EC-Council Computer Hacking Forensic Investigator 312-49 Exam Questions in PDF

Free EC-Council 312-49 Dumps Questions (page: 20)

When investigating a Windows System, it is important to view the contents of the page or swap file because:

  1. Windows stores all of the systems configuration information in this file
  2. This is file that windows use to communicate directly with Registry
  3. A Large volume of data can exist within the swap file of which the computer user has no knowledge
  4. This is the file that windows use to store the history of the last 100 commands that were run from the command line

Answer(s): C



Chris has been called upon to investigate a hacking incident reported by one of his clients. The company suspects the involvement of an insider accomplice in the attack. Upon reaching the incident scene, Chris secures the physical area, records the scene using visual media. He shuts the system down by pulling the power plug so that he does not disturb the system in any way. He labels all cables and connectors prior to disconnecting any. What do you think would be the next sequence of events?

  1. Connect the target media; prepare the system for acquisition; Secure the evidence; Copy the media
  2. Prepare the system for acquisition; Connect the target media; copy the media; Secure the evidence
  3. Connect the target media; Prepare the system for acquisition; Secure the evidence; Copy the media
  4. Secure the evidence; prepare the system for acquisition; Connect the target media; copy the media

Answer(s): B



The use of warning banners helps a company avoid litigation by overcoming an employee assumed
______________. When connecting to the company's intranet, network or Virtual Private Network(VPN) and will allow the company's investigators to monitor, search and retrieve information stored within the network.

  1. Right to work
  2. Right of free speech
  3. Right to Internet Access
  4. Right of Privacy

Answer(s): D



What does mactime, an essential part of the coroner's toolkit do?

  1. It traverses the file system and produces a listing of all files based on the modification, access and change timestamps
  2. It can recover deleted file space and search it for data. However, it does not allow the investigator to preview them
  3. The tools scans for i-node information, which is used by other tools in the tool kit
  4. It is too specific to the MAC OS and forms a core component of the toolkit

Answer(s): A



One way to identify the presence of hidden partitions on a suspect's hard drive is to:

  1. Add up the total size of all known partitions and compare it to the total size of the hard drive
  2. Examine the FAT and identify hidden partitions by noting an H in the partition Type field
  3. Examine the LILO and note an H in the partition Type field
  4. It is not possible to have hidden partitions on a hard drive

Answer(s): A



Share your comments for EC-Council 312-49 exam with other users:

J
JUAN
6/28/2023 2:12:00 AM

aba questions to practice

L
LK
1/2/2024 11:56:00 AM

great content

S
Srijeeta
10/8/2023 6:24:00 AM

how do i get the remaining questions?

J
Jovanne
7/26/2022 11:42:00 PM

well formatted pdf and the test engine software is free. well worth the money i sept.

C
CHINIMILLI SATISH
8/29/2023 6:22:00 AM

looking for 1z0-116

P
Pedro Afonso
1/15/2024 8:01:00 AM

in question 22, shouldnt be in the data (option a) layer?

P
Pushkar
11/7/2022 12:12:00 AM

the questions are incredibly close to real exam. you people are amazing.

A
Ankit S
11/13/2023 3:58:00 AM

q15. answer is b. simple

S
S. R
12/8/2023 9:41:00 AM

great practice

M
Mungara
3/14/2023 12:10:00 AM

thanks to this exam dumps, i felt confident and passed my exam with ease.

A
Anonymous
7/25/2023 2:55:00 AM

need 1z0-1105-22 exam

N
Nigora
5/31/2022 10:05:00 PM

this is a beautiful tool. passed after a week of studying.

A
Av dey
8/16/2023 2:35:00 PM

can you please upload the dumps for 1z0-1096-23 for oracle

M
Mayur Shermale
11/23/2023 12:22:00 AM

its intresting, i would like to learn more abouth this

J
JM
12/19/2023 2:23:00 PM

q252: dns poisoning is the correct answer, not locator redirection. beaconing is detected from a host. this indicates that the system has been infected with malware, which could be the source of local dns poisoning. location redirection works by either embedding the redirection in the original websites code or having a user click on a url that has an embedded redirect. since users at a different office are not getting redirected, it isnt an embedded redirection on the original website and since the user is manually typing in the url and not clicking a link, it isnt a modified link.

F
Freddie
12/12/2023 12:37:00 PM

helpful dump questions

D
Da Costa
8/25/2023 7:30:00 AM

question 423 eigrp uses metric

B
Bsmaind
8/20/2023 9:22:00 AM

hello nice dumps

B
beau
1/12/2024 4:53:00 PM

good resource for learning

S
Sandeep
12/29/2023 4:07:00 AM

very useful

K
kevin
9/29/2023 8:04:00 AM

physical tempering techniques

B
Blessious Phiri
8/15/2023 4:08:00 PM

its giving best technical knowledge

T
Testbear
6/13/2023 11:15:00 AM

please upload

S
shime
10/24/2023 4:23:00 AM

great question with explanation thanks!!

T
Thembelani
5/30/2023 2:40:00 AM

does this exam have lab sections?

S
Shin
9/8/2023 5:31:00 AM

please upload

P
priti kagwade
7/22/2023 5:17:00 AM

please upload the braindump for .net

R
Robe
9/27/2023 8:15:00 PM

i need this exam 1z0-1107-2. please.

C
Chiranthaka
9/20/2023 11:22:00 AM

very useful!

N
Not Miguel
11/26/2023 9:43:00 PM

for this question - "which three type of basic patient or member information is displayed on the patient info component? (choose three.)", list of conditions is not displayed (it is displayed in patient card, not patient info). so should be thumbnail of chatter photo

A
Andrus
12/17/2023 12:09:00 PM

q52 should be d. vm storage controller bandwidth represents the amount of data (in terms of bandwidth) that a vms storage controller is using to read and write data to the storage fabric.

R
Raj
5/25/2023 8:43:00 AM

nice questions

M
max
12/22/2023 3:45:00 PM

very useful

M
Muhammad Rawish Siddiqui
12/8/2023 6:12:00 PM

question # 208: failure logs is not an example of operational metadata.

AI Tutor 👋 I’m here to help!