Free 312-49 Exam Braindumps (page: 56)

Page 55 of 133

What technique used by Encase makes it virtually impossible to tamper with evidence once it has been acquired?

  1. Every byte of the file(s) is given an MD5 hash to match against a master file
  2. Every byte of the file(s) is verified using 32-bit CRC
  3. Every byte of the file(s) is copied to three different hard drives
  4. Every byte of the file(s) is encrypted using three different methods

Answer(s): B



What must an investigator do before disconnecting an iPod from any type of computer?

  1. Unmount the iPod
  2. Mount the iPod
  3. Disjoin the iPod
  4. Join the iPod

Answer(s): A



The following is a log file screenshot from a default installation of IIS 6.0.


What time standard is used by IIS as seen in the screenshot?

  1. UTC
  2. GMT
  3. TAI
  4. UT

Answer(s): A



A small law firm located in the Midwest has possibly been breached by a computer hacker looking to obtain information on their clientele. The law firm does not have any on-site IT employees, but wants to search for evidence of the breach themselves to prevent any possible media attention. Why would this not be recommended?

  1. Searching for evidence themselves would not have any ill effects
  2. Searching could possibly crash the machine or device
  3. Searching creates cache files, which would hinder the investigation
  4. Searching can change date/time stamps

Answer(s): D






Post your Comments and Discuss EC-Council 312-49 exam with other Community members:

312-49 Exam Discussions & Posts