PrepAway - Latest Free Exam Questions & Answers

Tag: Briefing 312-49 (update December 06th, 2017)

Briefing 312-49: ECCouncil Computer Hacking Forensic Investigator (update December 06th, 2017)

Where did the incident team go wrong?

A state department site was recently attacked and all the servers had their disks erased. The incident response
team sealed the area and commenced investigation. During evidence collection they came across a zip disks
that did not have the standard labeling on it. The incident team ran the disk on an isolated system and found
that the system disk was accidentally erased. They decided to call in the FBI for further investigation.
Meanwhile, they short listed possible suspects including three summer interns. Where did the incident team go
wrong?

What port do you send the email to on the company SMTP …

You are working in the security Department of law firm. One of the attorneys asks you about the topic of
sending fake email because he has a client who has been charged with doing just that. His client alleges that
he is innocent and that there is no way for a fake email to actually be sent. You inform the attorney that his
client is mistaken and that fake email is possibility and that you can prove it. You return to your desk and craft afake email to the attorney that appears to come from his boss. What port do you send the email to on the
company SMTP server?

which of the following options would you suggest as the…

Volatile Memory is one of the leading problems for forensics. Worms such as code Red are memory resident
and do write themselves to the hard drive, if you turn the system off they disappear. In a lab environment,
which of the following options would you suggest as the most appropriate to overcome the problem of
capturing volatile memory?

What are two common methods used by password cracking s…

You are called in to assist the police in an investigation involving a suspected drug dealer. The suspects house
was searched by the police after a warrant was obtained and they located a floppy disk in the suspects
bedroom. The disk contains several files, but they appear to be password protected. What are two common
methods used by password cracking software that you can use to obtain the password?


Page 23 of 32« First...10...2122232425...30...Last »