Free 312-49V9 Exam Braindumps (page: 55)

Page 55 of 122

What is the slave device connected to the secondary IDE controller on a Linux OS referred to?

  1. hda
  2. hdd
  3. hdb
  4. hdc

Answer(s): B



A small law firm located in the Midwest has possibly been breached by a computer hacker looking to obtain information on their clientele. The law firm does not have any on-site IT employees, but wants to search for evidence of the breach themselves to prevent any possible media attention. Why would this not be recommended?

  1. Searching for evidence themselves would not have any ill effects
  2. Searching could possibly crash the machine or device
  3. Searching creates cache files, which would hinder the investigation
  4. Searching can change date/time stamps

Answer(s): D



Heather, a computer forensics investigator, is assisting a group of investigators working on a large computer fraud case involving over 20 people. These 20 people, working in different offices, allegedly siphoned off money from many different client accounts. Heather responsibility is to findThese 20 people, working in different offices, allegedly siphoned off money from many different client accounts. Heather? responsibility is to find out how the accused people communicated between each other. She has searched their email and their computers and has not found any useful evidence. Heather then finds some possibly useful evidence under the desk of one of the accused. In an envelope she finds a piece of plastic with numerous holes cut out of it. Heather then finds the same exact piece of plastic with holes at many of the other accused peoples?desks. Heather believes that the 20 people involved in the case were using a cipher to send secret messages in between each other. What type of cipher was used by the accused in this case?

  1. Grill cipher
  2. Null cipher
  3. Text semagram
  4. Visual semagram

Answer(s): A



Under confession, an accused criminal admitted to encrypting child pornography pictures and then hiding them within other pictures. What technique did the accused criminal employ?

  1. Typography
  2. Steganalysis
  3. Picture encoding
  4. Steganography

Answer(s): D



Page 55 of 122



Post your Comments and Discuss EC-Council 312-49V9 exam with other Community members:

Olu commented on October 16, 2023
Question 235: 22,164 x 80 x 63 x 512 = 57.19 GB
UNITED STATES
upvote