Free 312-49 Exam Braindumps (page: 29)

Page 28 of 133

______________is simply the application of Computer Investigation and analysis techniques in the interests of determining potential legal evidence.

  1. Network Forensics
  2. Computer Forensics
  3. Incident Response
  4. Event Reaction

Answer(s): B



What is the name of the Standard Linux Command that is also available as windows application that can be used to create bit-stream images?

  1. mcopy
  2. image
  3. MD5
  4. dd

Answer(s): D



To preserve digital evidence, an investigator should ________________ .

  1. Make two copies of each evidence item using a single imaging tool
  2. Make a single copy of each evidence item using an approved imaging tool
  3. Make two copies of each evidence item using different imaging tools
  4. Only store the original evidence item

Answer(s): C



Profiling is a forensics technique for analyzing evidence with the goal of identifying the perpetrator from their various activity. After a computer has been compromised by a hacker, which of the following would be most important in forming a profile of the incident?

  1. The manufacturer of the system compromised
  2. The logic, formatting and elegance of the code used in the attack
  3. The nature of the attack
  4. The vulnerability exploited in the incident

Answer(s): B






Post your Comments and Discuss EC-Council 312-49 exam with other Community members:

312-49 Discussions & Posts