Pass the ECCouncil CHFI v10 312-49v10 Questions and answers with CertsForce

Viewing page 14 out of 15 pages
Viewing questions 196-210 out of questions
Questions # 196:

Office documents (Word, Excel, PowerPoint) contain a code that allows tracking the MAC, or unique identifier, of the machine that created the document. What is that code called?

Options:

A.

the Microsoft Virtual Machine Identifier


B.

the Personal Application Protocol


C.

the Globally Unique ID


D.

the Individual ASCII String


Expert Solution
Questions # 197:

You are working on a thesis for your doctorate degree in Computer Science. Your thesis is based on HTML, DHTML, and other web-based languages and how they have evolved over the years.

You navigate to archive. org and view the HTML code of news.com. You then navigate to the current news.com website and copy over the source code. While searching through the code, you come across something abnormal: What have you found?

Options:

A.

Web bug


B.

CGI code


C.

Trojan.downloader


D.

Blind bug


Expert Solution
Questions # 198:

Bill is the accounting manager for Grummon and Sons LLC in Chicago. On a regular basis, he needs to send PDF documents containing sensitive information through E-mail to his customers.

Bill protects the PDF documents with a password and sends them to their intended recipients.

Why PDF passwords do not offer maximum protection?

Options:

A.

PDF passwords can easily be cracked by software brute force tools


B.

PDF passwords are converted to clear text when sent through E-mail


C.

PDF passwords are not considered safe by Sarbanes-Oxley


D.

When sent through E-mail, PDF passwords are stripped from the document completely


Expert Solution
Questions # 199:

George is the network administrator of a large Internet company on the west coast. Per corporate policy, none of the employees in the company are allowed to use FTP or SFTP programs without obtaining approval from the IT department. Few managers are using SFTP program on their computers. Before talking to his boss, George wants to have some proof of their activity. George wants to use Ethereal to monitor network traffic, but only SFTP traffic to and from his network.

What filter should George use in Ethereal?

Options:

A.

src port 23 and dst port 23


B.

udp port 22 and host 172.16.28.1/24


C.

net port 22


D.

src port 22 and dst port 22


Expert Solution
Questions # 200:

In the context of file deletion process, which of the following statement holds true?

Options:

A.

When files are deleted, the data is overwritten and the cluster marked as available


B.

The longer a disk is in use, the less likely it is that deleted files will be overwritten


C.

While booting, the machine may create temporary files that can delete evidence


D.

Secure delete programs work by completely overwriting the file in one go


Expert Solution
Questions # 201:

An Employee is suspected of stealing proprietary information belonging to your company that he had no rights to possess. The information was stored on the Employees Computer that was protected with the NTFS Encrypted File System (EFS) and you had observed him copy the files to a floppy disk just before leaving work for the weekend. You detain the Employee before he leaves the building and recover the floppy disks and secure his computer. Will you be able to break the encryption so that you can verify that that the employee was in possession of the proprietary information?

Options:

A.

EFS uses a 128-bit key that can't be cracked, so you will not be able to recover the information


B.

When the encrypted file was copied to the floppy disk, it was automatically unencrypted, so you can recover the information.


C.

The EFS Revoked Key Agent can be used on the Computer to recover the information


D.

When the Encrypted file was copied to the floppy disk, the EFS private key was also copied to the floppy disk, so you can recover the information.


Expert Solution
Questions # 202:

Jason has set up a honeypot environment by creating a DMZ that has no physical or logical access to his production network. In this honeypot, he has placed a server running Windows Active Directory. He has also placed a Web server in the DMZ that services a number of web pages that offer visitors a chance to download sensitive information by clicking on a button. A week later, Jason finds in his network logs how an intruder accessed the honeypot and downloaded sensitive information. Jason uses the logs to try and prosecute the intruder for stealing sensitive corporate information. Why will this not be viable?

Options:

A.

Entrapment


B.

Enticement


C.

Intruding into a honeypot is not illegal


D.

Intruding into a DMZ is not illegal


Expert Solution
Questions # 203:

Harold is a security analyst who has just run the rdisk /s command to grab the backup SAM files on a computer. Where should Harold navigate on the computer to find the file?

Options:

A.

%systemroot%\system32\LSA


B.

%systemroot%\system32\drivers\etc


C.

%systemroot%\repair


D.

%systemroot%\LSA


Expert Solution
Questions # 204:

You are the security analyst working for a private company out of France. Your current assignment is to obtain credit card information from a Swiss bank owned by that company. After initial reconnaissance, you discover that the bank security defenses are very strong and would take too long to penetrate. You decide to get the information by monitoring the traffic between the bank and one of its subsidiaries in London. After monitoring some of the traffic, you see a lot of FTP packets traveling back and forth. You want to sniff the traffic and extract usernames and passwords. What tool could you use to get this information?

Options:

A.

Airsnort


B.

Snort


C.

Ettercap


D.

RaidSniff


Expert Solution
Questions # 205:

When using Windows acquisitions tools to acquire digital evidence, it is important to use a well-tested hardware write-blocking device to:

Options:

A.

Automate Collection from image files


B.

Avoiding copying data from the boot partition


C.

Acquire data from host-protected area on a disk


D.

Prevent Contamination to the evidence drive


Expert Solution
Questions # 206:

The use of warning banners helps a company avoid litigation by overcoming an employee assumed __________________________. When connecting to the company's intranet, network or Virtual Private Network(VPN) and will allow the company's investigators to monitor, search and retrieve information stored within the network.

Options:

A.

Right to work


B.

Right of free speech


C.

Right to Internet Access


D.

Right of Privacy


Expert Solution
Questions # 207:

Why is it a good idea to perform a penetration test from the inside?

Options:

A.

It is never a good idea to perform a penetration test from the inside


B.

Because 70% of attacks are from inside the organization


C.

To attack a network from a hacker's perspective


D.

It is easier to hack from the inside


Expert Solution
Questions # 208:

Area density refers to:

Options:

A.

the amount of data per disk


B.

the amount of data per partition


C.

the amount of data per square inch


D.

the amount of data per platter


Expert Solution
Questions # 209:

While working for a prosecutor, what do you think you should do if the evidence you found appears to be exculpatory and is not being released to the defense?

Options:

A.

Keep the information of file for later review


B.

Destroy the evidence


C.

Bring the information to the attention of the prosecutor, his or her supervisor or finally to the judge


D.

Present the evidence to the defense attorney


Expert Solution
Questions # 210:

You work as a penetration tester for Hammond Security Consultants. You are currently working on a contract for the state government of California. Your next step is to initiate a DoS attack on their network. Why would you want to initiate a DoS attack on a system you are testing?

Options:

A.

Show outdated equipment so it can be replaced


B.

List weak points on their network


C.

Use attack as a launching point to penetrate deeper into the network


D.

Demonstrate that no system can be protected against DoS attacks


Expert Solution
Viewing page 14 out of 15 pages
Viewing questions 196-210 out of questions