PrepAway - Latest Free Exam Questions & Answers

Category: 312-49 (v.4)

Briefing 312-49: ECCouncil Computer Hacking Forensic Investigator (update December 06th, 2017)

What can an investigator examine to verify that a file …

One technique for hiding information is to change the file extension from the correct one to one that might not
be noticed by an investigator. For example, changing a .jpg extension to a .doc extension so that a picture fileappears to be a document. What can an investigator examine to verify that a file has the correct extension?

What do you think would be the next sequence of events?

Chris has been called upon to investigate a hacking incident reported by one of his clients. The company
suspects the involvement of an insider accomplice in the attack. Upon reaching the incident scene, Chris
secures the physical area, records the scene using visual media. He shuts the system down by pulling the
power plug so that he does not disturb the system in any way. He labels all cables and connectors prior to
disconnecting any. What do you think would be the next sequence of events?


Page 22 of 32« First...10...2021222324...30...Last »