Vcehome > EC-COUNCIL > Certified Ethical Hacker > 312-49V10 > 312-49V10 Online Practice Questions and Answers

312-49V10 Online Practice Questions and Answers

Questions 4

The objective of this act was to protect consumers personal financial information held by financial institutions and their service providers.

A. HIPAA

B. Sarbanes-Oxley 2002

C. California SB 1386

D. Gramm-Leach-Bliley Act

Browse 753 Q&As
Questions 5

This is the original file structure database that Microsoft originally designed for floppy disks. It is written to the outermost track of a disk and contains information about each file stored on the drive.

A. Master Boot Record (MBR)

B. Master File Table (MFT)

C. File Allocation Table (FAT)

D. Disk Operating System (DOS)

Browse 753 Q&As
Questions 6

Jessica works as systems administrator for a large electronics firm. She wants to scan her network quickly to detect live hosts by using ICMP ECHO Requests. What type of scan is Jessica going to perform?

A. ICMP ping sweep

B. Ping trace

C. Tracert

D. Smurf scan

Browse 753 Q&As
Questions 7

You have completed a forensic investigation case. You would like to destroy the data contained in various disks at the forensics lab due to sensitivity of the case. How would you permanently erase the data on the hard disk?

A. Throw the hard disk into the fire

B. Run the powerful magnets over the hard disk

C. Format the hard disk multiple times using a low level disk utility

D. Overwrite the contents of the hard disk with Junk data

Browse 753 Q&As
Questions 8

Which of the following filesystem is used by Mac OS X?

A. EFS

B. HFS+

C. EXT2

D. NFS

Browse 753 Q&As
Questions 9

You are working for a large clothing manufacturer as a computer forensics investigator and are called in to investigate an unusual case of an employee possibly stealing clothing designs from the company and selling them under a different brand name for a different company. What you discover during the course of the investigation is that the clothing designs are actually original products of the employee and the company has no policy against an employee selling his own designs on his own time. The only thing that you can find that the employee is doing wrong is that his clothing design incorporates the same graphic symbol as that of the company with only the wording in the graphic being different. What area of the law is the employee violating?

A. Copyright law

B. Brandmark law

C. Trademark law

D. Printright law

Browse 753 Q&As
Questions 10

Which among the following tools can help a forensic investigator to access the registry files during postmortem analysis?

A. RegistryChangesView

B. RegDIIView

C. RegRipper

D. ProDiscover

Browse 753 Q&As
Questions 11

In Steganalysis, which of the following describes a Known-stego attack?

A. The hidden message and the corresponding stego-image are known

B. During the communication process, active attackers can change cover

C. Original and stego-object are available and the steganography algorithm is known

D. Only the steganography medium is available for analysis

Browse 753 Q&As
Questions 12

Randy has extracted data from an old version of a Windows-based system and discovered info file Dc5.txt in the system recycle bin. What does the file name denote?

A. A text file deleted from C drive in sixth sequential order

B. A text file deleted from C drive in fifth sequential order

C. A text file copied from D drive to C drive in fifth sequential order

D. A text file copied from C drive to D drive in fifth sequential order

Browse 753 Q&As
Questions 13

Gary is checking for the devices connected to USB ports of a suspect system during an investigation. Select the appropriate tool that will help him document all the connected devices.

A. DevScan

B. Devcon

C. fsutil

D. Reg.exe

Browse 753 Q&As
Exam Code: 312-49V10
Exam Name: ECCouncil Computer Hacking Forensic Investigator (V10)
Last Update:
Questions: 753 Q&As

PDF

$49.99

VCE

$59.99

PDF + VCE

$67.99