Pass the ECCouncil No Cert Assigned 312-49 Questions and answers with CertsForce

Viewing page 6 out of 11 pages
Viewing questions 76-90 out of questions
Questions # 76:

In a forensic examination of hard drives for digital evidence, what type of user is most likely to have the most file slack to analyze?

Options:

A.

one who has NTFS 4 or 5 partitions


B.

one who uses dynamic swap file capability


C.

one who uses hard disk writes on IRQ 13 and 21


D.

one who has lots of allocation units per block or cluster


Questions # 77:

Which of the following file system uses Master File Table (MFT) database to store information about every file and directory on a volume?

Options:

A.

FAT File System


B.

ReFS


C.

exFAT


D.

NTFS File System


Questions # 78:

Which principle states that “anyone or anything, entering a crime scene takes something of the scene with them, and leaves something of themselves behind when they leave”?

Options:

A.

Locard's Exchange Principle


B.

Enterprise Theory of Investigation


C.

Locard's Evidence Principle


D.

Evidence Theory of Investigation


Questions # 79:

What file structure database would you expect to find on floppy disks?

Options:

A.

NTFS


B.

FAT32


C.

FAT16


D.

FAT12


Questions # 80:

Bill is the accounting manager for Grummon and Sons LLC in Chicago. On a regular basis, he needs to send PDF documents containing sensitive information through E-mail to his customers.

Bill protects the PDF documents with a password and sends them to their intended recipients.

Why PDF passwords do not offer maximum protection?

Options:

A.

PDF passwords can easily be cracked by software brute force tools


B.

PDF passwords are converted to clear text when sent through E-mail


C.

PDF passwords are not considered safe by Sarbanes-Oxley


D.

When sent through E-mail, PDF passwords are stripped from the document completely


Questions # 81:

Which of the following network attacks refers to sending huge volumes of email to an address in an attempt to overflow the mailbox or overwhelm the server where the email address is hosted so as to cause a denial-of-service attack?

Options:

A.

Email spamming


B.

Phishing


C.

Email spoofing


D.

Mail bombing


Questions # 82:

Which of the following tool is used to locate IP addresses?

Options:

A.

SmartWhois


B.

Deep Log Analyzer


C.

Towelroot


D.

XRY LOGICAL


Questions # 83:

Which Intrusion Detection System (IDS) usually produces the most false alarms due to the unpredictable behaviors of users and networks?

Options:

A.

network-based IDS systems (NIDS)


B.

host-based IDS systems (HIDS)


C.

anomaly detection


D.

signature recognition


Questions # 84:

A honey pot deployed with the IP 172.16.1.108 was compromised by an attacker. Given below is an excerpt from a Snort binary capture of the attack. Decipher the activity carried out by the attacker by studying the log. Please note that you are required to infer only what is explicit in the excerpt.

(Note: The student is being tested on concepts learnt during passive OS fingerprinting, basic TCP/IP connection concepts and the ability to read packet signatures from a sniff dump.)

03/15-20:21:24.107053 211.185.125.124:3500 -> 172.16.1.108:111

TCP TTL:43 TOS:0x0 ID:29726 IpLen:20 DgmLen:52 DF

***A**** Seq: 0x9B6338C5 Ack: 0x5820ADD0 Win: 0x7D78 TcpLen: 32

TCP Options (3) => NOP NOP TS: 23678634 2878772

=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=

03/15-20:21:24.452051 211.185.125.124:789 -> 172.16.1.103:111

UDP TTL:43 TOS:0x0 ID:29733 IpLen:20 DgmLen:84

Len: 64

01 0A 8A 0A 00 00 00 00 00 00 00 02 00 01 86 A0 ................

00 00 00 02 00 00 00 03 00 00 00 00 00 00 00 00 ................

00 00 00 00 00 00 00 00 00 01 86 B8 00 00 00 01 ................

00 00 00 11 00 00 00 00 ........

=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=

03/15-20:21:24.730436 211.185.125.124:790 -> 172.16.1.103:32773

UDP TTL:43 TOS:0x0 ID:29781 IpLen:20 DgmLen:1104

Len: 1084

47 F7 9F 63 00 00 00 00 00 00 00 02 00 01 86 B8

Options:

A.

The attacker has conducted a network sweep on port 111


B.

The attacker has scanned and exploited the system using Buffer Overflow


C.

The attacker has used a Trojan on port 32773


D.

The attacker has installed a backdoor


Questions # 85:

After undergoing an external IT audit, George realizes his network is vulnerable to DDoS attacks.

What countermeasures could he take to prevent DDoS attacks?

Options:

A.

Enable direct broadcasts


B.

Disable direct broadcasts


C.

Disable BGP


D.

Enable BGP


Questions # 86:

What is the size value of a nibble?

Options:

A.

0.5 kilo byte


B.

0.5 bit


C.

0.5 byte


D.

2 bits


Questions # 87:

Madison is on trial for allegedly breaking into her university’s internal network. The police raided her dorm room and seized all of her computer equipment. Madison’s lawyer is trying to convince the judge that the seizure was unfounded and baseless. Under which US Amendment is Madison’s lawyer trying to prove the police violated?

Options:

A.

The 4th Amendment


B.

The 1st Amendment


C.

The 10th Amendment


D.

The 5th Amendment


Questions # 88:

Brian needs to acquire data from RAID storage. Which of the following acquisition methods is recommended to retrieve only the data relevant to the investigation?

Options:

A.

Static Acquisition


B.

Sparse or Logical Acquisition


C.

Bit-stream disk-to-disk Acquisition


D.

Bit-by-bit Acquisition


Questions # 89:

Paul's company is in the process of undergoing a complete security audit including logical and physical security testing. After all logical tests were performed; it is now time for the physical round to begin. None of the employees are made aware of this round of testing. The security-auditing firm sends in a technician dressed as an electrician. He waits outside in the lobby for some employees to get to work and follows behind them when they access the restricted areas. After entering the main office, he is able to get into the server room telling the IT manager that there is a problem with the outlets in that room. What type of attack has the technician performed?

Options:

A.

Tailgating


B.

Backtrapping


C.

Man trap attack


D.

Fuzzing


Questions # 90:

You should make at least how many bit-stream copies of a suspect drive?

Options:

A.

1


B.

2


C.

3


D.

4


Viewing page 6 out of 11 pages
Viewing questions 76-90 out of questions