Vcehome > EC-COUNCIL > Certified Ethical Hacker > 312-49 > 312-49 Online Practice Questions and Answers

312-49 Online Practice Questions and Answers

Questions 4

A suspect is accused of violating the acceptable use of computing resources, as he has visited adult websites and downloaded images. The investigator wants to demonstrate that the suspect did indeed visit these sites. However, the suspect has cleared the search history and emptied the cookie cache. Moreover, he has removed any images he might have downloaded. What can the investigator do to prove the violation?

A. Image the disk and try to recover deleted files

B. Seek the help of co-workers who are eye-witnesses

C. Check the Windows registry for connection data (you may or may not recover)

D. Approach the websites for evidence

Browse 531 Q&As
Questions 5

If you plan to startup a suspect's computer, you must modify the ___________ to ensure that you do not contaminate or alter data on the suspect's hard drive by booting to the hard drive.

A. deltree command

B. CMOS

C. Boot.sys

D. Scandisk utility

Browse 531 Q&As
Questions 6

When reviewing web logs, you see an entry for resource not found in the HTTP status code filed. What is the actual error code that you would see in the log for resource not found?

A. 202

B. 404

C. 505

D. 909

Browse 531 Q&As
Questions 7

Where is the default location for Apache access logs on a Linux computer?

A. usr/local/apache/logs/access_log

B. bin/local/home/apache/logs/access_log

C. usr/logs/access_log

D. logs/usr/apache/access_log

Browse 531 Q&As
Questions 8

Where are files temporarily written in Unix when printing?

A. /usr/spool

B. /var/print

C. /spool

D. /var/spool

Browse 531 Q&As
Questions 9

All Blackberry email is eventually sent and received through what proprietary RIM-operated mechanism?

A. Blackberry Message Center

B. Microsoft Exchange

C. Blackberry WAP gateway

D. Blackberry WEP gateway

Browse 531 Q&As
Questions 10

What encryption technology is used on Blackberry devices Password Keeper?

A. 3DES

B. AES

C. Blowfish

D. RC5

Browse 531 Q&As
Questions 11

Using Linux to carry out a forensics investigation, what would the following command accomplish? dd if=/usr/home/partition.image of=/dev/sdb2 bs=4096 conv=notrunc,noerror

A. Search for disk errors within an image file

B. Backup a disk to an image file

C. Copy a partition to an image file

D. Restore a disk from an image file

Browse 531 Q&As
Questions 12

Watson, a forensic investigator, is examining a copy of an ISO file stored in CDFS format. What type of evidence is this?

A. Data from a CD copied using Windows

B. Data from a CD copied using Mac-based system

C. Data from a DVD copied using Windows system

D. Data from a CD copied using Linux system

Browse 531 Q&As
Questions 13

For what purpose do the investigators use tools like iPhoneBrowser, iFunBox, OpenSSHSSH, and iMazing?

A. Bypassing iPhone passcode

B. Debugging iPhone

C. Rooting iPhone

D. Copying contents of iPhone

Browse 531 Q&As
Exam Code: 312-49
Exam Name: ECCouncil Computer Hacking Forensic Investigator (V9)
Last Update: May 02, 2024
Questions: 531 Q&As

PDF

$49.99

VCE

$59.99

PDF + VCE

$67.99