PrepAway - Latest Free Exam Questions & Answers

Category: 312-49 (v.4)

Briefing 312-49: ECCouncil Computer Hacking Forensic Investigator (update December 06th, 2017)

What is the name of the attack that affects the DNS cac…

You are assisting in the investigation of a possible Web Server Hack. The company who called you stated that
customers reported to them that whenever they entered the web address of the company in their browser, what
they received was a porno graphic web site. The company checked the web server and nothing appears
wrong. When you type in the IP address of the web site in your browser everything appears normal. What is
the name of the attack that affects the DNS cache of the name resolution servers, resulting in those servers
directing users to the wrong web site?

What is preventing the police from breaking down the su…

The police believe that Melvin Matthew has been obtaining unauthorized access to computers belonging to
numerous computer software and computer operating systems manufacturers, cellular telephone
manufacturers, Internet Service Providers and Educational Institutions. They also suspect that he has been
stealing, copying and misappropriating proprietary computer software belonging to the several victim
companies. What is preventing the police from breaking down the suspects door and searching his home and
seizing all of his computer equipment if they have not yet obtained a warrant?

A law enforcement officer may only search for and seize…

A law enforcement officer may only search for and seize criminal evidence with _______________________,
which are facts or circumstances that would lead a reasonable person to believe a crime has been committed
or is about to be committed, evidence of the specific crime exists and the evidence of the specific crime exists
at the place to be searched.

You inform the officer that you will not be able to com…

You are working as a Computer forensics investigator for a corporation on a computer abuse case. You
discover evidence that shows the subject of your investigation is also embezzling money from the company.
The company CEO and the corporate legal counsel advise you to contact law enforcement and provide them
with the evidence that you have found. The law enforcement officer that responds requests that you put a
network sniffer on your network and monitor all traffic to the subject’s computer. You inform the officer that you
will not be able to comply with that request because doing so would:


Page 20 of 32« First...10...1819202122...30...Last »