Pass the ECCouncil No Cert Assigned 312-49 Questions and answers with CertsForce

Viewing page 2 out of 11 pages
Viewing questions 16-30 out of questions
Questions # 16:

Pagefile.sys is a virtual memory file used to expand the physical memory of a computer. Select the registry path for the page file:

Options:

A.

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management


B.

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\System Management


C.

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Device Management


D.

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management\PrefetchParameters


Questions # 17:

Wireless access control attacks aim to penetrate a network by evading WLAN access control measures such as AP MAC filters and Wi-Fi port access controls. Which of the following wireless access control attacks allow the attacker to set up a rogue access point outside the corporate perimeter and then lure the employees of the organization to connect to it?

Options:

A.

Ad hoc associations


B.

Client mis-association


C.

MAC spoofing


D.

Rogue access points


Questions # 18:

How many sectors will a 125 KB file use in a FAT32 file system?

Options:

A.

32


B.

16


C.

256


D.

25


Questions # 19:

You are working as a Computer forensics investigator for a corporation on a computer abuse case. You discover evidence that shows the subject of your investigation is also embezzling money from the company. The company CEO and the corporate legal counsel advise you to contact law enforcement and provide them with the evidence that you have found. The law enforcement officer that responds requests that you put a network sniffer on your network and monitor all traffic to the subject’s computer. You inform the officer that you will not be able to comply with that request because doing so would:

Options:

A.

Violate your contract


B.

Cause network congestion


C.

Make you an agent of law enforcement


D.

Write information to the subject’s hard drive


Questions # 20:

Casey has acquired data from a hard disk in an open source acquisition format that allows her to generate compressed or uncompressed image files. What format did she use?

Options:

A.

Portable Document Format


B.

Advanced Forensics Format (AFF)


C.

Proprietary Format


D.

Raw Format


Questions # 21:

In handling computer-related incidents, which IT role should be responsible for recovery, containment, and prevention to constituents?

Options:

A.

Security Administrator


B.

Network Administrator


C.

Director of Information Technology


D.

Director of Administration


Questions # 22:

Daryl, a computer forensics investigator, has just arrived at the house of an alleged computer hacker. Daryl takes pictures and tags all computer and peripheral equipment found in the house. Daryl packs all the items found in his van and takes them back to his lab for further examination. At his lab, Michael his assistant helps him with the investigation. Since Michael is still in training, Daryl supervises all of his work very carefully. Michael is not quite sure about the procedures to copy all the data off the computer and peripheral devices. How many data acquisition tools should Michael use when creating copies of the evidence for the investigation?

Options:

A.

Two


B.

One


C.

Three


D.

Four


Questions # 23:

When cataloging digital evidence, the primary goal is to

Options:

A.

Make bit-stream images of all hard drives


B.

Preserve evidence integrity


C.

Not remove the evidence from the scene


D.

Not allow the computer to be turned off


Questions # 24:

Which of the following Perl scripts will help an investigator to access the executable image of a process?

Options:

A.

Lspd.pl


B.

Lpsi.pl


C.

Lspm.pl


D.

Lspi.pl


Questions # 25:

When setting up a wireless network with multiple access points, why is it important to set each access point on a different channel?

Options:

A.

Multiple access points can be set up on the same channel without any issues


B.

Avoid over-saturation of wireless signals


C.

So that the access points will work on different frequencies


D.

Avoid cross talk


Questions # 26:

What is the smallest physical storage unit on a hard drive?

Options:

A.

Track


B.

Cluster


C.

Sector


D.

Platter


Questions # 27:

Analyze the hex representation of mysql-bin.000013 file in the screenshot below. Which of the following will be an inference from this analysis?

Question # 27

Options:

A.

A user with username bad_guy has logged into the WordPress web application


B.

A WordPress user has been created with the username anonymous_hacker


C.

An attacker with name anonymous_hacker has replaced a user bad_guy in the WordPress database


D.

A WordPress user has been created with the username bad_guy


Questions # 28:

Which of the following does not describe the type of data density on a hard disk?

Options:

A.

Volume density


B.

Track density


C.

Linear or recording density


D.

Areal density


Questions # 29:

Which of the following file system is used by Mac OS X?

Options:

A.

EFS


B.

HFS+


C.

EXT2


D.

NFS


Questions # 30:

Tyler is setting up a wireless network for his business that he runs out of his home. He has followed all the directions from the ISP as well as the wireless router manual. He does not have any encryption set and the SSID is being broadcast. On his laptop, he can pick up the wireless signal for short periods of time, but then the connection drops and the signal goes away.

Eventually the wireless signal shows back up, but drops intermittently. What could be Tyler issue with his home wireless network?

Options:

A.

Computers on his wired network


B.

Satellite television


C.

2.4Ghz Cordless phones


D.

CB radio


Viewing page 2 out of 11 pages
Viewing questions 16-30 out of questions