ECCouncil 312-49v9 - ECCouncil Computer Hacking Forensic Investigator (V9) Exam
Page: 1 / 98
Total 486 questions
Question #1 (Topic: Topic 1)
JPEG is a commonly used method of compressing photographic Images. It uses a
compression algorithm to minimize the size of the natural image, without affecting the
quality of the image. The JPEG lossy algorithm divides the image in separate blocks
of____________.
compression algorithm to minimize the size of the natural image, without affecting the
quality of the image. The JPEG lossy algorithm divides the image in separate blocks
of____________.
A. 4x4 pixels
B. 8x8 pixels
C. 16x16 pixels
D. 32x32 pixels
Answer: B
Question #2 (Topic: Topic 1)
Which of the following commands shows you the NetBIOS name table each?
A. nbtstat -n
B. nbtstat -c
C. nbtstat -r
D. nbtstat -s
Answer: A
Question #3 (Topic: Topic 1)
Computer security logs contain information about the events occurring within an
organization's systems and networks. Which of the following security logs contains Logs of
network and host-based security software?
organization's systems and networks. Which of the following security logs contains Logs of
network and host-based security software?
A. Operating System (OS) logs
B. Application logs
C. Security software logs
D. Audit logs
Answer: C
Question #4 (Topic: Topic 1)
What is the smallest allocation unit of a hard disk?
A. Cluster
B. Spinning tracks
C. Disk platters
D. Slack space
Answer: A
Question #5 (Topic: Topic 1)
Which of the following is not a part of data acquisition forensics Investigation?
A. Permit only authorized personnel to access
B. Protect the evidence from extremes in temperature
C. Work on the original storage medium not on the duplicated copy
D. Disable all remote access to the system
Answer: C