Exam Details

  • Exam Code
    :EC0-349
  • Exam Name
    :Computer Hacking Forensic Investigator
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :304 Q&As
  • Last Updated
    :Mar 26, 2025

EC-COUNCIL EC-COUNCIL Certifications EC0-349 Questions & Answers

  • Question 101:

    What does the superblock in Linux define?

    A. filesynames

    B. diskgeometr

    C. location of the firstinode

    D. available space

  • Question 102:

    Diskcopy is:

    A. a utility by AccessData

    B. a standard MS-DOS command

    C. Digital Intelligence utility

    D. dd copying tool

  • Question 103:

    Sectors in hard disks typically contain how many bytes?

    A. 256

    B. 512

    C. 1024

    D. 2048

  • Question 104:

    Area density refers to:

    A. the amount of data per disk

    B. the amount of data per partition

    C. the amount of data per square inch

    D. the amount of data per platter

  • Question 105:

    If you discover a criminal act while investigating a corporate policy abuse, it becomes a publicsector investigation and should be referred to law enforcement?

    A. true

    B. false

  • Question 106:

    What binary coding is used most often for e-mail purposes?

    A. MIME

    B. Uuencode

    C. IMAP

    D. SMTP

  • Question 107:

    If you see the files Zer0.tar.gz and copy.tar.gz on a Linux system while doing an investigation, what can you conclude?

    A. The system files have been copied by a remote attacker

    B. The system administrator has created an incremental backup

    C. The system has been compromised using a t0rnrootkit

    D. Nothing in particular as these can be operational files

  • Question 108:

    From the following spam mail header, identify the host IP that sent this spam?

    From [email protected] [email protected] Tue Nov 27 17:27:11 2001 Received: from viruswall.ie.cuhk.edu.hk (viruswall [137.189.96.52]) by eng.ie.cuhk.edu.hk (8.11.6/8.11.6) with ESMTP id fAR9RAP23061 for ; Tue, 27 Nov 2001 17:27:10 +0800 (HKT) Received: from mydomain.com (pcd249020.netvigator.com [203.218.39.20]) by viruswall.ie.cuhk.edu.hk (8.12.1/8.12.1) with SMTP id fAR9QXwZ018431 for ; Tue, 27 Nov 2001 17:26:36 +0800 (HKT) Message-Id: >[email protected] From: "china hotel web" To: "Shlam" Subject: SHANGHAI (HILTON HOTEL) PACKAGE Date: Tue, 27 Nov 2001 17:25:58 +0800 MIME-Version: 1.0 X-Priority: 3 X-MSMail-Priority: Normal Reply-To: "china hotel web"

    A. 137.189.96.52

    B. 8.12.1.0

    C. 203.218.39.20

    D. 203.218.39.50

  • Question 109:

    What term is used to describe a cryptographic technique for embedding information into something else for the sole purpose of hiding that information from the casual observer?

    A. rootkit

    B. key escrow

    C. steganography

    D. Offset

  • Question 110:

    During the course of an investigation, you locate evidence that may prove the innocence of the suspect of the investigation. You must maintain an unbiased opinion and be objective in your entire fact finding process. Therefore, you report this evidence. This type of evidence is known as:

    A. Inculpatory evidence

    B. Mandatory evidence

    C. Exculpatory evidence

    D. Terrible evidence

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your EC0-349 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.