ECCouncil 312-49v10 Practice Test - Questions Answers, Page 24
List of questions
Related questions
Travis, a computer forensics investigator, is finishing up a case he has been working on for over a month involving copyright infringement and embezzlement. His last task is to prepare an investigative report for the president of the company he has been working for. Travis must submit a hard copy and an electronic copy to this president. In what electronic format should Travis send this report?
A forensics investigator is searching the hard drive of a computer for files that were recently moved to the Recycle Bin. He searches for files in C:\RECYCLED using a command line tool but does not find anything. What is the reason for this?
Why should you never power on a computer that you need to acquire digital evidence from?
What is the slave device connected to the secondary IDE controller on a Linux OS referred to?
What will the following command accomplish? dd if=/dev/xxx of=mbr.backup bs=512 count=1
Preparing an image drive to copy files to is the first step in Linux forensics. For this purpose, what would the following command accomplish? dcfldd if=/dev/zero of=/dev/hda bs=4096 conv=noerror, sync
A picture file is recovered from a computer under investigation. During the investigation process, the file is enlarged 500% to get a better view of its contents. The picture quality is not degraded at all from this process. What kind of picture is this file. What kind of picture is this file?
What advantage does the tool Evidor have over the built-in Windows search?
An on-site incident response team is called to investigate an alleged case of computer tampering within their company. Before proceeding with the investigation, the CEO informs them that the incident will be classified as low level. How long will the team have to respond to the incident?
What type of attack sends SYN requests to a target system with spoofed IP addresses?
Question