Free 312-49 Exam Braindumps (page: 32)

Page 32 of 133

In conducting a computer abuse investigation you become aware that the suspect of the investigation is using ABC Company as his Internet Service Provider (ISP). You contact ISP and request that they provide you assistance with your investigation. What assistance can the ISP provide?

  1. The ISP can investigate anyone using their service and can provide you with assistance
  2. The ISP can investigate computer abuse committed by their employees, but must preserve the privacy of their customers and therefore cannot assist you without a warrant
  3. The ISP can't conduct any type of investigations on anyone and therefore can't assist you
  4. ISP's never maintain log files so they would be of no use to your investigation

Answer(s): B



You are assisting in the investigation of a possible Web Server Hack. The company who called you stated that customers reported to them that whenever they entered the web address of the company in their browser, what they received was a porno graphic web site. The company checked the web server and nothing appears wrong. When you type in the IP address of the web site in your browser everything appears normal. What is the name of the attack that affects the DNS cache of the name resolution servers, resulting in those servers directing users to the wrong web site?

  1. ARP Poisoning
  2. DNS Poisoning
  3. HTTP redirect attack
  4. IP Spoofing

Answer(s): B



You are working as an independent computer forensics investigator and receive a call from a systems administrator for a local school system requesting your assistance. One of the students at the local high school is suspected of downloading inappropriate images from the Internet to a PC in the Computer lab. When you arrive at the school, the systems administrator hands you a hard drive and tells you that he made a simple backup copy of the hard drive in the PC and put it on this drive and requests that you examine that drive for evidence of the suspected images. You inform him that a simple backup copy will not provide deleted files or recover file fragments. What type of copy do you need to make to ensure that the evidence found is complete and admissible in future proceedings?

  1. Bit-stream Copy
  2. Robust Copy
  3. Full backup Copy
  4. Incremental Backup Copy

Answer(s): A



Law enforcement officers are conducting a legal search for which a valid warrant was obtained.
While conducting the search, officers observe an item of evidence for an unrelated crime that was not included in the warrant. The item was clearly visible to the officers and immediately identified as evidence. What is the term used to describe how this evidence is admissible?

  1. Plain view doctrine
  2. Corpus delicti
  3. Locard Exchange Principle
  4. Ex Parte Order

Answer(s): A



Page 32 of 133



Post your Comments and Discuss EC-Council 312-49 exam with other Community members:

Valery commented on August 13, 2024
What version of exam have this dumps?
KAZAKHSTAN
upvote

Moorthy commented on June 01, 2024
This is the best place to pratice C_CPI_15 exam.
Anonymous
upvote

Carlos commented on February 29, 2024
@AKM, I took this exam about 2 weeks ago. The questions in this exam dumps are very similar to the exam. However some answers were not that accurate. I got the full PDF version with the testing software called Xengien app. It did help me pass my exam. So yes, it is worth it.
UNITED STATES
upvote

AKM commented on February 29, 2024
Have anyone took the test after practicing here? What is accuracy of this question compared to actual test
INDIA
upvote

SA commented on February 07, 2024
Great place to test your preparation.
INDIA
upvote

Balu commented on November 03, 2014
Thank you so much for helping me on this. Let me have a look on this and will provide further update as soon as possible.
UNITED STATES
upvote