ExamGecko
Home / ECCouncil / 312-49v10 / List of questions
Ask Question

ECCouncil 312-49v10 Practice Test - Questions Answers, Page 25

Add to Whishlist

List of questions

Question 241

Report Export Collapse

Harold is a computer forensics investigator working for a consulting firm out of Atlanta Georgi a. Harold is called upon to help with a corporate espionage case in Miami Florida. Harold assists in the investigation by pulling all the data from the computers allegedly used in the illegal activities. He finds that two suspects in the company where stealing sensitive corporate information and selling it to competing companies. From the email and instant messenger logs recovered, Harold has discovered that the two employees notified the buyers by writing symbols on the back of specific stop signs. This way, the buyers knew when and where to meet with the alleged suspects to buy the stolen material. What type of steganography did these two suspects use?

Become a Premium Member for full access
  Unlock Premium Member

Question 242

Report Export Collapse

What is the CIDR from the following screenshot?

ECCouncil 312-49v10 image Question 242 24268 09182024185459000000

Become a Premium Member for full access
  Unlock Premium Member

Question 243

Report Export Collapse

How many times can data be written to a DVD+R disk?

Become a Premium Member for full access
  Unlock Premium Member

Question 244

Report Export Collapse

What must be obtained before an investigation is carried out at a location?

Become a Premium Member for full access
  Unlock Premium Member

Question 245

Report Export Collapse

Paul is a computer forensics investigator working for Tyler & Company Consultants. Paul has been called upon to help investigate a computer hacking ring broken up by the local police. Paul begins to inventory the PCs found in the hackers hideout. Paul then comes across a PDA left by them that is attached to a number of different peripheral devices. What is the first step that Paul must take with the PDA to ensure the integrity of the investigation?

Become a Premium Member for full access
  Unlock Premium Member

Question 246

Report Export Collapse

During an investigation, an employee was found to have deleted harassing emails that were sent to someone else. The company was using Microsoft Exchange and had message tracking enabled.

Where could the investigator search to find the message tracking log file on the Exchange server?

Become a Premium Member for full access
  Unlock Premium Member

Question 247

Report Export Collapse

Paraben Lockdown device uses which operating system to write hard drive data?

Become a Premium Member for full access
  Unlock Premium Member

Question 248

Report Export Collapse

What technique is used by JPEGs for compression?

Become a Premium Member for full access
  Unlock Premium Member

Question 249

Report Export Collapse

John is working as a computer forensics investigator for a consulting firm in Canad a. He is called to seize a computer at a local web caf purportedly used as a botnet server. John thoroughly scans the computer and finds nothing that would lead him to think the computer was a botnet server. John decides to scan the virtual memory of the computer to possibly find something he had missed. What information will the virtual memory scan produce?

Become a Premium Member for full access
  Unlock Premium Member

Question 250

Report Export Collapse

What method of copying should always be performed first before carrying out an investigation?

Become a Premium Member for full access
  Unlock Premium Member
Total 704 questions
Go to page: of 71

Related questions