[Free] 2018(Jan) EnsurePass Pass4sure ECCouncil EC1-349 Dumps with VCE and PDF 181-190

Ensurepass.com : Ensure you pass the IT Exams
2018 Jan ECCouncil Official New Released EC1-349
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/EC1-349.html

ECCouncil Computer Hacking Forensic Investigator

Question No: 181 – (Topic 2)

Diskcopy is:

  1. a utility by AccessData

  2. a standard MS-DOS command

  3. Digital Intelligence utility

  4. dd copying tool

Answer: B Explanation:

diskcopy is a STANDARD DOS utility. C:\WINDOWSgt;diskcopy /? Copies the contents of

one floppy disk to another.

Question No: 182 – (Topic 2)

When an investigator contacts by telephone the domain administrator or controller listed by a whois lookup to request all e-mails sent and received for a user account be preserved, what U.S.C. statute authorizes this phone call and obligates the ISP to preserve e-mail records?

  1. Title 18, Section 1030

  2. Title 18, Section 2703(d)

  3. Title 18, Section Chapter 90

  4. Title 18, Section 2703(f)

Answer: D Explanation:

18 U.S.C. 搂 1029 Fraud and Related Activity in Connection with Access Devices 18 U.S.C. 搂 1030 Fraud and Related Activity in Connection with Computers

18 U.S.C. 搂 2703 Required Disclosure of Customer Communications Records 18 U.S.C. 搂 2703(d) Requirements for Court Order

18 U.S.C. 搂 2703(f) Requirement to Preserve Evidence

Question No: 183 – (Topic 2)

What is considered a grant of a property right given to an individual who discovers or invents a new machine, process, useful composition of matter or manufacture?

  1. Copyright

  2. Design patent

  3. Trademark

  4. Utility patent

Answer: D

Question No: 184 – (Topic 2)

George is a senior security analyst working for a state agency in Florida. His state#39;s congress just passed a bill mandating every state agency to undergo a security audit annually. After learning what will be required, George needs to implement an IDS as soon as possible before the first audit occurs. The state bill requires that an IDS with a quot;time- based induction machinequot; be used. What IDS feature must George implement to meet this requirement?

  1. Pattern matching

  2. Statistical-based anomaly detection

  3. Real-time anomaly detection

  4. Signature-based anomaly detection

Answer: C

Question No: 185 – (Topic 2)

Harold is a web designer who has completed a website for ghttech.net. As part of the maintenance agreement he signed with the client, Harold is performing research online and seeing how much exposure the site has received so far. Harold navigates to google.com and types in the following search. link:www.ghttech.net What will this search produce?

  1. All search engines that link to .net domains

  2. All sites that link to ghttech.net

  3. Sites that contain the code: link:www.ghttech.net

  4. All sites that ghttech.net links to

Answer: B

Question No: 186 – (Topic 2)

What type of attack occurs when an attacker can force a router to stop forwarding packets by flooding the router with many open connections simultaneously so that all the hosts behind the router are effectively disabled?

  1. ARP redirect

  2. Physical attack

  3. Digital attack

  4. Denial of service

Answer: D

Question No: 187 – (Topic 2)

When you carve an image, recovering the image depends on which of the following skills?

  1. Recognizing the pattern of the header content

  2. Recovering the image from a tape backup

  3. Recognizing the pattern of a corrupt file

  4. Recovering the image from the tape backup

Answer: A

Question No: 188 – (Topic 2)

During the course of an investigation, you locate evidence that may prove the innocence of the suspect of the investigation. You must maintain an unbiased opinion and be objective in your entire fact finding process. Therefore you report this evidence. This type of evidence is known as:

  1. Inculpatory evidence

  2. mandatory evidence

  3. exculpatory evidence

  4. Terrible evidence

Answer: C

Question No: 189 – (Topic 2)

A packet is sent to a router that does not have the packet destination address in its route table, how will the packet get to its properA packet is sent to a router that does not have the packet? destination address in its route table, how will the packet get to its proper destination?

  1. Border Gateway Protocol

  2. Root Internet servers

  3. Gateway of last resort

  4. Reverse DNS

Answer: C

Question No: 190 – (Topic 2)

You are working as an independent computer forensics investigator and receive a call from a systems administrator for a local school system requesting your assistance. One of the students at the local high school is suspected of downloading inappropriate images from the Internet to a PC in the Computer Lab. When you arrive at the school, the systems administrator hands you a hard drive and tells you that he made a implePC in the Computer Lab. When you arrive at the school, the systems administrator hands you a hard drive and tells you that he made a ?imple backup copy?of the hard drive in the PC and put it on this drive and requests that you examine the drive for evidence of the suspected images. You inform him that a imple backup copy?will not provide deleted files or recover file fragments. What type of copy do you need to make toYou inform him that a ?imple backup copy?will not provide deleted files or recover file fragments. What type of copy do you need to make to ensure that the evidence found is complete and admissible in future proceedings?

  1. Bit-stream copy

  2. Robust copy

  3. Full backup copy

  4. Incremental backup copy

Answer: A

100% Ensurepass Free Download!
Download Free Demo:EC1-349 Demo PDF
100% Ensurepass Free Guaranteed!
EC1-349 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No