Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

ECCouncil Computer Hacking Forensic Investigator

Last Update 19 hours ago Total Questions : 150

The ECCouncil Computer Hacking Forensic Investigator content is now fully updated, with all current exam questions added 19 hours ago. Deciding to include EC0-349 practice exam questions in your study plan goes far beyond basic test preparation.

You'll find that our EC0-349 exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these EC0-349 sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any ECCouncil Computer Hacking Forensic Investigator practice test comfortably within the allotted time.

Question # 31

You have been called in to help with an investigation of an alleged network intrusion. After questioning the members of the company ITYou have been called in to help with an investigation of an alleged network intrusion. After questioning the members of the company? IT department, you search through the server log files to find any trace of the intrusion. After that you decide to telnet into one of the company routers to see if there is any evidence to be found. While connected to the router, you see some unusual activity and believe that the attackers are currently connected to that router. You start up an ethereal session to begin capturing traffic on the router that could be used in the investigation. At what layer of the OSI model are you monitoring while watching traffic to and from the router?

A.

Network

B.

Transport

C.

Data Link

D.

Session

Question # 32

If you discover a criminal act while investigating a corporate policy abuse, it becomes a public-sector investigation and should be referred to law enforcement?

A.

True

B.

False

Question # 33

While searching through a computer under investigation, you discover numerous files that appear to have had the first letter of the file name replaced by the hex code byte 5h.?What does this indicate on the computer?replaced by the hex code byte ?5h.?What does this indicate on the computer?

A.

The files have been marked as hidden

B.

The files have been marked for deletion

C.

The files are corrupt and cannot be recovered

D.

The files have been marked as read-only

Question # 34

An employee is suspected of stealing proprietary information belonging to your company that he had no rights to possess. The information was stored on the employee computer that was protected with the NTFS Encrypted File System (EFS) and you had observed him copy the files to astored on the employee? computer that was protected with the NTFS Encrypted File System (EFS) and you had observed him copy the files to a floppy disk just before leaving work for the weekend. You detain the employee before he leaves the building and recover the floppy disk and secure his computer. Will you be able to break the encryption so that you can verify that the employee was in possession of the proprietary information?

A.

EFS uses a 128-bit key that cannot be cracked, so you will not be able to recover the information

B.

The EFS Revoked Key Agent can be used on the computer to recover the information

C.

When the encrypted file was copied to the floppy disk, it was automatically unencrypted, so you can recover the information

D.

When the encrypted file was copied to the floppy disk, the EFS private key was also copied to the floppy disk, so you can recover the

information

Question # 35

What is the name of the standard Linux command that can be used to create bit-stream images?

A.

mcopy

B.

image

C.

MD5

D.

dd

Question # 36

When investigating a wireless attack, what information can be obtained from the DHCP logs?

A.

The operating system of the attacker and victim computersThe operating system of the attacker and victim? computers

B.

IP traffic between the attacker and the victim

C.

MAC address of the attacker

D.

If any computers on the network are running in promiscuous mode

Question # 37

When operating systems mark a cluster as used but not allocated, the cluster is considered as _________

A.

Corrupt

B.

Bad

C.

Lost

D.

Unallocated

Question # 38

Which program is the oot loader?when Windows XP starts up?Which program is the ?oot loader?when Windows XP starts up?

A.

KERNEL.EXE

B.

NTLDR

C.

LOADER

D.

LILO

Question # 39

When monitoring for both intrusion and security events between multiple computers, it is essential that the computers ' clocks are synchronized. Synchronized time allows an administrator to reconstruct what took place during an attack against multiple computers. Without synchronized time, it is very difficult to determine exactly when specific events took place, and how events interlace. What is the name of the service used to synchronize time among multiple computers?

A.

Time-Sync Protocol

B.

SyncTime Service

C.

Network Time Protocol

D.

Universal Time Set

Question # 40

You are employed directly by an attorney to help investigate an alleged sexual harassment case at a large pharmaceutical manufacturer. While at the corporate office of the company, the CEO demands to know the status of the investigation. What prevents you from discussing the case with the CEO?

A.

The attorney-work-product rule

B.

Good manners

C.

Trade secrets

D.

ISO 17799

Go to page: