It is impossible to pass EC-Council EC0-349 exam without any help in the short term. Come to Testking soon and find the most advanced, correct and guaranteed EC-Council EC0-349 practice questions. You will get a surprising result by our Updated Computer Hacking Forensic Investigator practice guides.
2021 Nov EC0-349 test
Q161. The use of warning banners helps a company avoid litigation by overcoming an employees
assumed when connecting to the companys intranet, network, or virtual private network (VPN) and will allow the companys investigators to monitor, search, and retrieve information stored within the network.
A. right of free speech
B. right to work
C. right to Internet access
D. right of privacy
Answer: D
Q162. What does the acronym POST mean as it relates to a PC?
A. Pre Operational Situation Test
B. Primary Operations Short Test
C. Primary Operating System Test
D. PowerOn Self Test
Answer: D
Q163. When reviewing web logs, you see an entry for resource not found in the HTTP status code field. What is the actual error code that you would see in the log for resource not found?
A. 909
B. 606
C. 202
D. 404
Answer: D
Q164. If you plan to startup a suspect's computer, you must modify the to ensure that you do not contaminate or alter data on the suspect's hard drive by booting to the hard drive.
A. CMOS
B. Scandisk utility
C. Boot.sys
D. deltree command
Answer: A
Abreast of the times EC0-349 rapidshare:
Q165. You are assisting in the investigation of a possible Web Server hack. The company who called you stated that customers reported to them that whenever they entered the web address of the
company in their browser, what they received was a pornographic web site. The company checked the web server and nothing appears wrong. When you type in the IP address of the web site in your browser everything appears normal. What is the name of the attack that affects the DNS cache of the name resolution servers, resulting in those servers directing users to the wrong web site?
A. ARP Poisoning
B. IP Spoofing
C. HTTP redirect attack
D. DNS Poisoning
Answer: D
Q166. What term is used to describe a cryptographic technique for embedding information into something else for the sole purpose of hiding that information from the casual observer?
A. offset
B. rootkit
C. steganography
D. key escrow
Answer: C
Q167. In the context of file deletion process, which of the following statement holds true?
A. Secure delete programs work by completely overwriting the file in one go
B. While booting, the machine may create temporary files that can delete evidence
C. The longer a disk is inuse, the less likely it is that deleted files will be overwritten
D. When files are deleted, the data is overwritten and the cluster marked as available
Answer: B
Q168. You are employed directly by an attorney to help investigate an alleged sexual harassment case at a large pharmaceutical manufacturer. While at the corporate office of the company, the CEO demands to know the status of the investigation. What prevents you from discussing the case with the CEO?
A. Good manners
B. the attorney-work-product rule
C. ISO 17799
D. Trade secrets
Answer: B