Free 312-49V9 Exam Braindumps (page: 21)

Page 21 of 122

In which step of the computer forensics investigation methodology would you run MD5 checksum on the evidence?

  1. Obtain search warrant
  2. Evaluate and secure the scene
  3. Collect the evidence
  4. Acquire the data

Answer(s): D



Steganography is a technique of hiding a secret message within an ordinary message and extracting it at the destination to maintain the confidentiality of data.

  1. True
  2. False

Answer(s): A



When the operating system marks cluster as used, but does not allocate them to any file, such clusters are known as ___________.

  1. Lost clusters
  2. Bad clusters
  3. Empty clusters
  4. Unused clusters

Answer(s): A



Cyber-crime is defined as any Illegal act involving a gun, ammunition, or its applications.

  1. True
  2. False

Answer(s): B



Page 21 of 122



Post your Comments and Discuss EC-Council 312-49V9 exam with other Community members:

Olu commented on October 16, 2023
Question 235: 22,164 x 80 x 63 x 512 = 57.19 GB
UNITED STATES
upvote