ECCouncil 312-49 - Computer Hacking Forensic Investigator
As a security analyst, you setup a false survey website that will require users to create a username and a strong password. You send the link to all the employees of the company. What information will you be able to gather?
What are the security risks of running a "repair" installation for Windows XP?
UEFI is a specification that defines a software interface between an OS and platform firmware. Where does this interface store information about files present on a disk?
Korey, a data mining specialist in a knowledge processing firm DataHub.com, reported his CISO that he has lost certain sensitive data stored on his laptop. The CISO wants his forensics investigation team to find if the data loss was accident or intentional. In which of the following category this case will fall?
What malware analysis operation can the investigator perform using the jv16 tool?
If an attacker's computer sends an IPID of 31400 to a zombie computer on an open port in IDLE scanning, what will be the response?
Which of the following is a list of recently used programs or opened files?
One way to identify the presence of hidden partitions on a suspect's hard drive is to:
When investigating a wireless attack, what information can be obtained from the DHCP logs?