ECCouncil 312-49 - Computer Hacking Forensic Investigator
What is the following command trying to accomplish?
What hashing method is used to password protect Blackberry devices?
NTFS has reduced slack space than FAT, thus having lesser potential to hide data in the slack space. This is because:
You are working as Computer Forensics investigator and are called by the owner of an accounting firm to investigate possible computer abuse by one of the firm’s employees. You meet with the owner of the firm and discover that the company has never published a policy stating that they reserve the right to inspect their computing assets at will. What do you do?
Which command can provide the investigators with details of all the loaded modules on a Linux-based system?
You have used a newly released forensic investigation tool, which doesn't meet the Daubert Test, during a case. The case has ended-up in court. What argument could the defense make to weaken your case?
You are a computer forensics investigator working with local police department and you are called to assist in an investigation of threatening emails. The complainant has printer out 27 email messages from the suspect and gives the printouts to you. You inform her that you will need to examine her computer because you need access to the _________________________ in order to track the emails back to the suspect.
Which of the following files DOES NOT use Object Linking and Embedding (OLE) technology to embed and link to other objects?
This is original file structure database that Microsoft originally designed for floppy disks. It is written to the outermost track of a disk and contains information about each file stored on the drive.
When searching through file headers for picture file formats, what should be searched to find a JPEG file in hexadecimal format?
An Expert witness give an opinion if:
Richard is extracting volatile data from a system and uses the command doskey/history. What is he trying to extract?
After suspecting a change in MS-Exchange Server storage archive, the investigator has analyzed it. Which of the following components is not an actual part of the archive?
The Apache server saves diagnostic information and error messages that it encounters while processing requests. The default path of this file is usr/local/apache/logs/error.log in Linux. Identify the Apache error log from the following logs.
An investigator has found certain details after analysis of a mobile device. What can reveal the manufacturer information?