Eccouncil Computer Hacking Forensic Investigator V10 312-49 Exam Practice Test

Page: 1 / 14
Total 704 questions
Question 1

Which of the following components within the android architecture stack take care of displaying windows owned by different applications?



Answer : D


Question 2

The objective of this act was to protect consumers' personal financial information held by financial institutions and their service providers.



Answer : A


Question 3

Which of the following Event Correlation Approach is an advanced correlation method that assumes and predicts what an attacker can do next after the attack by studying the statistics and probability and uses only two variables?



Answer : A


Question 4

What does Locard's Exchange Principle state?



Answer : C


Question 5

Using Linux to carry out a forensics investigation, what would the following command accomplish?

dd if=/usr/home/partition.image of=/dev/sdb2 bs=4096 conv=notrunc,noerror



Answer : D


Question 6

SO/IEC 17025 is an accreditation for which of the following:



Answer : C


Question 7

Item 2If you come across a sheepdip machine at your client site, what would you infer?



Answer : C


Page:    1 / 14   
Total 704 questions