Pass the ECCouncil No Cert Assigned 312-49 Questions and answers with CertsForce

Viewing page 4 out of 11 pages
Viewing questions 46-60 out of questions
Questions # 46:

Harold is finishing up a report on a case of network intrusion, corporate spying, and embezzlement that he has been working on for over six months. He is trying to find the right term to use in his report to describe network-enabled spying. What term should Harold use?

Options:

A.

Spycrack


B.

Spynet


C.

Netspionage


D.

Hackspionage


Questions # 47:

Investigators can use the Type Allocation Code (TAC) to find the model and origin of a mobile device. Where is TAC located in mobile devices?

Options:

A.

International Mobile Equipment Identifier (IMEI)


B.

Integrated circuit card identifier (ICCID)


C.

International mobile subscriber identity (IMSI)


D.

Equipment Identity Register (EIR)


Questions # 48:

Which tool does the investigator use to extract artifacts left by Google Drive on the system?

Options:

A.

PEBrowse Professional


B.

RegScanner


C.

RAM Capturer


D.

Dependency Walker


Questions # 49:

What file is processed at the end of a Windows XP boot to initialize the logon dialog box?

Options:

A.

NTOSKRNL.EXE


B.

NTLDR


C.

LSASS.EXE


D.

NTDETECT.COM


Questions # 50:

You are working in the security Department of law firm. One of the attorneys asks you about the topic of sending fake email because he has a client who has been charged with doing just that. His client alleges that he is innocent and that there is no way for a fake email to actually be sent. You inform the attorney that his client is mistaken and that fake email is possibility and that you can prove it. You return to your desk and craft a fake email to the attorney that appears to come from his boss. What port do you send the email to on the company SMTP server?

Options:

A.

10


B.

25


C.

110


D.

135


Questions # 51:

Printing under a Windows Computer normally requires which one of the following files types to be created?

Options:

A.

EME


B.

MEM


C.

EMF


D.

CME


Questions # 52:

A(n) _____________________ is one that's performed by a computer program rather than the attacker manually performing the steps in the attack sequence.

Options:

A.

blackout attack


B.

automated attack


C.

distributed attack


D.

central processing attack


Questions # 53:

Email archiving is a systematic approach to save and protect the data contained in emails so that it can be accessed fast at a later date. There are two main archive types, namely Local Archive and Server Storage Archive. Which of the following statements is correct while dealing with local archives?

Options:

A.

Server storage archives are the server information and settings stored on a local system, whereas the local archives are the local email client information stored on the mail server


B.

It is difficult to deal with the webmail as there is no offline archive in most cases. So consult your counsel on the case as to the best way to approach and gain access to the required data on servers


C.

Local archives should be stored together with the server storage archives in order to be admissible in a court of law


D.

Local archives do not have evidentiary value as the email client may alter the message data


Questions # 54:

The MD5 program is used to:

Options:

A.

wipe magnetic media before recycling it


B.

make directories on an evidence disk


C.

view graphics files on an evidence drive


D.

verify that a disk is not altered when you examine it


Questions # 55:

What is kept in the following directory? HKLM\SECURITY\Policy\Secrets

Options:

A.

Cached password hashes for the past 20 users


B.

Service account passwords in plain text


C.

IAS account names and passwords


D.

Local store PKI Kerberos certificates


Questions # 56:

Steven has been given the task of designing a computer forensics lab for the company he works for. He has found documentation on all aspects of how to design a lab except the number of exits needed. How many exits should Steven include in his design for the computer forensics lab?

Options:

A.

Three


B.

One


C.

Two


D.

Four


Questions # 57:

When you carve an image, recovering the image depends on which of the following skills?

Options:

A.

Recognizing the pattern of the header content


B.

Recovering the image from a tape backup


C.

Recognizing the pattern of a corrupt file


D.

Recovering the image from the tape backup


Questions # 58:

A small law firm located in the Midwest has possibly been breached by a computer hacker looking to obtain information on their clientele. The law firm does not have any on-site IT employees, but wants to search for evidence of the breach themselves to prevent any possible media attention. Why would this not be recommended?

Options:

A.

Searching for evidence themselves would not have any ill effects


B.

Searching could possibly crash the machine or device


C.

Searching creates cache files, which would hinder the investigation


D.

Searching can change date/time stamps


Questions # 59:

If an attacker's computer sends an IPID of 31400 to a zombie computer on an open port in IDLE scanning, what will be the response?

Options:

A.

The zombie will not send a response


B.

31402


C.

31399


D.

31401


Questions # 60:

Which of the following is a record of the characteristics of a file system, including its size, the block size, the empty and the filled blocks and their respective counts, the size and location of the inode tables, the disk block map and usage information, and the size of the block groups?

Options:

A.

Inode bitmap block


B.

Superblock


C.

Block bitmap block


D.

Data block


Viewing page 4 out of 11 pages
Viewing questions 46-60 out of questions