Free EC-Council 312-49v10 Exam Questions (page: 27)

What information do you need to recover when searching a victim's computer for a crime committed with speci c e-mail message?

  1. Internet service provider information
  2. E-mail header
  3. Username and password
  4. Firewall log

Answer(s): B



Melanie was newly assigned to an investigation and asked to make a copy of all the evidence from the compromised system. Melanie did a DOS copy of all the les on the system.
What would be the primary reason for you to recommend a disk imaging tool?

  1. A disk imaging tool would check for CRC32s for internal self-checking and validation and have MD5 checksum
  2. Evidence le format will contain case data entered by the examiner and encrypted at the beginning of the evidence le
  3. A simple DOS copy will not include deleted les, le slack and other information
  4. There is no case for an imaging tool as it will use a closed, proprietary format that if compared to the original will not match up sector for sector

Answer(s): C



You are employed directly by an attorney to help investigate an alleged sexual harassment case at a large pharmaceutical manufacture. While at the corporate o ce of the company, the CEO demands to know the status of the investigation.
What prevents you from discussing the case with the CEO?

  1. the attorney-work-product rule
  2. Good manners
  3. Trade secrets
  4. ISO 17799

Answer(s): A



What is the investigator trying to analyze if the system gives the following image as output?

  1. All the logon sessions
  2. Currently active logon sessions
  3. Inactive logon sessions
  4. Details of users who can logon

Answer(s): B



Viewing page 27 of 171



Post your Comments and Discuss EC-Council 312-49v10 exam prep with other Community members:

312-49v10 Exam Discussions & Posts