EC-Council 312-49 Exam
Computer Hacking Forensic Investigator (Page 17 )

Updated On: 12-Jan-2026

What method of computer forensics will allow you to trace all ever-established user accounts on a Windows 2000 sever the course of its lifetime?

  1. forensic duplication of hard drive
  2. analysis of volatile data
  3. comparison of MD5 checksums
  4. review of SIDs in the Registry

Answer(s): C



Which response organization tracks hoaxes as well as viruses?

  1. NIPC
  2. FEDCIRC
  3. CERT
  4. CIAC

Answer(s): D



Which federal computer crime law specifically refers to fraud and related activity in connection with access devices like routers?

  1. 18 U.S.C. 1029
  2. 18 U.S.C. 1362
  3. 18 U.S. 2511
  4. 18 U.S.C. 2703

Answer(s): A



Office documents (Word, Excel, PowerPoint) contain a code that allows tracking the MAC, or unique identifier, of the machine that created the document. What is that code called?

  1. the Microsoft Virtual Machine Identifier
  2. the Personal Application Protocol
  3. the Globally Unique ID
  4. the Individual ASCII String

Answer(s): C



Viewing page 17 of 133
Viewing questions 65 - 68 out of 704 questions



Post your Comments and Discuss EC-Council 312-49 exam prep with other Community members:

Join the 312-49 Discussion