EC-Council EC0-349 Exam Questions
EC0-349 ECCouncil Computer Hacking Forensic Investigator (Page 9 )

Updated On: 24-Feb-2026

E-mail logs contain which of the following information to help you in your investigation?

  1. attachments sent with the e-mail message
  2. contents of the e-mail message
  3. user account that was used to send the message
  4. unique message identifier
  5. date and time the message was sent

Answer(s): A,B,C,E



Microsoft Outlook maintains email messages in a proprietary format in what type of file?

  1. .email
  2. .doc
  3. .pst
  4. .mail

Answer(s): C



You are employed directly by an attorney to help investigate an alleged sexual harassment case at a large pharmaceutical manufacturer. While at the corporate office of the company, the CEO demands to know the status of the investigation. What prevents you from discussing the case with the CEO?

  1. Trade secrets
  2. the attorney-work-product rule
  3. ISO 17799
  4. Good manners

Answer(s): B



When conducting computer forensic analysis, you must guard against _____________so that you remain focused on the primary job and insure that the level of work does not increase beyond what was originally expected.

  1. scope creep
  2. hard drive failure
  3. unauthorized expenses
  4. overzealous marketing

Answer(s): A



Which of the following should a computer forensics investigations lab have?

  1. isolation
  2. restricted access
  3. open access
  4. an entry log

Answer(s): B






Post your Comments and Discuss EC-Council EC0-349 exam dumps with other Community members:

Join the EC0-349 Discussion