ECCouncil 312-49v10 Practice Test - Questions Answers, Page 22
List of questions
Related questions
What type of equipment would a forensics investigator store in a StrongHold bag?
If you are concerned about a high level of compression but not concerned about any possible data loss, what type of compression would you use?
When marking evidence that has been collected with the aa/ddmmyy/nnnn/zz format, what does the nnn denote?
An investigator is searching through the firewall logs of a company and notices ICMP packets that are larger than 65,536 bytes. What type of activity is the investigator seeing?
When carrying out a forensics investigation, why should you never delete a partition on a dynamic disk?
When using an iPod and the host computer is running Windows, what file system will be used?
What is one method of bypassing a system BIOS password?
What technique used by Encase makes it virtually impossible to tamper with evidence once it has been acquired?
What must an investigator do before disconnecting an iPod from any type of computer?
The following is a log file screenshot from a default installation of IIS 6.0.
What time standard is used by IIS as seen in the screenshot?
Question