Free 312-49 Exam Braindumps (page: 57)

Page 56 of 133

In the following directory listing,


Which file should be used to restore archived email messages for someone using Microsoft Outlook?

  1. Outlook bak
  2. Outlook ost
  3. Outlook NK2
  4. Outlook pst

Answer(s): D



Daryl, a computer forensics investigator, has just arrived at the house of an alleged computer hacker. Daryl takes pictures and tags all computer and peripheral equipment found in the house. Daryl packs all the items found in his van and takes them back to his lab for further examination. At his lab, Michael his assistant helps him with the investigation. Since Michael is still in training, Daryl supervises all of his work very carefully.
Michael is not quite sure about the procedures to copy all the data off the computer and peripheral devices. How many data acquisition tools should Michael use when creating copies of the evidence for the investigation?

  1. Two
  2. One
  3. Three
  4. Four

Answer(s): A



What feature of Decryption Collection allows an investigator to crack a password as quickly as possible?

  1. Cracks every password in 10 minutes
  2. Distribute processing over 16 or fewer computers
  3. Support for Encrypted File System
  4. Support for MD5 hash verification

Answer(s): B



Heather, a computer forensics investigator, is assisting a group of investigators working on a large computer fraud case involving over 20 people. These 20 people, working in different offices, allegedly siphoned off money from many different client accounts. Heather responsibility is to find out how the accused people communicated between each other. She has searched their email and their computers and has not found any useful evidence. Heather then finds some possibly useful evidence under the desk of one of the accused.

In an envelope she finds a piece of plastic with numerous holes cut out of it. Heather then finds the same exact piece of plastic with holes at many of the other accused peoples desks. Heather believes that the 20 people involved in the case were using a cipher to send secret messages in between each other. What type of cipher was used by the accused in this case?

  1. Grill cipher
  2. Null cipher
  3. Text semagram
  4. Visual semagram

Answer(s): A






Post your Comments and Discuss EC-Council 312-49 exam with other Community members:

312-49 Exam Discussions & Posts