Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: validbest

Pass the ECCouncil CHFI v10 312-49v10 Questions and answers with ValidTests

Exam 312-49v10 All Questions
Exam 312-49v10 Premium Access

View all detail and faqs for the 312-49v10 exam

Viewing page 3 out of 14 pages
Viewing questions 31-45 out of questions
Questions # 31:

Which of the following network attacks refers to sending huge volumes of email to an address in an attempt to overflow the mailbox or overwhelm the server where the email address is hosted so as to cause a denial-of-service attack?

Options:

A.

Email spamming

B.

Phishing

C.

Email spoofing

D.

Mail bombing

Expert Solution
Questions # 32:

You are working as an independent computer forensics investigator and received a call from a systems administrator for a local school system requesting your assistance. One of the students at the local high school is suspected of downloading inappropriate images from the Internet to a PC in the Computer Lab. When you arrive at the school, the systems administrator hands you a hard drive and tells you that he made a “simple backup copy” of the hard drive in the PC and put it on this drive and requests that you examine the drive for evidence of the suspected images. You inform him that a “simple backup copy” will not provide deleted files or recover file fragments. What type of copy do you need to make to ensure that the evidence found is complete and admissible in future proceeding?

Options:

A.

Robust copy

B.

Incremental backup copy

C.

Bit-stream copy

D.

Full backup copy

Expert Solution
Questions # 33:

During the trial, an investigator observes that one of the principal witnesses is severely ill and cannot be present for the hearing. He decides to record the evidence and present it to the court. Under which rule should he present such evidence?

Options:

A.

Rule 1003: Admissibility of Duplicates

B.

Limited admissibility

C.

Locard’s Principle

D.

Hearsay

Expert Solution
Questions # 34:

Which of the following standard represents a legal precedent set in 1993 by the Supreme Court of the United States regarding the admissibility of expert witnesses' testimony during federal legal proceedings?

Options:

A.

SWGDE & SWGIT

B.

IOCE

C.

Frye

D.

Daubert

Expert Solution
Questions # 35:

POP3 is an Internet protocol, which is used to retrieve emails from a mail server. Through which port does an email client connect with a POP3 server?

Options:

A.

110

B.

143

C.

25

D.

993

Expert Solution
Questions # 36:

For the purpose of preserving the evidentiary chain of custody, which of the following labels is not appropriate?

Options:

A.

Relevant circumstances surrounding the collection

B.

General description of the evidence

C.

Exact location the evidence was collected from

D.

SSN of the person collecting the evidence

Expert Solution
Questions # 37:

The surface of a hard disk consists of several concentric rings known as tracks; each of these tracks has smaller partitions called disk blocks. What is the size of each block?

Options:

A.

512 bits

B.

512 bytes

C.

256 bits

D.

256 bytes

Expert Solution
Questions # 38:

A picture file is recovered from a computer under investigation. During the investigation process, the file is enlarged 500% to get a better view of its contents. The picture quality is not degraded at all from this process. What kind of picture is this file. What kind of picture is this file?

Options:

A.

Raster image

B.

Vector image

C.

Metafile image

D.

Catalog image

Expert Solution
Questions # 39:

In handling computer-related incidents, which IT role should be responsible for recovery, containment, and prevention to constituents?

Options:

A.

Security Administrator

B.

Network Administrator

C.

Director of Information Technology

D.

Director of Administration

Expert Solution
Questions # 40:

In Windows Security Event Log, what does an event id of 530 imply?

Options:

A.

Logon Failure – Unknown user name or bad password

B.

Logon Failure – User not allowed to logon at this computer

C.

Logon Failure – Account logon time restriction violation

D.

Logon Failure – Account currently disabled

Expert Solution
Questions # 41:

Which of the following data structures stores attributes of a process, as well as pointers to other attributes and data structures?

Options:

A.

Lsproc

B.

DumpChk

C.

RegEdit

D.

EProcess

Expert Solution
Questions # 42:

Where is the startup configuration located on a router?

Options:

A.

Static RAM

B.

BootROM

C.

NVRAM

D.

Dynamic RAM

Expert Solution
Questions # 43:

If a PDA is seized in an investigation while the device is turned on, what would be the proper procedure?

Options:

A.

Keep the device powered on

B.

Turn off the device immediately

C.

Remove the battery immediately

D.

Remove any memory cards immediately

Expert Solution
Questions # 44:

Which among the following files provides email header information in the Microsoft Exchange server?

Options:

A.

gwcheck.db

B.

PRIV.EDB

C.

PUB.EDB

D.

PRIV.STM

Expert Solution
Questions # 45:

Which of the following files DOES NOT use Object Linking and Embedding (OLE) technology to embed and link to other objects?

Options:

A.

Portable Document Format

B.

MS-office Word Document

C.

MS-office Word OneNote

D.

MS-office Word PowerPoint

Expert Solution
Viewing page 3 out of 14 pages
Viewing questions 31-45 out of questions