ECCouncil 312-49v9 - ECCouncil Computer Hacking Forensic Investigator (V9) Exam

Page:    1 / 98   
Total 486 questions

JPEG is a commonly used method of compressing photographic Images. It uses a compression algorithm to minimize the size of the natural image, without affecting the quality of the image. The JPEG lossy algorithm divides the image in separate blocks of____________.

  • A. 4x4 pixels
  • B. 8x8 pixels
  • C. 16x16 pixels
  • D. 32x32 pixels


Answer : B

Which of the following commands shows you the NetBIOS name table each?

  • A. nbtstat -n
  • B. nbtstat -c
  • C. nbtstat -r
  • D. nbtstat -s


Answer : A

Computer security logs contain information about the events occurring within an organization's systems and networks. Which of the following security logs contains Logs of network and host-based security software?

  • A. Operating System (OS) logs
  • B. Application logs
  • C. Security software logs
  • D. Audit logs


Answer : C

What is the smallest allocation unit of a hard disk?

  • A. Cluster
  • B. Spinning tracks
  • C. Disk platters
  • D. Slack space


Answer : A

Which of the following is not a part of data acquisition forensics Investigation?

  • A. Permit only authorized personnel to access
  • B. Protect the evidence from extremes in temperature
  • C. Work on the original storage medium not on the duplicated copy
  • D. Disable all remote access to the system


Answer : C

Page:    1 / 98   
Total 486 questions