312-49 Dumps

312-49 Braindumps

312-49 Real Questions

312-49 Practice Test

312-49 Actual Questions


killexams.com EC-Council 312-49


Computer Hacking Forensic Investigator


https://killexams.com/pass4sure/exam-detail/312-49


QUESTION: 311

Harold is finishing up a report on a case of network intrusion, corporate spying, and embezzlement that he has been working on for over six months. He is trying to find the right term to use in his report to describe network-enabled spying. What term should Harold use?


  1. Spycrack

  2. Spynet

  3. Netspionage

  4. Hackspionage


Answer: C


QUESTION: 312

What is considered a grant of a property right given to an individual who discovers or invents a new machine, process, useful composition of matter or manufacture?


  1. Copyright

  2. Design patent

  3. Trademark

  4. Utility patent


Answer: D


QUESTION: 313

Where is the startup configuration located on a router?


  1. Static RAM

  2. BootROM

  3. NVRAM

  4. Dynamic RAM


Answer: C


QUESTION: 314

You are working for a large clothing manufacturer as a computer forensics investigator and are called in to investigate an unusual case of an employee possibly stealing clothing designs from the company and sellin1g05them under a different brand name for a

different company. What you discover during the course of the investigation is that the clothing designs are actually original products of the employee and the company has no policy against an employee selling his own designs on his own time. The only thing that you can find that the employee is doing wrong is that his clothing design incorporates the same graphic symbol as that of the company with only the wording in the graphic being different. What area of the law is the employee violating?


  1. Copyright law

  2. Brandmark law

  3. Trademark law

  4. Printright law


Answer: C


QUESTION: 315

While searching through a computer under investigation, you discover numerous files that appear to have had the first letter of the file name replaced by the hex code byte 5h.?What does this indicate on the computer?replaced by the hex code byte ?5h.?What does this indicate on the computer?


  1. The files have been marked as hidden

  2. The files have been marked for deletion

  3. The files are corrupt and cannot be recovered

  4. The files have been marked as read-only


Answer: B


QUESTION: 316

While presenting his case to the court, Simon calls many witnesses to the stand to testify. Simon decides to call Hillary Taft, a lay witness, to the stand. Since Hillary is a lay witness, what field would she be considered an expert in?


  1. Technical material related to forensics

  2. No particular field

  3. Judging the character of defendants/victims

  4. Legal issues


Answer: B

QUESTION: 317 106

When reviewing web logs, you see an entry for esource not found?in the HTTP status code field. What is the actual error code that you wouldWhen reviewing web logs, you see an entry for ?esource not found?in the HTTP status code field. What is the actual error code that you would see in the log for esource not found?see in the log for

?esource not found?


  1. 202

  2. 404

  3. 606

  4. 999


Answer: B


QUESTION: 318

What stage of the incident handling process involves reporting events?


  1. Containment

  2. Follow-up

  3. Identification

  4. Recovery


Answer: C


QUESTION: 319

When investigating a computer forensics case where Microsoft Exchange and Blackberry Enterprise server are used, where would investigator need to search to find email sent from a Blackberry device?


  1. RIM Messaging center

  2. Blackberry Enterprise server

  3. Microsoft Exchange server

  4. Blackberry desktop redirector


Answer: C


QUESTION: 320

What type of attack sends spoofed UDP packets (instead of ping packets) with a fake source address to the IP broadcast address of a large network?

  1. Fraggle

  2. Smurf scan

  3. SYN flood

  4. Teardrop


Answer: A


QUESTION: 321

The police believe that Mevin Matthew has been obtaining unauthorized access to computers belonging to numerous computer software and computer operating systems manufacturers, cellular telephone manufacturers, Internet Service Providers, and educational institutions. They also suspect that he has been stealing, copying, and misappropriating proprietary computer software belonging to the several victim companies. What is preventing the police from breaking down the suspect door and searching his home and seizing all of his computer equipment if they haveis preventing the police from breaking down the suspect? door and searching his home and seizing all of his computer equipment if they have not yet obtained a warrant?


  1. The USA Patriot Act

  2. The Good Samaritan Laws

  3. The Federal Rules of Evidence

  4. The Fourth Amendment


Answer: D