Computer Hacking Forensic Investigator Exam Workbook: 500+ Questions & Answers for ECCouncil 312-49: Updated 2020 by Aries+ Centre

Computer Hacking Forensic Investigator Exam Workbook: 500+ Questions & Answers for ECCouncil 312-49: Updated 2020 by Aries+ Centre

Author:Aries+ Centre [Centre, Aries+]
Language: eng
Format: azw3
Published: 2020-08-31T16:00:00+00:00


QUESTION NO: 224

Heather, a computer forensics investigator, is assisting a group of investigators working on a large computer fraud case involving over 20 people. These 20 people, working in different offices, allegedly siphoned off money from many different client accounts. Heather responsibility is to find out how the accused people communicated between each other. She has searched their email and their computers and has not found any useful evidence. Heather then finds some possibly useful evidence under the desk of one of the accused.

In an envelope she finds a piece of plastic with numerous holes cut out of it. Heather then finds the same exact piece of plastic with holes at many of the other accused peoples desks. Heather believes that the 20 people involved in the case were using a cipher to send secret messages in between each other. What type of cipher was used by the accused in this case?

A.

Null cipher

B.

Grill cipher

C.

Visual semagram

D.

Text semagram

Answer: B

Explanation:



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Popular ebooks
Cybersecurity: The Beginner's Guide by Dr. Erdal Ozkaya(1667)
Digital Forensics and Incident Response - Second Edition by Gerard Johansen(1462)
Network Security Strategies by Aditya Mukherjee(1369)
Modern Cryptography for Cybersecurity Professionals by Lisa Bock(1335)
Practical Cybersecurity Architecture by Diana Kelley Ed Moyle(1324)
Web Penetration Testing with Kali Linux - Third Edition by Gilberto Nájera-Gutiérrez(782)
Web Application Obfuscation by Mario Heiderich & Eduardo Alberto Vela Nava & Gareth Heyes & David Lindsay(581)
Cybersecurity - Attack and Defense Strategies by Erdal Ozkaya & Yuri Diogenes(579)
GCIH GIAC Certified Incident Handler All-in-One Exam Guide by Nick Mitropoulos(470)
Kali Linux Penetration Testing Bible by Gus Khawaja(424)
Cybercrime Investigations by John Bandler(409)
The Hardware Hacking Handbook by Colin O'Flynn(373)
Computer Hacking Forensic Investigator Exam Workbook: 500+ Questions & Answers for ECCouncil 312-49: Updated 2020 by Aries+ Centre(354)
Kali Linux: Testing Your Network: How to Test Infrastructure Security with Security Testing and Penetration Testing by Eltrinos Frank(349)
Security in Computing, 5e by Charles P. Pfleeger & Shari Lawrence Pfleeger & Jonathan Margulies(322)
The Big User-Friendly Cyber Security Gaint - Palo Alto Networks: An Ultimate Guide To Secure Your Cloud And On-Premise Networks by Purackal Rachel Sebastian(320)
Penetration Testing and Reverse Engineering: Intrusion Detection Systems and e-Commerce Websites by Rob Kowalski(311)
8 Steps to Better Security by Crawley Kim;(305)
Security, Privacy and User Interaction by Unknown(285)
Cybersecurity: A Self-Teaching Introduction by C.P. Gupta & K.K. Goyal(276)