Free 312-49 Exam Braindumps (page: 61)

Page 60 of 133

What advantage does the tool Evidor have over the built-in Windows search?

  1. It can find deleted files even after they have been physically removed
  2. It can find bad sectors on the hard drive
  3. It can search slack space
  4. It can find files hidden within ADS

Answer(s): C



An on-site incident response team is called to investigate an alleged case of computer tampering within their company. Before proceeding with the investigation, the CEO informs them that the incident will be classified as low level. How long will the team have to respond to the incident?

  1. One working day
  2. Two working days
  3. Immediately
  4. Four hours

Answer(s): A



What type of attack sends SYN requests to a target system with spoofed IP addresses?

  1. SYN flood
  2. Ping of death
  3. Cross site scripting
  4. Land

Answer(s): A



Harold is a computer forensics investigator working for a consulting firm out of Atlanta Georgia. Harold is called upon to help with a corporate espionage case in Miami Florida. Harold assists in the investigation by pulling all the data from the computers allegedly used in the illegal activities. He finds that two suspects in the company where stealing sensitive corporate information and selling it to competing companies. From the email and instant messenger logs recovered, Harold has discovered that the two employees notified the buyers by writing symbols on the back of specific stop signs. This way, the buyers knew when and where to meet with the alleged suspects to buy the stolen material. What type of steganography did these two suspects use?

  1. Text semagram
  2. Visual semagram
  3. Grill cipher
  4. Visual cipher

Answer(s): B






Post your Comments and Discuss EC-Council 312-49 exam with other Community members:

312-49 Exam Discussions & Posts