312-49v9 Dumps

312-49v9 Free Practice Test

EC-Council 312-49v9: ECCouncil Computer Hacking Forensic Investigator (V9)

QUESTION 1

- (Topic 3)
Corporate investigations are typically easier than public investigations because:

Correct Answer: B

QUESTION 2

- (Topic 3)
Cylie is investigating a network breach at a state organization in Florida. She discovers that the intruders were able to gain access into the company firewalls by overloading them with IP packets. Cylie then discovers through her investigation that the intruders hacked into thecompany? firewalls by overloading them with IP packets. Cylie then discovers through her investigation that the intruders hacked into the company phone system and used the hard drives on their PBX system to store shared music files. What would this attack on the companycompany? phone system and used the hard drives on their PBX system to store shared music files. What would this attack on the company? PBX system be called?

Correct Answer: A

QUESTION 3

- (Topic 1)
In an echo data hiding technique, the secret message is embedded into a ____ as an echo.

Correct Answer: A

QUESTION 4

- (Topic 1)
Which of the following commands shows you the names of all open shared files on a server and number of file locks on each file?

Correct Answer: B

QUESTION 5

- (Topic 3)
A law enforcement officer may only search for and seize criminal evidence with ___ , which are facts or circumstances that would lead a reasonable person to believe a crime has been committed or is about to be committed, evidence of the specific crime exists and the evidence of the specific crime
exists at the place to be searched.

Correct Answer: C
A preponderance of the evidence is the proof requirement in a civil case Beyond a reasonable doubt is the proof requirement in a criminal case