Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: validbest

Pass the ECCouncil CHFIv9 312-49v9 Questions and answers with ValidTests

Exam 312-49v9 All Questions
Exam 312-49v9 Premium Access

View all detail and faqs for the 312-49v9 exam

Viewing page 4 out of 14 pages
Viewing questions 31-40 out of questions
Questions # 31:

What is the first step taken in an investigation for laboratory forensic staff members?

Options:

A.

Packaging the electronic evidence

B.

Securing and evaluating the electronic crime scene

C.

Conducting preliminary interviews

D.

Transporting the electronic evidence

Expert Solution
Questions # 32:

Netstat is a tool for collecting information regarding network connections. It provides a simple view of TCP and UDP connections, and their state and network traffic statistics. Which of the following commands shows you the TCP and UDP network connections, listening ports, and the identifiers?

Options:

A.

netstat – r

B.

netstat – ano

C.

netstat – b

D.

netstat – s

Expert Solution
Questions # 33:

When is it appropriate to use computer forensics?

Options:

A.

If copyright and intellectual property theft/misuse has occurred

B.

If employees do not care for their boss management techniques

C.

If sales drop off for no apparent reason for an extended period of time

D.

If a financial institution is burglarized by robbers

Expert Solution
Questions # 34:

What type of analysis helps to identify the time and sequence of events in an investigation?

Options:

A.

Time-based

B.

Functional

C.

Relational

D.

Temporal

Expert Solution
Questions # 35:

Given the drive dimensions as follows and assuming a sector has 512 bytes, what is the capacity of the described hard drive?

22,164 cylinders/disk

80 heads/cylinder

63 sectors/track

Options:

A.

53.26 GB

B.

57.19 GB

C.

11.17 GB

D.

10 GB

Expert Solution
Questions # 36:

What feature of Decryption Collection allows an investigator to crack a password as quickly as possible?

Options:

A.

Cracks every password in 10 minutes

B.

Distribute processing over 16 or fewer computers

C.

Support for Encrypted File System

D.

Support for MD5 hash verification

Expert Solution
Questions # 37:

What method of copying should always be performed first before carrying out an investigation?

Options:

A.

Parity-bit copy

B.

Bit-stream copy

C.

MS-DOS disc copy

D.

System level copy

Expert Solution
Questions # 38:

The process of restarting a computer that is already turned on through the operating system is called?

Options:

A.

Warm boot

B.

Ice boot

C.

Hot Boot

D.

Cold boot

Expert Solution
Questions # 39:

What type of equipment would a forensics investigator store in a StrongHold bag?

Options:

A.

PDAPDA?

B.

Backup tapes

C.

Hard drives

D.

Wireless cards

Expert Solution
Questions # 40:

Which of the following is an iOS Jailbreaking tool?

Options:

A.

Kingo Android ROOT

B.

Towelroot

C.

One Click Root

D.

Redsn0w

Expert Solution
Viewing page 4 out of 14 pages
Viewing questions 31-40 out of questions