Free 312-49 Exam Braindumps (page: 17)

Page 16 of 133

What method of computer forensics will allow you to trace all ever-established user accounts on a Windows 2000 sever the course of its lifetime?

  1. forensic duplication of hard drive
  2. analysis of volatile data
  3. comparison of MD5 checksums
  4. review of SIDs in the Registry

Answer(s): C



Which response organization tracks hoaxes as well as viruses?

  1. NIPC
  2. FEDCIRC
  3. CERT
  4. CIAC

Answer(s): D



Which federal computer crime law specifically refers to fraud and related activity in connection with access devices like routers?

  1. 18 U.S.C. 1029
  2. 18 U.S.C. 1362
  3. 18 U.S. 2511
  4. 18 U.S.C. 2703

Answer(s): A



Office documents (Word, Excel, PowerPoint) contain a code that allows tracking the MAC, or unique identifier, of the machine that created the document. What is that code called?

  1. the Microsoft Virtual Machine Identifier
  2. the Personal Application Protocol
  3. the Globally Unique ID
  4. the Individual ASCII String

Answer(s): C






Post your Comments and Discuss EC-Council 312-49 exam with other Community members:

312-49 Discussions & Posts