Pass the ECCouncil CHFI v10 312-49v10 Questions and answers with CertsForce

Viewing page 3 out of 15 pages
Viewing questions 31-45 out of questions
Questions # 31:

An investigator enters the command sqlcmd -S WIN-CQQMK62867E -e -s"," -E as part of collecting the primary data file and logs from a database. What does the "WIN-CQQMK62867E” represent?

Options:

A.

Name of the Database


B.

Name of SQL Server


C.

Operating system of the system


D.

Network credentials of the database


Expert Solution
Questions # 32:

Which of the following protocols allows non-ASCII files, such as video, graphics, and audio, to be sent through the email messages?

Options:

A.

MIME


B.

BINHEX


C.

UT-16


D.

UUCODE


Expert Solution
Questions # 33:

Robert is a regional manager working in a reputed organization. One day, he suspected malware attack after unwanted programs started to popup after logging into his computer. The network administrator was called upon to trace out any intrusion on the computer and he/she finds that suspicious activity has taken place within Autostart locations. In this situation, which of the following tools is used by the network administrator to detect any intrusion on a system?

Options:

A.

Hex Editor


B.

Internet Evidence Finder


C.

Process Monitor


D.

Report Viewer


Expert Solution
Questions # 34:

Buffer overflow vulnerability of a web application occurs when it fails to guard its buffer properly and allows writing beyond its maximum size. Thus, it overwrites the_________. There are multiple forms of buffer overflow, including a Heap Buffer Overflow and a Format String Attack.

Options:

A.

Adjacent memory locations


B.

Adjacent bit blocks


C.

Adjacent buffer locations


D.

Adjacent string locations


Expert Solution
Questions # 35:

Event correlation is the process of finding relevance between the events that produce a final result. What type of correlation will help an organization to correlate events across a set of servers, systems, routers and network?

Options:

A.

Same-platform correlation


B.

Network-platform correlation


C.

Cross-platform correlation


D.

Multiple-platform correlation


Expert Solution
Questions # 36:

In which of these attacks will a steganalyst use a random message to generate a stego-object by using some steganography tool, to find the steganography algorithm used to hide the information?

Options:

A.

Chosen-message attack


B.

Known-cover attack


C.

Known-message attack


D.

Known-stego attack


Expert Solution
Questions # 37:

In Linux OS, different log files hold different information, which help the investigators to analyze various issues during a security incident. What information can the investigators obtain from the log file

var/log/dmesg?

Options:

A.

Kernel ring buffer information


B.

All mail server message logs


C.

Global system messages


D.

Debugging log messages


Expert Solution
Questions # 38:

Which of the following is NOT a physical evidence?

Options:

A.

Removable media


B.

Cables


C.

Image file on a hard disk


D.

Publications


Expert Solution
Questions # 39:

Which list contains the most recent actions performed by a Windows User?

Options:

A.

MRU


B.

Activity


C.

Recents


D.

Windows Error Log


Expert Solution
Questions # 40:

As part of extracting the system data, Jenifer has used the netstat command. What does this tool reveal?

Options:

A.

Status of users connected to the internet


B.

Net status of computer usage


C.

Information about network connections


D.

Status of network hardware


Expert Solution
Questions # 41:

Which one of the following is not a first response procedure?

Options:

A.

Preserve volatile data


B.

Fill forms


C.

Crack passwords


D.

Take photos


Expert Solution
Questions # 42:

Korey, a data mining specialist in a knowledge processing firm DataHub.com, reported his CISO that he has lost certain sensitive data stored on his laptop. The CISO wants his forensics investigation team to find if the data loss was accident or intentional. In which of the following category this case will fall?

Options:

A.

Civil Investigation


B.

Administrative Investigation


C.

Both Civil and Criminal Investigations


D.

Criminal Investigation


Expert Solution
Questions # 43:

Email archiving is a systematic approach to save and protect the data contained in emails so that it can be accessed fast at a later date. There are two main archive types, namely Local Archive and Server Storage Archive. Which of the following statements is correct while dealing with local archives?

Options:

A.

Server storage archives are the server information and settings stored on a local system, whereas the local archives are the local email client information stored on the mail server


B.

It is difficult to deal with the webmail as there is no offline archive in most cases. So consult your counsel on the case as to the best way to approach and gain access to the required data on servers


C.

Local archives should be stored together with the server storage archives in order to be admissible in a court of law


D.

Local archives do not have evidentiary value as the email client may alter the message data


Expert Solution
Questions # 44:

Which of the following is a precomputed table containing word lists like dictionary files and brute force lists and their hash values?

Options:

A.

Directory Table


B.

Rainbow Table


C.

Master file Table (MFT)


D.

Partition Table


Expert Solution
Questions # 45:

Which of the following is a device monitoring tool?

Options:

A.

Capsa


B.

Driver Detective


C.

Regshot


D.

RAM Capturer


Expert Solution
Viewing page 3 out of 15 pages
Viewing questions 31-45 out of questions