[May 2018] 312-49v9 Exam Questions Free Download From Lead2pass 490q
Best Lead2pass EC-Council 312-49v9 PDF Dumps With New Update Exam Questions: https://www.lead2pass.com/312-49v9.html QUESTION 71 Data Acquisition is the process of imaging or otherwise obtaining information from a digital device and its peripheral equipment and media A. True B. False Answer: A QUESTION 72 Under no circumstances should anyone, with the exception of qualified computer forensics personnel, make any attempts to restore or recover information from a computer system or device that holds electronic information. A. True B. False Answer: A QUESTION 73 In which step of the computer forensics investigation methodology would you run MD5 checksum on the evidence? A. Obtain search warrant B. Evaluate and secure the scene C. Collect the evidence D. Acquire the data Answer: D QUESTION 74 Steganography is a technique of hiding a secret message within an ordinary message and extracting it at the destination to maintain the confidentiality of data. A. True B. False Answer: A QUESTION 75 When the operating system marks cluster as used, but does not allocate them to any file, such clusters are known as ___________. A. Lost clusters B. Bad clusters C. Empty clusters D. Unused clusters Answer: A QUESTION 76 Cyber-crime is defined as any Illegal act involving a gun, ammunition, or its applications. A. True B. False Answer: B QUESTION 77 Syslog is a client/server protocol standard for forwarding log messages across an IP network. Syslog uses ___________to transfer log messages in a clear text format. A. TCP B. FTP C. SMTP D. POP Answer: A QUESTION 78 How do you define Technical Steganography? A. Steganography that uses physical or chemical means to hide the existence of a message B. Steganography that utilizes written natural language to hide the message in the carrier in some non-obvious ways C. Steganography that utilizes written JAVA language to hide the message in the carrier in some non-obvious ways D. Steganography that utilizes visual symbols or signs to hide secret messages Answer: A QUESTION 79 Digital evidence is not fragile in nature. A. True B. False Answer: B QUESTION 80 Depending upon the Jurisdictional areas, different laws apply to different incidents. Which of the following law is related to fraud and related activity in connection with computers? A. 18 USC 7029 B. 18 USC 7030 C. 18 USC 7361 D. 18 USC 7371 Answer: B 312-49v9 dumps full version (PDF&VCE): https://www.lead2pass.com/312-49v9.html Large amount of free 312-49v9 exam questions on Google Drive: https://drive.google.com/open?id=0B3Syig5i8gpDSWJCNkFjOEx1Yms You may also need: 312-50v9 exam dumps: https://drive.google.com/open?id=0B3Syig5i8gpDTVZJRHRvblhycms
|