Incidents are reported in order to:
A. Provide stronger protection for systems and data
B. Deal properly with legal issues
C. Be prepared for handling future incidents
D. All the above
The person who offers his formal opinion as a testimony about a computer crime incident in the court of law is known as:
A. Expert Witness
B. Incident Analyzer
C. Incident Responder
D. Evidence Documenter
Electronic evidence may reside in the following:
A. Data Files
B. Backup tapes
C. Other media sources
D. All the above
Digital evidence must:
A. Be Authentic, complete and reliable
B. Not prove the attackers actions
C. Be Volatile
D. Cast doubt on the authenticity and veracity of the evidence
Which of the following is NOT one of the Computer Forensic types:
A. USB Forensics
B. Email Forensics
C. Forensic Archaeology
D. Image Forensics
The correct order or sequence of the Computer Forensic processes is:
A. Preparation, analysis, examination, collection, and reporting
B. Preparation, collection, examination, analysis, and reporting
C. Preparation, examination, collection, analysis, and reporting
D. Preparation, analysis, collection, examination, and reporting
Any information of probative value that is either stored or transmitted in a digital form during a computer crime is called:
A. Digital evidence
B. Computer Emails
C. Digital investigation
D. Digital Forensic Examiner
To recover, analyze, and preserve computer and related materials in such a way that it can be presented as evidence in a court of law and identify the evidence in short time, estimate the potential impact of the malicious activity on the victim, and assess the intent and identity of the perpetrator is known as:
A. Computer Forensics
B. Digital Forensic Analysis
C. Forensic Readiness
D. Digital Forensic Examiner
The individual who recovers, analyzes, and preserves computer and related materials to be presented as evidence in a court of law and identifies the evidence, estimates the potential impact of the malicious activity on the victim, and assesses the intent and identity of the perpetrator is called:
A. Digital Forensic Examiner
B. Computer Forensic Investigator
C. Computer Hacking Forensic Investigator
D. All the above
What command does a Digital Forensic Examiner use to display the list of all IP addresses and their associated MAC addresses on a victim computer to identify the machines that were communicating with it:
A. "arp" command
B. "netstat 璦n" command
C. "dd" command
D. "ifconfig" command
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 212-89 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.