[Free] 2018(Jan) Dumps4cert Examcollection ECCouncil 312-49v8 Dumps with VCE and PDF 91-100

Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 Jan ECCouncil Official New Released 312-49v8
100% Free Download! 100% Pass Guaranteed!

ECCouncil Computer Hacking Forensic Investigator (V8)

Question No: 91

Which of the following is not a part of the technical specification of the laboratory-based imaging system?

  1. High performance workstation PC

  2. Remote preview and imaging pod

  3. Anti-repudiation techniques

  4. very low image capture rate

Answer: D

Question No: 92

Which of the following is not a part of data acquisition forensics Investigation?

  1. Permit only authorized personnel to access

  2. Protect the evidence from extremes in temperature

  3. Work on the original storage medium not on the duplicated copy

  4. Disable all remote access to the system

Answer: C

Question No: 93

At the time of evidence transfer, both sender and receiver need to give the information about date and time of transfer in the chain of custody record.

  1. True

  2. False

Answer: A

Question No: 94

Digital photography helps in correcting the perspective of the Image which Is used In taking the measurements of the evidence. Snapshots of the evidence and incident-prone areas need to be taken to help in the forensic process. Is digital photography accepted as evidence in the court of law?

  1. Yes

  2. No

Answer: A

Question No: 95

Computer security logs contain information about the events occurring within an organization#39;s systems and networks. Which of the following security logs contains Logs of network and host-based security software?

  1. Operating System (OS) logs

  2. Application logs

  3. Security software logs

  4. Audit logs

Answer: C

Question No: 96

What is the quot;Best Evidence Rulequot;?

  1. It states that the court only allows the original evidence of a document, photograph, or recording at the trial rather than a copy

  2. It contains system time, logged-on user(s), open files, network information, process information, process-to-port mapping, process memory, clipboard contents, service/driver information, and command history

  3. It contains hidden files, slack space, swap file, index.dat files, unallocated clusters, unused partitions, hidden partitions, registry settings, and event logs

  4. It contains information such as open network connection, user logout, programs that reside in memory, and cache data

Answer: A

Question No: 97

SIM is a removable component that contains essential information about the subscriber. It has both volatile and non-volatile memory. The file system of a SIM resides in


  1. Volatile

  2. Non-volatile

Answer: B

Question No: 98

Which of the following passwords are sent over the wire (and wireless) network, or stored on some media as it is typed without any alteration?

  1. Clear text passwords

  2. Obfuscated passwords

  3. Hashed passwords

  4. Hex passwords

Answer: A

Question No: 99

In Windows 7 system files, which file reads the Boot.ini file and loads Ntoskrnl.exe. Bootvid.dll. Hal.dll, and boot-start device drivers?

  1. Ntldr

  2. Gdi32.dll

  3. Kernel32.dll

  4. Boot.in

Answer: A

Question No: 100

Networks are vulnerable to an attack which occurs due to overextension of bandwidth, bottlenecks, network data interception, etc.

Which of the following network attacks refers to a process in which an attacker changes his or her IP address so that he or she appears to be someone else?

  1. IP address spoofing

  2. Man-in-the-middle attack

  3. Denial of Service attack

  4. Session sniffing

Answer: A

100% Dumps4cert Free Download!
Download Free Demo:312-49v8 Demo PDF
100% Dumps4cert Free Guaranteed!
312-49v8 Dumps

Dumps4cert ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No