Discount Offer
Go Back on 312-49v9 Exam
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99



Pass exam with Dumps4free or we will provide you with three additional months of access for FREE.

312-49v9 Practice Test


Page 19 out of 98 Pages

Topic 1: Exam Set A

Which of the following would you consider an aspect of organizational security, especially
focusing on IT security?


A.

Biometric information security


B.

Security from frauds


C.

Application security


D.

Information copyright security





C.
  

Application security



Event correlation is a procedure that is assigned with a new meaning for a set of events
that occur in a predefined interval of time.
Which type of correlation will you use if your organization wants to use different OS and
network hardware platforms throughout the network?


A.

Same-platform correlation


B.

Cross-platform correlation


C.

Multiple-platform correlation


D.

Network-platform correlation





B.
  

Cross-platform correlation



Which of the following passwords are sent over the wire (and wireless) network, or stored
on some media as it is typed without any alteration?


A.

Clear text passwords


B.

Obfuscated passwords


C.

Hashed passwords


D.

Hex passwords





A.
  

Clear text passwords



According to US federal rules, to present a testimony in a court of law, an expert witness
needs to furnish certain information to prove his eligibility. Jason, a qualified computer
forensic expert who has started practicing two years back, was denied an expert testimony
in a computer crime case by the US Court of Appeals for the Fourth Circuit in Richmond,
Virginia. Considering the US federal rules, what could be the most appropriate reason for
the court to reject Jason's eligibility as an expert witness?


A.

Jason was unable to furnish documents showing four years of previous experience in
the field


B.

Being a computer forensic expert, Jason is not eligible to present testimony in a
computer crime case


C.

Jason was unable to furnish documents to prove that he is a computer forensic expert


D.

Jason was not aware of legal issues involved with computer crimes





A.
  

Jason was unable to furnish documents showing four years of previous experience in
the field



Which one of the following is not a consideration in a forensic readiness planning checklist?


A.

Define the business states that need digital evidence


B.

Identify the potential evidence available


C.

Decide the procedure for securely collecting the evidence that meets the requirement fn
a forensically sound manner


D.

Take permission from all employees of the organization





D.
  

Take permission from all employees of the organization




Page 19 out of 98 Pages
Previous