Download Computer Hacking Forensic Investigator.Actualtests.312-49.2019-07-24.1e.245q.vcex

Download Exam

File Info

Exam Computer Hacking Forensic Investigator
Number 312-49
File Name Computer Hacking Forensic Investigator.Actualtests.312-49.2019-07-24.1e.245q.vcex
Size 976 Kb
Posted July 24, 2019
Downloads 25

How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Purchase
Coupon: EXAM_HUB

Discount: 20%

 
 



Demo Questions

Question 1
You are working as an investigator for a corporation and you have just received instructions from your manager to assist in the collection of 15 hard drives that are part of an ongoing investigation. 
Your job is to complete the required evidence custody forms to properly document each piece of evidence as it is collected by other members of your team. Your manager instructs you to complete one multi-evidence form for the entire case and a single-evidence form for each hard drive. How will these forms be stored to help preserve the chain of custody of the case? 

  • A: All forms should be placed in an approved secure container because they are now primary evidence in the case.
  • B: The multi-evidence form should be placed in the report file and the single-evidence forms should be kept with each hard drive in an approved secure container.
  • C: The multi-evidence form should be placed in an approved secure container with the hard drives and the single-evidence forms should be placed in the report file.
  • D: All forms should be placed in the report file because they are now primary evidence in the case.



Question 2
The MD5 program is used to:

  • A: wipe magnetic media before recycling it
  • B: make directories on an evidence disk
  • C: view graphics files on an evidence drive
  • D: verify that a disk is not altered when you examine it



Question 3
Which is a standard procedure to perform during all computer forensics investigations?

  • A: with the hard drive removed from the suspect PC, check the date and time in the system's CMOS
  • B: with the hard drive in the suspect PC, check the date and time in the File Allocation Table
  • C: with the hard drive removed from the suspect PC, check the date and time in the system's RAM
  • D: with the hard drive in the suspect PC, check the date and time in the system's CMOS



Question 4
E-mail logs contain which of the following information to help you in your investigation? (Choose four.)

  • A: user account that was used to send the account
  • B: attachments sent with the e-mail message
  • C: unique message identifier
  • D: contents of the e-mail message
  • E: date and time the message was sent



Question 5
In a forensic examination of hard drives for digital evidence, what type of user is most likely to have the most file slack to analyze? 

  • A: one who has NTFS 4 or 5 partitions
  • B: one who uses dynamic swap file capability
  • C: one who uses hard disk writes on IRQ 13 and 21
  • D: one who has lots of allocation units per block or cluster



Question 6
In what way do the procedures for dealing with evidence in a criminal case differ from the procedures for dealing with evidence in a civil case?

  • A: evidence must be handled in the same way regardless of the type of case
  • B: evidence procedures are not important unless you work for a law enforcement agency
  • C: evidence in a criminal case must be secured more tightly than in a civil case
  • D: evidence in a civil case must be secured more tightly than in a criminal case



Question 7
You are assigned to work in the computer forensics lab of a state police agency. While working on a high profile criminal case, you have followed every applicable procedure, however your boss is still concerned that the defense attorney might question whether evidence has been changed while at the lab. What can you do to prove that the evidence is the same as it was when it first entered the lab?

  • A: make an MD5 hash of the evidence and compare it with the original MD5 hash that was taken when the evidence first entered the lab
  • B: make an MD5 hash of the evidence and compare it to the standard database developed by NIST
  • C: there is no reason to worry about this possible claim because state labs are certified
  • D: sign a statement attesting that the evidence is the same as it was when it entered the lab



Question 8
Study the log given below and answer the following question:
Apr 24 14:46:46 [4663]: spp_portscan: portscan detected from 194.222.156.169
Apr 24 14:46:46 [4663]: IDS27/FIN Scan: 194.222.156.169:56693 -> 172.16.1.107:482
Apr 24 18:01:05 [4663]: IDS/DNS-version-query: 212.244.97.121:3485 -> 172.16.1.107:53
Apr 24 19:04:01 [4663]: IDS213/ftp-passwd-retrieval: 194.222.156.169:1425 -> 172.16.1.107:21
Apr 25 08:02:41 [5875]: spp_portscan: PORTSCAN DETECTED from 24.9.255.53
Apr 25 02:08:07 [5875]: IDS277/DNS-version-query: 63.226.81.13:4499 -> 172.16.1.107:53
Apr 25 02:08:07 [5875]: IDS277/DNS-version-query: 63.226.81.13:4630 -> 172.16.1.101:53
Apr 25 02:38:17 [5875]: IDS/RPC-rpcinfo-query: 212.251.1.94:642 -> 172.16.1.107:111
Apr 25 19:37:32 [5875]: IDS230/web-cgi-space-wildcard: 198.173.35.164:4221 -> 172.16.1.107:80
Apr 26 05:45:12 [6283]: IDS212/dns-zone-transfer: 38.31.107.87:2291 -> 172.16.1.101:53
Apr 26 06:43:05 [6283]: IDS181/nops-x86: 63.226.81.13:1351 -> 172.16.1.107:53
Apr 26 06:44:25 victim7 PAM_pwdb[12509]: (login) session opened for user simple by (uid=0)
Apr 26 06:44:36 victim7 PAM_pwdb[12521]: (su) session opened for user simon by simple(uid=506)
Apr 26 06:45:34 [6283]: IDS175/socks-probe: 24.112.167.35:20 -> 172.16.1.107:1080
Apr 26 06:52:10 [6283]: IDS127/telnet-login-incorrect: 172.16.1.107:23 -> 213.28.22.189:4558
Precautionary measures to prevent this attack would include writing firewall rules. Of these firewall rules, which among the following would be appropriate?

  • A: Disallow UDP53 in from outside to DNS server
  • B: Allow UDP53 in from DNS server to outside
  • C: Disallow TCP53 in from secondaries or ISP server to DNS server
  • D: Block all UDP traffic



Question 9
When monitoring for both intrusion and security events between multiple computers, it is essential that the computers' clocks are synchronized. Synchronized time allows an administrator to reconstruct what took place during an attack against multiple computers. Without synchronized time, it is very difficult to determine exactly when specific events took place, and how events interlace. What is the name of the service used to synchronize time among multiple computers?

  • A: Universal Time Set
  • B: Network Time Protocol
  • C: SyncTime Service
  • D: Time-Sync Protocol



Question 10
During the course of an investigation, you locate evidence that may prove the innocence of the suspect of the investigation. You must maintain an unbiased opinion and be objective in your entire fact finding process. Therefore, you report this evidence. This type of evidence is known as:

  • A: Inculpatory evidence
  • B: Mandatory evidence
  • C: Exculpatory evidence
  • D: Terrible evidence






CONNECT US


ProfExam
PROFEXAM WITH A 20% DISCOUNT

You can buy ProfExam with a 20% discount..

Get Now!


HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen



HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset