Discount Offer
Go Back on 312-49v9 Exam
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99



Pass exam with Dumps4free or we will provide you with three additional months of access for FREE.

312-49v9 Practice Test


Page 3 out of 98 Pages

Topic 1: Exam Set A

Shortcuts are the files with the extension .Ink that are created and are accessed by the
users. These files provide you with information about:


A.

Files or network shares


B.

Running application


C.

Application logs


D.

System logs





A.
  

Files or network shares



Ron. a computer forensics expert, Is Investigating a case involving corporate espionage.
He has recovered several mobile computing devices from the crime scene. One of the
evidence that Ron possesses is a mobile phone from Nokia that was left in on condition.
Ron needs to recover the IMEI number of the device to establish the identity of the device
owner. Which of the following key combinations he can use to recover the IMEI number?


A.

#*06*#


B.

*#06#


C.

#06r


D.

*1MEI#





B.
  

*#06#



An intrusion detection system (IDS) gathers and analyzes information from within a
computer or a network to identify any possible violations of security policy, including
unauthorized access, as well as misuse.
Which of the following intrusion detection systems audit events that occur on a specific
host?


A.

Network-based intrusion detection


B.

Host-based intrusion detection


C.

Log file monitoring


D.

File integrity checking





B.
  

Host-based intrusion detection



The need for computer forensics is highlighted by an exponential increase in the number of
cybercrimes and litigations where large organizations were involved. Computer forensics
plays an important role in tracking the cyber criminals. The main role of computer forensics
is to:


A.

Maximize the investigative potential by maximizing the costs


B.

Harden organization perimeter security


C.

Document monitoring processes of employees of the organization


D.

Extract, process, and interpret the factual evidence so that it proves the attacker's
actions in the court





D.
  

Extract, process, and interpret the factual evidence so that it proves the attacker's
actions in the court



Which one of the following statements is not correct while preparing for testimony?


A.

Go through the documentation thoroughly


B.

Do not determine the basic facts of the case before beginning and examining the
evidence


C.

Establish early communication with the attorney


D.

Slack space





A.
  

Go through the documentation thoroughly




Page 3 out of 98 Pages
Previous