Eccouncil 312-49 Computer Hacking Forensic Investigator V10 Exam Practice Test

Page: 1 / 14
Total 704 questions
Question 1

Chloe is a forensic examiner who is currently cracking hashed passwords for a crucial mission and hopefully solve the case. She is using a lookup table used for recovering a plain text password from cipher text; it contains word list and brute-force list along with their computed hash values. Chloe Is also using a graphical generator that supports SHA1.

a. What password technique is being used?

b. What tool is Chloe using?



Answer : D


Question 2

Which of the following malware targets Android mobile devices and installs a backdoor that remotely installs applications from an attacker-controlled server?



Answer : D


Question 3

Which of the following Windows event logs record events related to device drives and hardware changes?



Answer : B


Question 4

Which "Standards and Criteria" under SWDGE states that "the agency must use hardware and software that are appropriate and effective for the seizure or examination procedure"?



Answer : D


Question 5

Storage location of Recycle Bin for NTFS file systems (Windows Vista and later) is located at:



Answer : C


Question 6

To which phase of the computer forensics investigation process does "planning and budgeting of a forensics lab" belong?



Answer : C


Question 7

"No action taken by law enforcement agencies or their agents should change data held on a computer or storage media which may subsequently be relied upon in court" - this principle Is advocated by which of the following?



Answer : A


Page:    1 / 14   
Total 704 questions