ECCouncil 312-49v10 Practice Test - Questions Answers, Page 24

List of questions
Question 231

Travis, a computer forensics investigator, is finishing up a case he has been working on for over a month involving copyright infringement and embezzlement. His last task is to prepare an investigative report for the president of the company he has been working for. Travis must submit a hard copy and an electronic copy to this president. In what electronic format should Travis send this report?
Question 232

A forensics investigator is searching the hard drive of a computer for files that were recently moved to the Recycle Bin. He searches for files in C:\RECYCLED using a command line tool but does not find anything. What is the reason for this?
Question 233

Why should you never power on a computer that you need to acquire digital evidence from?
Question 234

What is the slave device connected to the secondary IDE controller on a Linux OS referred to?
Question 235

What will the following command accomplish? dd if=/dev/xxx of=mbr.backup bs=512 count=1
Question 236

Preparing an image drive to copy files to is the first step in Linux forensics. For this purpose, what would the following command accomplish? dcfldd if=/dev/zero of=/dev/hda bs=4096 conv=noerror, sync
Question 237

A picture file is recovered from a computer under investigation. During the investigation process, the file is enlarged 500% to get a better view of its contents. The picture quality is not degraded at all from this process. What kind of picture is this file. What kind of picture is this file?
Question 238

What advantage does the tool Evidor have over the built-in Windows search?
Question 239

An on-site incident response team is called to investigate an alleged case of computer tampering within their company. Before proceeding with the investigation, the CEO informs them that the incident will be classified as low level. How long will the team have to respond to the incident?
Question 240

What type of attack sends SYN requests to a target system with spoofed IP addresses?
Question