View Mode
Q: 11
Centralized binary logging is a process in which many websites write binary and unformatted log data to a single log file. What extension should the investigator look to find its log file?
Options
Q: 12
When performing a forensics analysis, what device is used to prevent the system from recording data on an evidence disk?
Options
Q: 13
Where should the investigator look for the Edge browser’s browsing records, including history, cache, and cookies?
Options
Q: 14
What is the capacity of Recycle bin in a system running on Windows Vista?
Options
Q: 15
Analyze the hex representation of mysql-bin.000013 file in the screenshot below. Which of the following will be an inference from this analysis? ECcouncil CHFI 312-49v10 question
Options
Q: 16
Select the tool appropriate for finding the dynamically linked lists of an application or malware.
Options
Q: 17
To check for POP3 traffic using Ethereal, what port should an investigator search by?
Options
Q: 18
John is working on his company policies and guidelines. The section he is currently working on covers company documents; how they should be handled, stored, and eventually destroyed. John is concerned about the process whereby outdated documents are destroyed. What type of shredder should John write in the guidelines to be used when destroying documents?
Options
Q: 19
If you discover a criminal act while investigating a corporate policy abuse, it becomes a publicsector investigation and should be referred to law enforcement?
Options
Q: 20
Rule 1002 of Federal Rules of Evidence (US) talks about
Options
Question 11 of 20 · Page 2 / 2

Premium Access Includes

  • Quiz Simulator
  • Exam Mode
  • Progress Tracking
  • Question Saving
  • Flash Cards
  • Drag & Drops
  • 3 Months Access
  • PDF Downloads
Get Premium Access
Scroll to Top

FLASH OFFER

Days
Hours
Minutes
Seconds

avail 10% DISCOUNT on YOUR PURCHASE