice Test - Questions Answers, Page 13

Question list
Search
Search

List of questions

Search

Related questions











A law enforcement officer may only search for and seize criminal evidence with _______________________, which are facts or circumstances that would lead a reasonable person to believe a crime has been committed or is about to be committed, evidence of the specific crime exists and the evidence of the specific crime exists at the place to be searched.

A.
Mere Suspicion
A.
Mere Suspicion
Answers
B.
A preponderance of the evidence
B.
A preponderance of the evidence
Answers
C.
Probable cause
C.
Probable cause
Answers
D.
Beyond a reasonable doubt
D.
Beyond a reasonable doubt
Answers
Suggested answer: C

The police believe that Melvin Matthew has been obtaining unauthorized access to computers belonging to numerous computer software and computer operating systems manufacturers, cellular telephone manufacturers, Internet Service Providers and Educational Institutions. They also suspect that he has been stealing, copying and misappropriating proprietary computer software belonging to the several victim companies. What is preventing the police from breaking down the suspects door and searching his home and seizing all of his computer equipment if they have not yet obtained a warrant?

A.
The Fourth Amendment
A.
The Fourth Amendment
Answers
B.
The USA patriot Act
B.
The USA patriot Act
Answers
C.
The Good Samaritan Laws
C.
The Good Samaritan Laws
Answers
D.
The Federal Rules of Evidence
D.
The Federal Rules of Evidence
Answers
Suggested answer: A

When cataloging digital evidence, the primary goal is to

A.
Make bit-stream images of all hard drives
A.
Make bit-stream images of all hard drives
Answers
B.
Preserve evidence integrity
B.
Preserve evidence integrity
Answers
C.
Not remove the evidence from the scene
C.
Not remove the evidence from the scene
Answers
D.
Not allow the computer to be turned off
D.
Not allow the computer to be turned off
Answers
Suggested answer: B

You are conducting an investigation of fraudulent claims in an insurance company that involves complex text searches through large numbers of documents. Which of the following tools would allow you to quickly and efficiently search for a string within a file on the bitmap image of the target computer?

A.
Stringsearch
A.
Stringsearch
Answers
B.
grep
B.
grep
Answers
C.
dir
C.
dir
Answers
D.
vim
D.
vim
Answers
Suggested answer: B

As a CHFI professional, which of the following is the most important to your professional reputation?

A.
Your Certifications
A.
Your Certifications
Answers
B.
The correct, successful management of each and every case
B.
The correct, successful management of each and every case
Answers
C.
The free that you charge
C.
The free that you charge
Answers
D.
The friendship of local law enforcement officers
D.
The friendship of local law enforcement officers
Answers
Suggested answer: B

In conducting a computer abuse investigation you become aware that the suspect of the investigation is using ABC Company as his Internet Service Provider (ISP). You contact ISP and request that they provide you assistance with your investigation. What assistance can the ISP provide?

A.
The ISP can investigate anyone using their service and can provide you with assistance
A.
The ISP can investigate anyone using their service and can provide you with assistance
Answers
B.
The ISP can investigate computer abuse committed by their employees, but must preserve the privacy of their customers and therefore cannot assist you without a warrant
B.
The ISP can investigate computer abuse committed by their employees, but must preserve the privacy of their customers and therefore cannot assist you without a warrant
Answers
C.
The ISP can't conduct any type of investigations on anyone and therefore can't assist you
C.
The ISP can't conduct any type of investigations on anyone and therefore can't assist you
Answers
D.
ISP's never maintain log files so they would be of no use to your investigation
D.
ISP's never maintain log files so they would be of no use to your investigation
Answers
Suggested answer: B

You are assisting in the investigation of a possible Web Server Hack. The company who called you stated that customers reported to them that whenever they entered the web address of the company in their browser, what they received was a porno graphic web site. The company checked the web server and nothing appears wrong. When you type in the IP address of the web site in your browser everything appears normal. What is the name of the attack that affects the

DNS cache of the name resolution servers, resulting in those servers directing users to the wrong web site?

A.
ARP Poisoning
A.
ARP Poisoning
Answers
B.
DNS Poisoning
B.
DNS Poisoning
Answers
C.
HTTP redirect attack
C.
HTTP redirect attack
Answers
D.
IP Spoofing
D.
IP Spoofing
Answers
Suggested answer: B

You are working as an independent computer forensics investigator and received a call from a systems administrator for a local school system requesting your assistance. One of the students at the local high school is suspected of downloading inappropriate images from the Internet to a PC in the Computer lab. When you arrive at the school, the systems administrator hands you a hard drive and tells you that he made a "simple backup copy" of the hard drive in the PC and put it on this drive and requests that you examine that drive for evidence of the suspected images. You inform him that a "simple backup copy" will not provide deleted files or recover file fragments.

What type of copy do you need to make to ensure that the evidence found is complete and admissible in future proceeding?

A.
Bit-stream Copy
A.
Bit-stream Copy
Answers
B.
Robust Copy
B.
Robust Copy
Answers
C.
Full backup Copy
C.
Full backup Copy
Answers
D.
Incremental Backup Copy
D.
Incremental Backup Copy
Answers
Suggested answer: A

Law enforcement officers are conducting a legal search for which a valid warrant was obtained.

While conducting the search, officers observe an item of evidence for an unrelated crime that was not included in the warrant. The item was clearly visible to the officers and immediately identified as evidence. What is the term used to describe how this evidence is admissible?

A.
Plain view doctrine
A.
Plain view doctrine
Answers
B.
Corpus delicti
B.
Corpus delicti
Answers
C.
Locard Exchange Principle
C.
Locard Exchange Principle
Answers
D.
Ex Parte Order
D.
Ex Parte Order
Answers
Suggested answer: A

Microsoft Outlook maintains email messages in a proprietary format in what type of file?

A.
.email
A.
.email
Answers
B.
.mail
B.
.mail
Answers
C.
.pst
C.
.pst
Answers
D.
.doc
D.
.doc
Answers
Suggested answer: C
Total 704 questions
Go to page: of 71