EC-Council EC0-349 Exam Questions
EC0-349 ECCouncil Computer Hacking Forensic Investigator (Page 11 )

Updated On: 24-Feb-2026

What term is used to describe a cryptographic technique for embedding information into something else for the sole purpose of hiding that information from the casual observer?

  1. steganography
  2. rootkit
  3. key escrow
  4. offset

Answer(s): A



While working for a prosecutor, what do you think you should do if the evidence you found appears to be exculpatory and is not being released to the defense?

  1. destroy the evidence
  2. bring the information to the attention of the prosecutor, his or her supervisor or finally to the judge (court)
  3. present the evidence to the defense attorney
  4. keep the information on file for later review

Answer(s): B



What information do you need to recover when searching a victims computer for a crime committed with specific e-mail message?

  1. Firewall log
  2. Internet service provider information
  3. E-mail header
  4. Username and password

Answer(s): C



This is the original file structure database that Microsoft originally designed for floppy disks. It is written to the outermost track of a disk and contains information about each file stored on the drive.

  1. Disk Operating System (DOS)
  2. Master File Table (MFT)
  3. Master Boot Record (MBR)
  4. File Allocation Table (FAT)

Answer(s): D



What file structure database would you expect to find on floppy disks?

  1. NTFS
  2. FAT12
  3. FAT32
  4. FAT16

Answer(s): B






Post your Comments and Discuss EC-Council EC0-349 exam dumps with other Community members:

Join the EC0-349 Discussion