Pass4itsure > EC-COUNCIL > CHFI > EC1-349 > EC1-349 Online Practice Questions and Answers

EC1-349 Online Practice Questions and Answers

Questions 4

George was recently fired from his job as an IT analyst at Pitts and Company in Dallas Texas. His main duties as an analyst were to support the company Active Directory structure and to create network polices. George now wants to break into the company network by cracking some ofcompany? Active Directory structure and to create network polices. George now wants to break into the company? network by cracking some of the service accounts he knows about. Which password cracking technique should George use in this situation?

A. Brute force attack

B. Syllable attack

C. Rule-based attack

D. Dictionary attack

Buy Now
Questions 5

Paul is a computer forensics investigator working for Tyler and Company Consultants. Paul has been called upon to help investigate a computer hacking ring broken up by the local police. Paul begins to inventory the PCs found in the hackers?hideout. Paul then comes across a PDA left by them that is attached to a number of different peripheral devices. What is the first step that Paul must take with the PDA to ensure the integrity of the investigation?

A. Place PDA, including all devices, in an antistatic bag

B. Unplug all connected devices

C. Power off all devices if currently on

D. Photograph and document the peripheral devices

Buy Now
Questions 6

As a CHFI professional, which of the following is the most important to your professional reputation?

A. Your Certifications

B. The correct, successful management of each and every case

C. The free that you charge

D. The friendship of local law enforcement officers

Buy Now
Questions 7

Cylie is investigating a network breach at a state organization in Florida. She discovers that the intruders were able to gain access into the company firewalls by overloading them with IP packets. Cylie then discovers through her investigation that the intruders hacked into thecompany? firewalls by overloading them with IP packets. Cylie then discovers through her investigation that the intruders hacked into the company phone system and used the hard drives on their PBX system to store shared music files. What would this attack on the companycompany? phone system and used the hard drives on their PBX system to store shared music files. What would this attack on the company? PBX system be called?

A. Phreaking

B. Squatting

C. Crunching

D. Pretexting

Buy Now
Questions 8

At what layer of the OSI model do routers function on?

A. 4

B. 3

C. 1

D. 5

Buy Now
Questions 9

In Linux, what is the smallest possible shellcode?

A. 8 bytes

B. 24 bytes

C. 800 bytes

D. 80 bytes

Buy Now
Questions 10

Which is not a part of environmental conditions of a forensics lab?

A. Large dimensions of the room

B. Good cooling system to overcome excess heat generated by the work station

C. Allocation of workstations as per the room dimensions

D. Open windows facing the public road

Buy Now
Questions 11

According to US federal rules, to present a testimony in a court of law, an expert witness needs to furnish certain information to prove his eligibility. Jason, a qualified computer forensic expert who has started practicing two years back, was denied an expert testimony in a computer crime case by the US Court of Appeals for the Fourth Circuit in Richmond, Virginia. Considering the US federal rules, what could be the most appropriate reason for the court to reject Jason's eligibility as an expert witness?

A. Jason was unable to furnish documents showing four years of previous experience in the field

B. Being a computer forensic expert, Jason is not eligible to present testimony in a computer crime case

C. Jason was unable to furnish documents to prove that he is a computer forensic expert

D. Jason was not aware of legal issues involved with computer crimes

Buy Now
Questions 12

The need for computer forensics is highlighted by an exponential increase in the number of cybercrimes and litigations where large organizations were involved. Computer forensics plays an important role in tracking the cyber criminals. The main role of computer forensics is to:

A. Maximize the investigative potential by maximizing the costs

B. Harden organization perimeter security

C. Document monitoring processes of employees of the organization

D. Extract, process, and interpret the factual evidence so that it proves the attacker's actions in the court

Buy Now
Questions 13

Mobile phone forensics is the science of recovering digital evidence from a mobile phone under forensically sound conditions.

A. True

B. False

Buy Now
Exam Code: EC1-349
Exam Name: Computer Hacking Forensic Investigator Exam
Last Update: Apr 22, 2024
Questions: 486
10%OFF Coupon Code: SAVE10

PDF (Q&A)

$45.99

VCE

$49.99

PDF + VCE

$59.99