Which root folder (hive) of registry editor contains a vast array of configuration information for the system, including hardware settings and software settings?
A. HKEY_USERS
B. HKEY_CURRENT_USER
C. HKEY_LOCAL_MACHINE
D. HKEY-CURRENT_CONFIG
Hard disk data addressing is a method of allotting addresses to each ___________of data on a hard disk
A. Physical block
B. Logical block
C. Operating system block
D. Hard disk block
How do you define forensic computing?
A. It is the science of capturing, processing, and investigating data security incidents and making it acceptable to a court of law.
B. It is a methodology of guidelines that deals with the process of cyber investigation
C. It Is a preliminary and mandatory course necessary to pursue and understand fundamental principles of ethical hacking
D. It is the administrative and legal proceeding in the process of forensic investigation
Event correlation is a procedure that is assigned with a new meaning for a set of events that occur in a predefined interval of time.
Which type of correlation will you use if your organization wants to use different OS and network hardware platforms throughout the network?
A. Same-platform correlation
B. Cross-platform correlation
C. Multiple-platform correlation
D. Network-platform correlation
Tracks numbering on a hard disk begins at 0 from the outer edge and moves towards the center, typically reaching a value of ___________.
A. 1023
B. 1020
C. 1024
D. 2023
Files stored in the Recycle Bin in its physical location are renamed as Dxy.ext, where, "X" represents the _________.
A. Drive name
B. Sequential number
C. Original file name's extension
D. Original file name
Which of the following statement is not correct when dealing with a powered-on computer at the crime scene?
A. If a computer is switched on and the screen is viewable, record the programs running on screen and photograph the screen
B. If a computer is on and the monitor shows some picture or screen saver, move the mouse slowly without depressing any mouse button and take a photograph of the screen and record the information displayed
C. If a monitor is powered on and the display is blank, move the mouse slowly without depressing any mouse button and take a photograph
D. If the computer is switched off. power on the computer to take screenshot of the desktop
The Recycle Bin is located on the Windows desktop. When you delete an item from the hard disk, Windows sends that deleted item to the Recycle Bin and the icon changes to full from empty, but items deleted from removable media, such as a floppy disk or network drive, are not stored in the Recycle Bin.
What is the size limit for Recycle Bin in Vista and later versions of the Windows?
A. No size limit
B. Maximum of 3.99 GB
C. Maximum of 4.99 GB
D. Maximum of 5.99 GB
Which of the following is not an example of a cyber-crime?
A. Fraud achieved by the manipulation of the computer records
B. Firing an employee for misconduct
C. Deliberate circumvention of the computer security systems
D. Intellectual property theft, including software piracy
Router log files provide detailed Information about the network traffic on the Internet. It gives information about the attacks to and from the networks. The router stores log files in the____________.
A. Router cache
B. Application logs
C. IDS logs
D. Audit logs
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-49V8 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.