Eccouncil Computer Hacking Forensic Investigator V10 312-49 Exam Questions

Page: 1 / 14
Total 704 questions
Question 1

Place the following In order of volatility from most volatile to the least volatile.



Answer : C


Question 2

Office Documents (Word, Excel and PowerPoint) contain a code that allows tracking the MAC or unique identifier of the machine that created the document. What is that code called?



Answer : A


Question 3

Joshua is analyzing an MSSQL database for finding the attack evidence and other details, where should he look for the database logs?



Answer : C


Question 4

Which "Standards and Criteria" under SWDGE states that "the agency must use hardware and software that are appropriate and effective for the seizure or examination procedure"?



Answer : D


Question 5

Which Linux command when executed displays kernel ring buffers or information about device drivers loaded into the kernel?



Answer : B


Question 6

Charles has accidentally deleted an important file while working on his Mac computer. He wants to recover the deleted file as it contains some of his crucial business secrets. Which of the following tool will help Charles?



Answer : C


Question 7

How many characters long is the fixed-length MD5 algorithm checksum of a critical system file?



Answer : C


Page:    1 / 14   
Total 704 questions