Act now and download your EC-Council 312-49v9 test today! Do not waste time for the worthless EC-Council 312-49v9 tutorials. Download Up to the immediate present EC-Council ECCouncil Computer Hacking Forensic Investigator (V9) exam with real questions and answers and begin to learn EC-Council 312-49v9 with a classic professional.
Free 312-49v9 Demo Online For EC-Council Certifitcation:
NEW QUESTION 1
This organization maintains a database of hash signatures for known software
Answer: C
NEW QUESTION 2
When an investigator contacts by telephone the domain administrator or controller listed by a whois lookup to request all e-mails sent and received for a user account be preserved, what U.S.C. statute authorizes this phone call and obligates the ISP to preserve e-mail records?
Answer: D
Explanation:
18 U.S.C. § 1029 Fraud and Related Activity in Connection with Access Devices 18 U.S.C. § 1030 Fraud and Related Activity in Connection with Computers
18 U.S.C. § 2703 Required Disclosure of Customer Communications Records 18 U.S.C. § 2703(d) Requirements for Court Order
18 U.S.C. § 2703(f) Requirement to Preserve Evidence
NEW QUESTION 3
Which of the following statements does not support the case assessment?
Answer: C
NEW QUESTION 4
What will the following command produce on a website login page? SELECT email, passwd, login_id, full_name FROM members WHERE email = 'someone@somehwere.com';
DROP TABLE members; --'
Answer: C
Explanation:
The third line deletes the table named members.
NEW QUESTION 5
When searching through file headers for picture file formats, what should be searched to find a JPEG file in hexadecimal format?
Answer: A
NEW QUESTION 6
When the operating system marks cluster as used, but does not allocate them to any file, such clusters are known as ____.
Answer: A
NEW QUESTION 7
Lance wants to place a honeypot on his network. Which of the following would be your recommendations?
Answer: D
NEW QUESTION 8
International Mobile Equipment Identifier (IMEI) is a 15-dlgit number that indicates the manufacturer, model type, and country of approval for GSM devices. The first eight digits of an IMEI number that provide information about the model and origin of the mobile device is also known as:
Answer: A
NEW QUESTION 9
Law enforcement officers are conducting a legal search for which a valid warrant was obtained. While conducting the search, officers observe an item of evidence for an unrelated crime that was not included in the warrant. The item was clearly visible to the officers and immediately identified as evidence. What is the term used to describe how this evidence is admissible?
Answer: A
NEW QUESTION 10
Which of the following log injection attacks uses white space padding to create unusual log entries?
Answer: A
NEW QUESTION 11
Volatile information can be easily modified or lost when the system is shut down or rebooted. It helps to determine a logical timeline of the security incident and the users who would be responsible.
Answer: A
NEW QUESTION 12
Why is it a good idea to perform a penetration test from the inside?
Answer: C
NEW QUESTION 13
You are called in to assist the police in an investigation involving a suspected drug dealer. The police searched the suspect house after aYou are called in to assist the police in an investigation involving a suspected drug dealer. The police searched the suspect? house after a warrant was obtained and they located a floppy disk in the suspect bedroom. The disk contains several files, but they appear to be passwordwarrant was obtained and they located a floppy disk in the suspect? bedroom. The disk contains several files, but they appear to be password protected. What are two common
methods used by password cracking software that you could use to obtain the password?
Answer: B
NEW QUESTION 14
When a file is deleted by Windows Explorer or through the MS-DOS delete command, the operating system inserts ____ in the first letter position of the filename in the FAT database.
Answer: D
Explanation:
When a file is deleted, the first byte is replaced with 0xE5 to marked the file as deleted or erased, and is the same for FAT12/16/32. An 0xE5 translates also to a ASCII 229, a “O” with a tilde.
However, using the greek alphabet (see: http://www.ascii.ca/iso8859.7.htm) the ASCII code 229 is “the lowercase Greek Letter Epsilon, and Ascii code 243 is Lower case Greek Letter Sigma.
http://chexed.com/ComputerTips/asciicodes.php says that Ascii 229 is Lowercase Greek Letter Sigma
So, although D looks like the correct answer here, it may require more understanding of the underlying intent of the question.
NEW QUESTION 15
Why should you never power on a computer that you need to acquire digital evidence from?
Answer: A
NEW QUESTION 16
All Blackberry email is eventually sent and received through what proprietary RIM-operated mechanism?
Answer: A
NEW QUESTION 17
Tyler is setting up a wireless network for his business that he runs out of his home. He has followed all the directions from the ISP as well as the wireless router manual. He does not have any encryption set and the SSID is being broadcast. On his laptop, he can pick up the wireless signal for short periods of time, but then the connection drops and the signal goes away. Eventually the wireless signal shows back up, but drops intermittently. What could be Tyler issue with his home wireless network?
Answer: B
NEW QUESTION 18
Jack Smith is a forensics investigator who works for Mason Computer Investigation Services. He is investigating a computer that was infected by Ramen Virus.
He runs the netstat command on the machine to see its current connections. In the following screenshot, what do the 0.0.0.0 IP addresses signify?
Answer: B
NEW QUESTION 19
If you plan to startup a suspect’s computer, you must modify the ____ to ensure that you do not contaminate or alter data on the suspect’s hard drive by booting to the hard drive.
Answer: E
Explanation:
The OS isn’t specified, but if this was a Windows OS, then this would be boot.ini
The answer is CMOS. The startup of a computer is the boot sequence, and the boot sequence is defined in the CMOS. The common occurrence is to boot off a floppy, and you need to see that the floppy (usually the A drive) is first in the sequence. If you don’t, and the hard drive is first, then booting the system wil boot the hard drive and alter the evidence.
NEW QUESTION 20
What is a first sector ("sector zero") of a hard disk?
Answer: A
NEW QUESTION 21
Who is responsible for the following tasks?
? Secure the scene and ensure that it is maintained In a secure state until the Forensic Team advises
? Make notes about the scene that will eventually be handed over to the Forensic Team
Answer: A
NEW QUESTION 22
Which of the following filesystem is used by Mac OS X?
Answer: B
Explanation:
EFS (Encrypting File System) is part of NTFS and used on Windows EXT2 is used on Linux NFS (Network File System) is for access to a network file system over TCP/IP
NEW QUESTION 23
What is the First Step required in preparing a computer for forensics investigation?
Answer: A
NEW QUESTION 24
What must an investigator do before disconnecting an iPod from any type of computer?
Answer: A
NEW QUESTION 25
Which of the following email headers specifies an address for mailer-generated errors, like "no such user" bounce messages, to go to (instead of the sender's address)?
Answer: A
NEW QUESTION 26
What binary coding is used most often for e-mail purposes?
Answer: D
NEW QUESTION 27
......
P.S. Easily pass 312-49v9 Exam with 209 Q&As Dumps-hub.com Dumps & pdf Version, Welcome to Download the Newest Dumps-hub.com 312-49v9 Dumps: https://www.dumps-hub.com/312-49v9-dumps.html (209 New Questions)