EC-Council 312-49 Exam
Computer Hacking Forensic Investigator (Page 13 )

Updated On: 9-Feb-2026

Jason is the security administrator of ACMA metal Corporation. One day he notices the company's Oracle database server has been compromised and the customer information along with financial data has been stolen. The financial loss will be in millions of dollars if the database gets into the hands of the competitors. Jason wants to report this crime to the law enforcement agencies immediately.
Which organization coordinates computer crimes investigations throughout the United States?

  1. Internet Fraud Complaint Center
  2. Local or national office of the U.S. Secret Service
  3. National Infrastructure Protection Center
  4. CERT Coordination Center

Answer(s): B



Which Intrusion Detection System (IDS) usually produces the most false alarms due to the unpredictable behaviors of users and networks?

  1. network-based IDS systems (NIDS)
  2. host-based IDS systems (HIDS)
  3. anomaly detection
  4. signature recognition

Answer(s): B



You should make at least how many bit-stream copies of a suspect drive?

  1. 1
  2. 2
  3. 3
  4. 4

Answer(s): B



Why should you note all cable connections for a computer you want to seize as evidence?

  1. to know what outside connections existed
  2. in case other devices were connected
  3. to know what peripheral devices exist
  4. to know what hardware existed

Answer(s): A



What header field in the TCP/IP protocol stack involves the hacker exploit known as the Ping of Death?

  1. ICMP header field
  2. TCP header field
  3. IP header field
  4. UDP header field

Answer(s): B






Post your Comments and Discuss EC-Council 312-49 exam prep with other Community members:

Join the 312-49 Discussion