Want to pass your ECCouncil Computer Hacking Forensic Investigator (V9) 312-49 exam in the very first attempt? Try Pass2lead! It is equally effective for both starters and IT professionals.
VCE
How many characters long is the fixed-length MD5 algorithm checksum of a critical system file?
A. 128
B. 64
C. 32
D. 16
Office documents (Word, Excel, PowerPoint) contain a code that allows tracking the MAC, or unique identifier, of the machine that created the document. What is that code called?
A. the Microsoft Virtual Machine Identifier
B. the Personal Application Protocol
C. the Globally Unique ID
D. the Individual ASCII String
Which of the following tasks DOES NOT come under the investigation phase of a cybercrime forensics investigation case?
A. Data collection
B. Secure the evidence
C. First response
D. Data analysis