What is the first step that needs to be carried out to crack the password?
A. A word list is created using a dictionary generator program or dictionaries
B. The list of dictionary words is hashed or encrypted
C. The hashed wordlist is compared against the target hashed password, generally one word at a time
D. If it matches, that password has been cracked and the password cracker displays the unencrypted version of the password
Smith, an employee of a reputed forensic Investigation firm, has been hired by a private organization to investigate a laptop that is suspected to be involved in hacking of organization DC server. Smith wants to find all the values typed into the Run box in the Start menu. Which of the following registry key Smith will check to find the above information?
A. UserAssist Key
B. MountedDevices key
C. RunMRU key
D. TypedURLs key
Depending upon the Jurisdictional areas, different laws apply to different incidents. Which of the following law is related to fraud and related activity in connection with computers?
A. 18 USC 7029
B. 18 USC 7030
C. 18 USC 7361
D. 18 USC 7371
Which of the following is not a part of disk imaging tool requirements?
A. The tool should not change the original content
B. The tool should log I/O errors in an accessible and readable form, including the type and location of the error
C. The tool must have the ability to be held up to scientific and peer review
D. The tool should not compute a hash value for the complete bit stream copy generated from an image file of the source
A mobile operating system is the operating system that operates a mobile device like a mobile phone, smartphone, PDA, etc. It determines the functions and features available on mobile devices such as keyboards, applications, email, text messaging, etc. Which of the following mobile operating systems is free and open source?
A. Web OS
B. Android
C. Apple IOS
D. Symbian OS
Which of the following is not correct when documenting an electronic crime scene?
A. Document the physical scene, such as the position of the mouse and the location of components near the system
B. Document related electronic components that are difficult to find
C. Record the condition of the computer system, storage media, electronic devices and conventional evidence, including power status of the computer
D. Write down the color of shirt and pant the suspect was wearing
Data compression involves encoding the data to take up less storage space and less bandwidth for transmission. It helps in saving cost and high data manipulation in many business applications.
Which data compression technique maintains data integrity?
A. Lossless compression
B. Lossy compression
C. Speech encoding compression
D. Lossy video compression
The ARP table of a router comes in handy for Investigating network attacks, as the table contains IP addresses associated with the respective MAC addresses.
The ARP table can be accessed using the __________command in Windows 7.
A. C:\arp -a
B. C:\arp -d
C. C:\arp -s
D. C:\arp -b
When collecting electronic evidence at the crime scene, the collection should proceed from the most volatile to the least volatile
A. True
B. False
Which of the following is not a part of data acquisition forensics Investigation?
A. Permit only authorized personnel to access
B. Protect the evidence from extremes in temperature
C. Work on the original storage medium not on the duplicated copy
D. Disable all remote access to the system
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-49V9 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.