Pass4itsure > NetApp > New Release > 312-49V8 > 312-49V8 Online Practice Questions and Answers

312-49V8 Online Practice Questions and Answers

Questions 4

You can interact with the Registry through intermediate programs. Graphical user interface (GUI) Registry editors such as Regedit.exe or Regedt32 exe are commonly used as intermediate programs in Windows 7. Which of the following is a root folder of the registry editor?

A. HKEY_USERS

B. HKEY_LOCAL_ADMIN

C. HKEY_CLASSES_ADMIN

D. HKEY_CLASSES_SYSTEM

Buy Now
Questions 5

The Electronic Serial Number (ESN) is a unique __________ recorded on a secure chip in a mobile phone by the manufacturer.

A. 16-bit identifier

B. 24-bit identifier

C. 32-bit identifier

D. 64-bit identifier

Buy Now
Questions 6

When collecting evidence from the RAM, where do you look for data?

A. Swap file

B. SAM file

C. Data file

D. Log file

Buy Now
Questions 7

Computer security logs contain information about the events occurring within an organization's systems and networks. Application and Web server log files are useful in detecting web attacks. The source, nature, and time of the attack can be determined by _________of the compromised system.

A. Analyzing log files

B. Analyzing SAM file

C. Analyzing rainbow tables

D. Analyzing hard disk boot records

Buy Now
Questions 8

Which of the following is not correct when documenting an electronic crime scene?

A. Document the physical scene, such as the position of the mouse and the location of components near the system

B. Document related electronic components that are difficult to find

C. Record the condition of the computer system, storage media, electronic devices and conventional evidence, including power status of the computer

D. Write down the color of shirt and pant the suspect was wearing

Buy Now
Questions 9

Which of the following is not a part of data acquisition forensics Investigation?

A. Permit only authorized personnel to access

B. Protect the evidence from extremes in temperature

C. Work on the original storage medium not on the duplicated copy

D. Disable all remote access to the system

Buy Now
Questions 10

SMTP (Simple Mail Transfer protocol) receives outgoing mail from clients and validates source and destination addresses, and also sends and receives emails to and from other SMTP servers.

A. True

B. False

Buy Now
Questions 11

What is the goal of forensic science?

A. To determine the evidential value of the crime scene and related evidence

B. Mitigate the effects of the information security breach

C. Save the good will of the investigating organization

D. It is a disciple to deal with the legal processes

Buy Now
Questions 12

Which of the following is not a part of disk imaging tool requirements?

A. The tool should not change the original content

B. The tool should log I/O errors in an accessible and readable form, including the type and location of the error

C. The tool must have the ability to be held up to scientific and peer review

D. The tool should not compute a hash value for the complete bit stream copy generated from an image file of the source

Buy Now
Questions 13

Wi-Fi Protected Access (WPA) is a data encryption method for WLANs based on 802.11 standards. Temporal Key Integrity Protocol (TKIP) enhances WEP by adding a rekeying mechanism to provide fresh encryption and integrity keys. Temporal keys are changed for every____________.

A. 5,000 packets

B. 10.000 packets

C. 15,000 packets

D. 20.000 packets

Buy Now
Exam Code: 312-49V8
Exam Name: Computer Hacking Forensic Investigator Exam
Last Update: Nov 24, 2024
Questions: 180
10%OFF Coupon Code: SAVE10

PDF (Q&A)

$49.99

VCE

$55.99

PDF + VCE

$65.99