312-49v9 Dumps

312-49v9 Free Practice Test

EC-Council 312-49v9: ECCouncil Computer Hacking Forensic Investigator (V9)

QUESTION 66

- (Topic 3)
You just passed your ECSA exam and are about to start your first consulting job running security audits for a financial institution in Los Angeles. The IT manager of the company you will be working for tries to see if you remember your ECSA class. He asks about the methodology you will be using to test the company's network. How would you answer?

Correct Answer: D

QUESTION 67

- (Topic 2)
What term is used to describe a cryptographic technique for embedding information into something else for the sole
purpose of hiding that information from the casual observer?

Correct Answer: B

QUESTION 68

- (Topic 1)
Which of the following commands shows you the username and IP address used to access the system via a remote login session and the Type of client from which they are accessing the system?

Correct Answer: A

QUESTION 69

- (Topic 1)
Which of the following approaches checks and compares all the fields systematically and intentionally for positive and negative correlation with each other to determine the correlation across one or multiple fields?

Correct Answer: D

QUESTION 70

- (Topic 2)
The efforts to obtain information before a trial by demanding documents, depositions, questions and answers written under oath, written requests for admissions of fact, and examination of the scene is a description of what legal term?

Correct Answer: D