Which of the following is not a part of the technical specification of the laboratory-based imaging system?
A. High performance workstation PC
B. Remote preview and imaging pod
C. Anti-repudiation techniques
D. very low image capture rate
Which of the following statements is incorrect related to acquiring electronic evidence at crime scene?
A. Sample banners are used to record the system activities when used by the unauthorized user
B. In warning banners, organizations give clear and unequivocal notice to intruders that by signing onto the system they are expressly consenting to such monitoring
C. The equipment is seized which is connected to the case, knowing the role of the computer which will indicate what should be taken
D. At the time of seizing process, you need to shut down the computer immediately
An image is an artifact that reproduces the likeness of some subject. These are produced by optical devices (i.e. cameras, mirrors, lenses, telescopes, and microscopes).
Which property of the image shows you the number of colors available for each pixel in an image?
A. Pixel
B. Bit Depth
C. File Formats
D. Image File Size
Syslog is a client/server protocol standard for forwarding log messages across an IP network. Syslog uses ___________to transfer log messages in a clear text format.
A. TCP
B. FTP
C. SMTP
D. POP
Under no circumstances should anyone, with the exception of qualified computer forensics personnel, make any attempts to restore or recover information from a computer system or device that holds electronic information.
A. True
B. False
Which of the following log injection attacks uses white space padding to create unusual log entries?
A. Word wrap abuse attack
B. HTML injection attack
C. Terminal injection attack
D. Timestamp injection attack
Which of the following is not correct when documenting an electronic crime scene?
A. Document the physical scene, such as the position of the mouse and the location of components near the system
B. Document related electronic components that are difficult to find
C. Record the condition of the computer system, storage media, electronic devices and conventional evidence, including power status of the computer
D. Write down the color of shirt and pant the suspect was wearing
Digital evidence is not fragile in nature.
A. True
B. False
When a system is compromised, attackers often try to disable auditing, in Windows 7; modifications to the audit policy are recorded as entries of Event ID____________.
A. 4902
B. 3902
C. 4904
D. 3904
Which of the following network attacks refers to sending huge volumes of email to an address in an attempt to overflow the mailbox, or overwhelm the server where the email address is hosted, to cause a denial-of-service attack?
A. Email spamming
B. Mail bombing
C. Phishing
D. Email spoofing
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-49V8 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.