| Exam Code/Number: | 312-49v8Join the discussion |
| Exam Name: | Computer Hacking Forensic Investigator Exam |
| Certification: | EC-COUNCIL |
| Question Number: | 180 |
| Publish Date: | Dec 15, 2025 |
|
Rating
100%
|
|
Physical security recommendations: There should be only one entrance to a forensics lab
Which of the following attacks allows an attacker to access restricted directories, including application source code, configuration and critical system files, and to execute commands outside of the web server's root directory?
If the partition size Is 4 GB, each cluster will be 32 K.
Even If a file needs only 10 K, the entire 32 K will be allocated, resulting In 22 K of___________.
First response to an incident may involve three different groups of people, and each will have differing skills and need to carry out differing tasks based on the incident. Who is responsible for collecting, preserving, and packaging electronic evidence?
An image is an artifact that reproduces the likeness of some subject. These are produced by optical devices (i.e. cameras, mirrors, lenses, telescopes, and microscopes).
Which property of the image shows you the number of colors available for each pixel in an image?