Eccouncil 312-49 Computer Hacking Forensic Investigator V10 Exam Practice Test

Page: 1 / 14
Total 704 questions
Question 1

You are a forensic investigator who is analyzing a hard drive that was recently collected as evidence. You have been unsuccessful at locating any meaningful evidence within the file system and suspect a drive wiping utility may have been used. You have reviewed the keys within the software hive of the Windows registry and did not find any drive wiping utilities. How can you verify that drive wiping software was used on the hard drive?



Answer : D


Question 2

Which of the following Windows event logs record events related to device drives and hardware changes?



Answer : B


Question 3

An investigator seized a notebook device installed with a Microsoft Windows OS. Which type of files would support an investigation of the data size and structure in the device?



Answer : D


Question 4

According to RFC 3227, which of the following is considered as the most volatile item on a typical system?



Answer : A


Question 5

Steve received a mail that seemed to have come from her bank. The mail has instructions for Steve to click on a link and provide information to avoid the suspension of her account. The link in the mail redirected her to a form asking for details such as name, phone number, date of birth, credit card number or PIN, CW code, SNNs, and email address. On a closer look, Steve realized that the URL of the form in not the same as that of her bank's. Identify the type of external attack performed by the attacker In the above scenario?



Answer : A


Question 6

Which among the following acts has been passed by the U.S. Congress to protect investors from the possibility of fraudulent accounting activities by corporations?



Answer : D


Question 7

Which "Standards and Criteria" under SWDGE states that "the agency must use hardware and software that are appropriate and effective for the seizure or examination procedure"?



Answer : D


Page:    1 / 14   
Total 704 questions