Free EC-Council 312-49v10 Exam Questions (page: 29)

____________________ is simply the application of Computer Investigation and analysis techniques in the interests of determining potential legal evidence.

  1. Network Forensics
  2. Computer Forensics
  3. Incident Response
  4. Event Reaction

Answer(s): B



What is the name of the Standard Linux Command that is also available as windows application that can be used to create bit-stream images?

  1. mcopy
  2. image
  3. MD5
  4. dd

Answer(s): D



To preserve digital evidence, an investigator should ____________________.

  1. Make two copies of each evidence item using a single imaging tool
  2. Make a single copy of each evidence item using an approved imaging tool
  3. Make two copies of each evidence item using different imaging tools
  4. Only store the original evidence item

Answer(s): C



Pro ling is a forensics technique for analyzing evidence with the goal of identifying the perpetrator from their various activity. After a computer has been compromised by a hacker, which of the following would be most important in forming a pro le of the incident?

  1. The manufacturer of the system compromised
  2. The logic, formatting and elegance of the code used in the attack
  3. The nature of the attack
  4. The vulnerability exploited in the incident

Answer(s): B



Viewing page 29 of 171



Post your Comments and Discuss EC-Council 312-49v10 exam prep with other Community members:

312-49v10 Exam Discussions & Posts