Vcehome > EC-COUNCIL > CHFI > EC1-349 > EC1-349 Online Practice Questions and Answers

EC1-349 Online Practice Questions and Answers

Questions 4

Davidson Trucking is a small transportation company that has three local offices in Detroit Michigan. Ten female employees that work for the company have gone to an attorney reporting that male employees repeatedly harassed them and that management did nothing to stop the problem. Davidson has employee policies that outline all company guidelines, including awareness on harassment and how it will not be tolerated. When the case is brought to court, whom should the prosecuting attorney call upon for not upholding company policy?

A. IT personnel

B. Employees themselves

C. Supervisors

D. Administrative assistant in charge of writing policies

Browse 486 Q&As
Questions 5

Harold is a computer forensics investigator working for a consulting firm out of Atlanta Georgia. Harold is called upon to help with a corporate espionage case in Miami Florida. Harold assists in the investigation by pulling all the data from the computers allegedly used in the illegal activities. He finds that two suspects in the company where stealing sensitive corporate information and selling it to competing companies. From the email and instant messenger logs recovered, Harold has discovered that the two employees notified the buyers by writing symbols on the back of specific stop signs. This way, the buyers knew when and where to meet with the alleged suspects to buy the stolen material. What type of steganography did these two suspects use?

A. Text semagram

B. Visual semagram

C. Grill cipher

D. Visual cipher

Browse 486 Q&As
Questions 6

Which of the following should a computer forensics lab used for investigations have?

A. isolation

B. restricted access

C. open access

D. an entry log

Browse 486 Q&As
Questions 7

Click on the Exhibit Button Paulette works for an IT security consulting company that is currently performing an audit for the firm ACE Unlimited. Paulette's duties include logging on to all the company's network equipment to ensure IOS versions are up-to-date and all the other security settings are as stringent as possible. Paulette presents the following screenshot to her boss so he can inform the client about necessary changes need to be made. From the screenshot, what changes should the client company make?

A. The banner should include the Cisco tech support contact information as well

B. The banner should have more detail on the version numbers for the networkeQuipment

C. The banner should not state "only authorized IT personnel may proceed"

D. Remove any identifying numbers, names, or version information

Browse 486 Q&As
Questions 8

Steven has been given the task of designing a computer forensics lab for the company he works for. He has found documentation on all aspects of how to design a lab except the number of exits needed. How many exits should Steven include in his design for the computer forensics lab?

A. Three

B. One

C. Two

D. Four

Browse 486 Q&As
Questions 9

When operating systems mark a cluster as used but not allocated, the cluster is considered as _________

A. Corrupt

B. Bad

C. Lost

D. Unallocated

Browse 486 Q&As
Questions 10

What TCP/UDP port does the toolkit program netstat use?

A. Port 7

B. Port 15

C. Port 23

D. Port 69

Browse 486 Q&As
Questions 11

Attackers can manipulate variables that reference files with "dot-dot-slash (./)" sequences and their variations such as http://www.juggyDoy.corn/GET/process.php./././././././././etc/passwd.

Identify the attack referred.

A. Directory traversal

B. SQL Injection

C. XSS attack

D. File injection

Browse 486 Q&As
Questions 12

Shortcuts are the files with the extension .Ink that are created and are accessed by the users. These files provide you with information about:

A. Files or network shares

B. Running application

C. Application logs

D. System logs

Browse 486 Q&As
Questions 13

Microsoft Security IDs are available in Windows Registry Editor. The path to locate IDs in Windows 7 is:

A. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\Currentversion \ProfileList

B. HKEY_LOCAL_MACHlNE\SOFTWARE\Microsoft\Windows NT\CurrentVersion \NetworkList

C. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentsVersion \setup

D. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule

Browse 486 Q&As
Exam Code: EC1-349
Exam Name: Computer Hacking Forensic Investigator Exam
Last Update: Apr 22, 2024
Questions: 486 Q&As

PDF

$49.99

VCE

$59.99

PDF + VCE

$67.99