PrepAway - Latest Free Exam Questions & Answers

Category: 312-49

Exam 312-49: Computer Hacking Forensic Investigator

What header field in the TCP/IP protocol stack involves the hacker exploit known as the Ping of Death?

What header field in the TCP/IP protocol stack involves the hacker exploit known as the Ping of Death?

Under which Federal Statutes does FBI investigate for computer crimes involving e-mail scams and mail fraud?

Under which Federal Statutes does FBI investigate for computer crimes involving e-mail scams and mail fraud?

In a FAT32 system, a 123 KB file will use how many sectors?

In a FAT32 system, a 123 KB file will use how many sectors?

What should you examine next in this case?

You have been asked to investigate the possibility of computer fraud in the finance department of a company. It is suspected that a staff member has been committing finance fraud by printing cheques that have not been authorized. You have exhaustively searched all data files on a bitmap image of the target computer, but have found no evidence. You suspect the files may not have been saved. What should you examine next in this case?

When performing a forensics analysis, what device is used to prevent the system from recording data on an evid

When performing a forensics analysis, what device is used to prevent the system from recording data on an evidence disk?


Page 15 of 21« First...10...1314151617...20...Last »