Exam Code : 312-39
Exam Name : EC-Council Certified SOC Analyst (CSA) certification
Vendor Name :
"EC-COUNCIL"
312-49 Dumps
312-49 Braindumps
312-49 Real Questions
312-49 Practice Test
312-49 Actual Questions
killexams.com EC-Council 312-49
Computer Hacking Forensic Investigator
https://killexams.com/pass4sure/exam-detail/312-49
Harold is finishing up a report on a case of network intrusion, corporate spying, and embezzlement that he has been working on for over six months. He is trying to find the right term to use in his report to describe network-enabled spying. What term should Harold use?
Spycrack
Spynet
Netspionage
Hackspionage
What is considered a grant of a property right given to an individual who discovers or invents a new machine, process, useful composition of matter or manufacture?
Copyright
Design patent
Trademark
Utility patent
Where is the startup configuration located on a router?
Static RAM
BootROM
NVRAM
Dynamic RAM
You are working for a large clothing manufacturer as a computer forensics investigator and are called in to investigate an unusual case of an employee possibly stealing clothing designs from the company and sellin1g05them under a different brand name for a
different company. What you discover during the course of the investigation is that the clothing designs are actually original products of the employee and the company has no policy against an employee selling his own designs on his own time. The only thing that you can find that the employee is doing wrong is that his clothing design incorporates the same graphic symbol as that of the company with only the wording in the graphic being different. What area of the law is the employee violating?
Copyright law
Brandmark law
Trademark law
Printright law
While searching through a computer under investigation, you discover numerous files that appear to have had the first letter of the file name replaced by the hex code byte 5h.?What does this indicate on the computer?replaced by the hex code byte ?5h.?What does this indicate on the computer?
The files have been marked as hidden
The files have been marked for deletion
The files are corrupt and cannot be recovered
The files have been marked as read-only
While presenting his case to the court, Simon calls many witnesses to the stand to testify. Simon decides to call Hillary Taft, a lay witness, to the stand. Since Hillary is a lay witness, what field would she be considered an expert in?
Technical material related to forensics
No particular field
Judging the character of defendants/victims
Legal issues
When reviewing web logs, you see an entry for esource not found?in the HTTP status code field. What is the actual error code that you wouldWhen reviewing web logs, you see an entry for ?esource not found?in the HTTP status code field. What is the actual error code that you would see in the log for esource not found?see in the log for
?esource not found?
202
404
606
999
What stage of the incident handling process involves reporting events?
Containment
Follow-up
Identification
Recovery
When investigating a computer forensics case where Microsoft Exchange and Blackberry Enterprise server are used, where would investigator need to search to find email sent from a Blackberry device?
RIM Messaging center
Blackberry Enterprise server
Microsoft Exchange server
Blackberry desktop redirector
What type of attack sends spoofed UDP packets (instead of ping packets) with a fake source address to the IP broadcast address of a large network?
Fraggle
Smurf scan
SYN flood
Teardrop
The police believe that Mevin Matthew has been obtaining unauthorized access to computers belonging to numerous computer software and computer operating systems manufacturers, cellular telephone manufacturers, Internet Service Providers, and educational institutions. They also suspect that he has been stealing, copying, and misappropriating proprietary computer software belonging to the several victim companies. What is preventing the police from breaking down the suspect door and searching his home and seizing all of his computer equipment if they haveis preventing the police from breaking down the suspect? door and searching his home and seizing all of his computer equipment if they have not yet obtained a warrant?
The USA Patriot Act
The Good Samaritan Laws
The Federal Rules of Evidence
The Fourth Amendment