Download ECCouncil.312-49.ActualTests.2019-07-24.245q.tqb

Download Exam

File Info

Exam Computer Hacking Forensic Investigator
Number 312-49
File Name ECCouncil.312-49.ActualTests.2019-07-24.245q.tqb
Size 2 MB
Posted Jul 24, 2019
Download ECCouncil.312-49.ActualTests.2019-07-24.245q.tqb

How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Purchase

Coupon: MASTEREXAM
With discount: 20%






Demo Questions

Question 1

You are working as an investigator for a corporation and you have just received instructions from your manager to assist in the collection of 15 hard drives that are part of an ongoing investigation. 
Your job is to complete the required evidence custody forms to properly document each piece of evidence as it is collected by other members of your team. Your manager instructs you to complete one multi-evidence form for the entire case and a single-evidence form for each hard drive. How will these forms be stored to help preserve the chain of custody of the case? 


  1. All forms should be placed in an approved secure container because they are now primary evidence in the case.
  2. The multi-evidence form should be placed in the report file and the single-evidence forms should be kept with each hard drive in an approved secure container.
  3. The multi-evidence form should be placed in an approved secure container with the hard drives and the single-evidence forms should be placed in the report file.
  4. All forms should be placed in the report file because they are now primary evidence in the case.
Correct answer: B



Question 2

The MD5 program is used to:


  1. wipe magnetic media before recycling it
  2. make directories on an evidence disk
  3. view graphics files on an evidence drive
  4. verify that a disk is not altered when you examine it
Correct answer: D



Question 3

Which is a standard procedure to perform during all computer forensics investigations?


  1. with the hard drive removed from the suspect PC, check the date and time in the system's CMOS
  2. with the hard drive in the suspect PC, check the date and time in the File Allocation Table
  3. with the hard drive removed from the suspect PC, check the date and time in the system's RAM
  4. with the hard drive in the suspect PC, check the date and time in the system's CMOS
Correct answer: A









CONNECT US

Facebook

Twitter

PROFEXAM WITH A 20% DISCOUNT

You can buy ProfExam with a 20% discount!



HOW TO OPEN VCEX FILES

Use ProfExam Simulator to open VCEX files