EC-Council 312-49 Exam
Computer Hacking Forensic Investigator (Page 15 )

Updated On: 9-Feb-2026

Under which Federal Statutes does FBI investigate for computer crimes involving e-mail scams and mail fraud?

  1. 18 U.S.C. 1029 Possession of Access Devices
  2. 18 U.S.C. 1030 Fraud and related activity in connection with computers
  3. 18 U.S. 1343 Fraud by wire, radio or television
  4. 18 U.S.C. 1361 Injury to Government Property
  5. 18 U.S.C. 1362 Government communication systems
  6. 18 U.S.C. 1831 Economic Espionage Act
  7. 18 U.S.C. 1832 Trade Secrets Act

Answer(s): B



In a FAT32 system, a 123 KB file will use how many sectors?

  1. 34
  2. 25
  3. 11
  4. 56

Answer(s): B



You have been asked to investigate the possibility of computer fraud in the finance department of a company. It is suspected that a staff member has been committing finance fraud by printing cheques that have not been authorized. You have exhaustively searched all data files on a bitmap image of the target computer, but have found no evidence. You suspect the files may not have been saved. What should you examine next in this case?

  1. The registry
  2. The swap file
  3. The recycle bin
  4. The metadata

Answer(s): B



When performing a forensics analysis, what device is used to prevent the system from recording data on an evidence disk?

  1. a write-blocker
  2. a protocol analyzer
  3. a firewall
  4. a disk editor

Answer(s): A



How many sectors will a 125 KB file use in a FAT32 file system?

  1. 32
  2. 16
  3. 256
  4. 25

Answer(s): C






Post your Comments and Discuss EC-Council 312-49 exam prep with other Community members:

Join the 312-49 Discussion