試験科目:EC-COUNCIL 「Computer Hacking Forensic Investigator Exam」

EC-COUNCIL 312-49v8認証試験に合格することが簡単ではなくて、EC-COUNCIL 312-49v8証明書は君にとってはIT業界に入るの一つの手づるになるかもしれません。しかし必ずしも大量の時間とエネルギーで復習しなくて、弊社が丹精にできあがった問題集を使って、試験なんて問題ではありません。



NO.1 When collecting electronic evidence at the crime scene, the collection should proceed from
most volatile to the least volatile
A. True
B. False
Answer: A

EC-COUNCIL認定資格   312-49v8   312-49v8   312-49v8認定証   312-49v8

NO.2 Which of the following Wi-Fi chalking methods refers to drawing symbols in public places to
advertise open Wi-Fi networks?
A. WarWalking
B. WarFlying
C. WarChalking
D. WarDhving
Answer: C

EC-COUNCIL   312-49v8   312-49v8認定証   312-49v8過去問   312-49v8過去問

NO.3 Which of the following statements is not a part of securing and evaluating electronic crime
A. Locate and help the victim
B. Transmit additional flash messages to other responding units
C. Request additional help at the scene if needed
D. Blog about the incident on the internet
Answer: D

EC-COUNCIL過去問   312-49v8認定資格   312-49v8   312-49v8問題集   312-49v8認定資格

NO.4 Computer forensics report provides detailed information on complete computer forensics
investigation process. It should explain how the incident occurred, provide technical details of the
incident and should be clear to understand. Which of the following attributes of a forensics report
can render it inadmissible in a court of law?
A. It includes metadata about the incident
B. It includes relevant extracts referred to In the report that support analysis or conclusions
C. It is based on logical assumptions about the incident timeline
D. It maintains a single document style throughout the text
Answer: C

EC-COUNCIL問題集   312-49v8   312-49v8   312-49v8認定証

NO.5 Networks are vulnerable to an attack which occurs due to overextension of bandwidth,
bottlenecks, network data interception, etc.
Which of the following network attacks refers to a process in which an attacker changes his or her
IP address so that he or she appears to be someone else?
A. IP address spoofing
B. Man-in-the-middle attack
C. Denial of Service attack
D. Session sniffing
Answer: A

EC-COUNCIL   312-49v8問題集   312-49v8練習問題   312-49v8過去問   312-49v8

投稿日: 2013/1/31 6:18:20  |  カテゴリー: EC-COUNCIL  |  タグ: EC-COUNCIL312-49v8