최신 312-49 무료덤프 - EC-COUNCIL Computer Hacking Forensic Investigator
When using an iPod and the host computer is running Windows, what file system will be used?
정답: B
On an Active Directory network using NTLM authentication, where on the domain controllers are the passwords stored?
정답: B
John is working on his company policies and guidelines. The section he is currently working on covers company documents; how they shouldJohn is working on his company? policies and guidelines. The section he is currently working on covers company documents; how they should be handled, stored, and eventually destroyed. John is concerned about the process whereby outdated documents are destroyed. What type of shredder should
John write in the guidelines to be used when destroying documents?
John write in the guidelines to be used when destroying documents?
정답: C
You are working as an investigator for a corporation and you have just received instructions from your manager to assist in the collection of 15 hard drives that are part of an ongoing investigation. Your job is to complete the required evidence custody forms to properly document each piece of evidence as other members of your team collect it. Your manager instructs you to complete one multi-evidence form for the entire case and a single-evidence form for each hard drive. How will these forms be stored to help preserve the chain of custody of the case?
정답: B
When using Windows acquisitions tools to acquire digital evidence, it is important to use a well-tested hardware write-blocking device to _________
정답: C
In a computer forensics investigation, what describes the route that evidence takes from the time you find it until the case is closed or goes to court?
정답: C
John is working as a computer forensics investigator for a consulting firm in Canada. He is called to seize a computer at a local web caf?John is working as a computer forensics investigator for a consulting firm in Canada. He is called to seize a computer at a local web caf purportedly used as a botnet server. John thoroughly scans the computer and finds nothing that would lead him to think the computer was a botnet server. John decides to scan the virtual memory of the computer to possibly find something he had missed. What information will the virtual memory scan produce?
정답: C
Which legal document allows law enforcement to search an office, place of business, or other locale for evidence relating to an alleged crime?
정답: B
In the following directory listing,
which file should be used to restore archived email messages for someone using Microsoft
Outlook?
which file should be used to restore archived email messages for someone using Microsoft
Outlook?
정답: A
What is the smallest physical storage unit on a hard drive?
정답: D