ExamGecko
Home Home / ECCouncil / 312-49v10

ECCouncil 312-49v10 Practice Test - Questions Answers, Page 25

Question list
Search
Search

Related questions











Harold is a computer forensics investigator working for a consulting firm out of Atlanta Georgi a. Harold is called upon to help with a corporate espionage case in Miami Florida. Harold assists in the investigation by pulling all the data from the computers allegedly used in the illegal activities. He finds that two suspects in the company where stealing sensitive corporate information and selling it to competing companies. From the email and instant messenger logs recovered, Harold has discovered that the two employees notified the buyers by writing symbols on the back of specific stop signs. This way, the buyers knew when and where to meet with the alleged suspects to buy the stolen material. What type of steganography did these two suspects use?

A.
Text semagram
A.
Text semagram
Answers
B.
Visual semagram
B.
Visual semagram
Answers
C.
Grill cipher
C.
Grill cipher
Answers
D.
Visual cipher
D.
Visual cipher
Answers
Suggested answer: B

What is the CIDR from the following screenshot?

A.
/24A./24A./24
A.
/24A./24A./24
Answers
B.
/32 B./32 B./32
B.
/32 B./32 B./32
Answers
C.
/16 C./16 C./16
C.
/16 C./16 C./16
Answers
D.
/8D./8D./8
D.
/8D./8D./8
Answers
Suggested answer: D

How many times can data be written to a DVD+R disk?

A.
Twice
A.
Twice
Answers
B.
Once
B.
Once
Answers
C.
Zero
C.
Zero
Answers
D.
Infinite
D.
Infinite
Answers
Suggested answer: B

What must be obtained before an investigation is carried out at a location?

A.
Search warrant
A.
Search warrant
Answers
B.
Subpoena
B.
Subpoena
Answers
C.
Habeas corpus
C.
Habeas corpus
Answers
D.
Modus operandi
D.
Modus operandi
Answers
Suggested answer: A

Paul is a computer forensics investigator working for Tyler & Company Consultants. Paul has been called upon to help investigate a computer hacking ring broken up by the local police. Paul begins to inventory the PCs found in the hackers hideout. Paul then comes across a PDA left by them that is attached to a number of different peripheral devices. What is the first step that Paul must take with the PDA to ensure the integrity of the investigation?

A.
Place PDA, including all devices, in an antistatic bag
A.
Place PDA, including all devices, in an antistatic bag
Answers
B.
Unplug all connected devices
B.
Unplug all connected devices
Answers
C.
Power off all devices if currently on
C.
Power off all devices if currently on
Answers
D.
Photograph and document the peripheral devices
D.
Photograph and document the peripheral devices
Answers
Suggested answer: D

During an investigation, an employee was found to have deleted harassing emails that were sent to someone else. The company was using Microsoft Exchange and had message tracking enabled.

Where could the investigator search to find the message tracking log file on the Exchange server?

A.
C:\Program Files\Exchsrvr\servername.log
A.
C:\Program Files\Exchsrvr\servername.log
Answers
B.
D:\Exchsrvr\Message Tracking\servername.log
B.
D:\Exchsrvr\Message Tracking\servername.log
Answers
C.
C:\Exchsrvr\Message Tracking\servername.log
C.
C:\Exchsrvr\Message Tracking\servername.log
Answers
D.
C:\Program Files\Microsoft Exchange\srvr\servername.log
D.
C:\Program Files\Microsoft Exchange\srvr\servername.log
Answers
Suggested answer: A

Paraben Lockdown device uses which operating system to write hard drive data?

A.
Mac OS
A.
Mac OS
Answers
B.
Red Hat
B.
Red Hat
Answers
C.
Unix
C.
Unix
Answers
D.
Windows
D.
Windows
Answers
Suggested answer: D

What technique is used by JPEGs for compression?

A.
ZIP
A.
ZIP
Answers
B.
TCD
B.
TCD
Answers
C.
DCT
C.
DCT
Answers
D.
TIFF-8
D.
TIFF-8
Answers
Suggested answer: C

John is working as a computer forensics investigator for a consulting firm in Canad a. He is called to seize a computer at a local web caf purportedly used as a botnet server. John thoroughly scans the computer and finds nothing that would lead him to think the computer was a botnet server. John decides to scan the virtual memory of the computer to possibly find something he had missed. What information will the virtual memory scan produce?

A.
It contains the times and dates of when the system was last patched
A.
It contains the times and dates of when the system was last patched
Answers
B.
It is not necessary to scan the virtual memory of a computer
B.
It is not necessary to scan the virtual memory of a computer
Answers
C.
It contains the times and dates of all the system files
C.
It contains the times and dates of all the system files
Answers
D.
Hidden running processes
D.
Hidden running processes
Answers
Suggested answer: D

What method of copying should always be performed first before carrying out an investigation?

A.
Parity-bit copy
A.
Parity-bit copy
Answers
B.
Bit-stream copy
B.
Bit-stream copy
Answers
C.
MS-DOS disc copy
C.
MS-DOS disc copy
Answers
D.
System level copy
D.
System level copy
Answers
Suggested answer: B
Total 704 questions
Go to page: of 71