Free Computer Hacking Forensic Investigator 312-49 Exam Practice Test

UNLOCK FULL
312-49 Exam Features
In Just $59 You can Access
  • All Official Question Types
  • Interactive Web-Based Practice Test Software
  • No Installation or 3rd Party Software Required
  • Customize your practice sessions (Free Demo)
  • 24/7 Customer Support
Page: 1 / 141
Total Questions: 704
  • A computer forensics Investigator or forensic analyst Is a specially trained professional who works with law enforcement as well as private businesses to retrieve Information from computers and other types of data storage devices. For this, the analyst should have an excellent working knowledge of all aspects of the computer. Which of the following is not a duty of the analyst during a criminal investigation?

    Answer: B Next Question
  • You are assigned to work in the computer forensics lab of a state police agency. While working on a high profile criminal case, you have followed every applicable procedure, however your boss is still concerned that the defense attorney might question whether evidence has been changed while at the lab. What can you do to prove that the evidence is the same as it was when it first entered the lab?

    Answer: A Next Question
  • You have been asked to investigate after a user has reported a threatening e-mail they have received from an external source. Which of the following are you most interested in when trying to trace the source of the message?

    Answer: C Next Question
  • An on-site incident response team is called to investigate an alleged case of computer tampering within their company. Before proceeding with the investigation, the CEO informs them that the incident will be classified as low level. How long will the team have to respond to the incident?

    Answer: A Next Question
  • The investigator wants to examine changes made to the system's registry by the suspect program. Which of the following tool can help the investigator?

    Answer: C Next Question
  • Which of the following is a part of a Solid-State Drive (SSD)?

    Answer: C Next Question
  • Which of the following attacks allows an attacker to access restricted directories, including application source code, configuration and critical system files, and to execute commands outside of the web server's root directory?

    Answer: C Next Question
  • Steve, a forensic investigator, was asked to investigate an email incident in his organization. The organization has Microsoft Exchange Server deployed for email communications. Which among the following files will Steve check to analyze message headers, message text, and standard attachments?

    Answer: B Next Question
  • If an attacker's computer sends an IPID of 31400 to a zombie computer on an open port in IDLE scanning, what will be the response?

    Answer: D Next Question
  • In a computer forensics investigation, what describes the route that evidence takes from the time you find it until the case is closed or goes to court?

    Answer: C Next Question
Page: 1 / 141
Total Questions: 704