The Regenerate Guide To EC0-349 practice Dec 2016

Proper study guides for Latest EC-Council Computer Hacking Forensic Investigator certified begins with EC-Council EC0-349 preparation products which designed to deliver the Certified EC0-349 questions by making you pass the EC0-349 test at your first time. Try the free EC0-349 demo right now.

2016 Dec EC0-349 dumps

Q161. In conducting a computer abuse investigation you become aware that the suspect of the investigation is using ABC Company as his Internet Service Provider (ISP). You contact the ISP and request that they provide you assistance with your investigation. What assistance can the ISP provide? 

A. the ISP cannot conduct any type of investigations on anyone and therefore cannot assist you 

B. ISPs never maintain log files so they would be of no use to your investigation 

C. the ISP can investigate computer abuse committed by their employees, but must preserve the privacy of their customers and therefore cannot assist you without a warrant 

D. the ISP can investigate anyone using their service and can provide you with assistance 

Answer:


Q162. To make sure the evidence you recover and analyze with computer forensics software can be admitted in court, you must test and validate the software. What group is actively providing tools and creating procedures for testing and validating computer forensics software? 

A. Computer Forensics Tools Validation Committee (CFTVC) 

B. National Institute of Standards and Technology (NIST) 

C. Society for Valid Forensics Tools and Testing (SVFTT) 

D. Association of Computer Forensics Software Manufactures (ACFSM) 

Answer:


Q163. What happens when a file is deleted by a Microsoft operating system using the FAT file system? 

A. the file is erased but can be recovered 

B. only the reference to the file is removed from the FAT 

C. the file is erased and cannot be recovered 

D. a copy of the file is stored and the original file is erased 

Answer:


Q164. An expert witness may give an opinion if: 

A. the opinion, inferences, or conclusions depend on special knowledge, skill, or training not within the ordinary experience of lay jurors 

B. to deter the witness from expanding the scope of his or her investigation beyond the requirements of the case 

C. to stimulate discussion between the consulting expert and the expert witness 

D. to define the issues of the case for determination by the finder of fact 

Answer:


Up to date EC0-349 test preparation:

Q165. When investigating a Windows system, it is important to view the contents of the "page" or "swap" file because: 

A. this is the file that Windows uses to store the history of the last 100 commands that were run from the command line 

B. Windows stores all of the systems configuration information in this file 

C. this is the file that Windows uses to communicate directly with the Registry 

D. a large volume of data can exist within the swap file of which the computer user has no knowledge 

Answer:


Q166. In conducting a computer abuse investigation you become aware that the suspect of the 

investigation is using ABC Company as his Internet Service Provider (ISP). You contact the ISP and request that they provide you assistance with your investigation. What assistance can the ISP provide? 

A. the ISP can investigate computer abuse committed by their employees, but must preserve the privacy of their customers and therefore cannot assist you without a warrant 

B. the ISP can investigate anyone using their service and can provide you with assistance 

C. ISPs never maintain log files so they would be of no use to your investigation 

D. the ISP cannot conduct any type of investigations on anyone and therefore cannot assist you 

Answer:


Q167. Simon is a former employee of Trinitron XML Inc. He feels he was wrongly terminated and wants to hack into his former company's network. Since Simon remembers some of the server names, he attempts to run the axfr and ixfr commands using DIG. What is Simon trying to accomplish here? 

A. Send DOS commands to crash the DNS servers 

B. Perform DNS poisoning 

C. Perform a zone transfer 

D. Enumerate all the users in the domain 

Answer:


Q168. Kimberly is studying to be an IT security analyst at a vocational school in her town. The school offers many different programming as well as networking languages. What networking protocol language should she learn that routers utilize? 

A. ATM 

B. UDP 

C. BPG 

D. OSPF 

Answer:



see more EC0-349 dumps