ECCouncil EC1-349 - ECCouncil Computer Hacking Forensic Investigator Exam

Question #6 (Topic: Topic 1)
What term is used to describe a cryptographic technique for embedding information into
something else for the sole purpose of hiding that information from the casual observer?
A. Key escrow B. Steganography C. Rootkit D. Offset
Answer: B
Question #7 (Topic: Topic 1)
What is the smallest physical storage unit on a hard drive?
A. Track B. Cluster C. Sector D. Platter
Answer: C
Question #8 (Topic: Topic 1)
Heather, a computer forensics investigator, is assisting a group of investigators working on
a large computer fraud case involving over 20 people. These 20 people, working in
different offices, allegedly siphoned off money from many different client accounts. Heather
responsibility is to findThese 20 people, working in different offices, allegedly siphoned off
money from many different client accounts. Heather? responsibility is to find out how the
accused people communicated between each other. She has searched their email and
their computers and has not found any useful evidence. Heather then finds some possibly
useful evidence under the desk of one of the accused. In an envelope she finds a piece of
plastic with numerous holes cut out of it. Heather then finds the same exact piece of plastic
with holes at many of the other accused peoples?desks. Heather believes that the 20
people involved in the case were using a cipher to send secret messages in between each
other. What type of cipher was used by the accused in this case?
A. Grill cipher B. Null cipher C. Text semagram D. Visual semagram
Answer: A
Question #9 (Topic: Topic 1)
What technique used by Encase makes it virtually impossible to tamper with evidence once
it has been acquired?
A. Every byte of the file(s) is given an MD5 hash to match against a master file B. Every byte of the file(s) is verified using 32-bit CRC C. Every byte of the file(s) is copied to three different hard drives D. Every byte of the file(s) is encrypted using three different methods
Answer: B
Question #10 (Topic: Topic 1)
Travis, a computer forensics investigator, is finishing up a case he has been working on for
over a month involving copyright infringement and embezzlement. His last task is to
prepare an investigative report for the president of the company he has been working for.
Travis must submit a hard copy and an electronic copy to this president. In what electronic
format should Travis send this report?
A. TIFF-8 B. DOC C. WPD D. PDF
Answer: D
Download Exam
Page: 2 / 62
Total 306 questions