Computer Hacking Forensic Investigator

Here you have the best EC-Council 312-49v10 practice exam questions

  • You have 542 total questions to study from
  • Each page has 5 questions, making a total of 109 pages
  • You can navigate through the pages using the buttons at the bottom
  • This questions were last updated on October 28, 2024
Question 1 of 542

When an investigator contacts by telephone the domain administrator or controller listed by a Who is lookup to request all e-mails sent and received for a user account be preserved, what U.S.C. statute authorizes this phone call and obligates the ISP to preserve e-mail records?

    Correct Answer: D

    Title 18, Section 2703(f) of the United States Code authorizes an investigator to request that an ISP preserve email records. This statute obligates the ISP to preserve records and other evidence in its possession for a period of 90 days, which can be extended for an additional 90-day period upon request.

Question 2 of 542

Item 2If you come across a sheepdip machine at your client site, what would you infer?

    Correct Answer: C

    A sheepdip computer is used only for virus-checking. Sheepdip machines are dedicated computers employed to scan files or external storage devices for viruses and malware before introducing them into a secure network. They act as a precautionary measure to ensure that no malicious software is introduced to the network.

Question 3 of 542

In a computer forensics investigation, what describes the route that evidence takes from the time you find it until the case is closed or goes to court?

    Correct Answer: C

    In a computer forensics investigation, the term that describes the route that evidence takes from the time you find it until the case is closed or goes to court is 'chain of custody'. It ensures the integrity and admissibility of evidence by documenting every transfer, handling, and storage detail, including individuals involved in the process.

Question 4 of 542

How many characters long is the fixed-length MD5 algorithm checksum of a critical system file?

    Correct Answer: C

    The MD5 algorithm produces a 128-bit hash value, which is typically represented as a 32-character hexadecimal string. This is because each character in a hexadecimal representation corresponds to 4 bits (128 bits / 4 = 32 characters).

Question 5 of 542

You are working on a thesis for your doctorate degree in Computer Science. Your thesis is based on HTML, DHTML, and other web-based languages and how they have evolved over the years.

You navigate to archive. org and view the HTML code of news.com. You then navigate to the current news.com website and copy over the source code. While searching through the code, you come across something abnormal: What have you found?

    Correct Answer: A

    Given the context of navigating to archive.org and then to the current news.com website, it is likely that the abnormality found in the code is something typically associated with web tracking or analytics. A web bug, also known as a web beacon, is a common element in web pages used for tracking and analytics purposes. It usually refers to a small, often invisible image that can collect information about the user viewing the page. This makes 'web bug' the most plausible abnormality you would find in such a scenario.