Pass the ECCouncil CHFI v10 312-49v10 Questions and answers with CertsForce

Viewing page 9 out of 15 pages
Viewing questions 121-135 out of questions
Questions # 121:

When searching through file headers for picture file formats, what should be searched to find a JPEG file in hexadecimal format?

Options:

A.

FF D8 FF E0 00 10


B.

FF FF FF FF FF FF


C.

FF 00 FF 00 FF 00


D.

EF 00 EF 00 EF 00


Expert Solution
Questions # 122:

Harold is finishing up a report on a case of network intrusion, corporate spying, and embezzlement that he has been working on for over six months. He is trying to find the right term to use in his report to describe network-enabled spying. What term should Harold use?

Options:

A.

Spycrack


B.

Spynet


C.

Netspionage


D.

Hackspionage


Expert Solution
Questions # 123:

Which of the following is a list of recently used programs or opened files?

Options:

A.

Most Recently Used (MRU)


B.

Recently Used Programs (RUP)


C.

Master File Table (MFT)


D.

GUID Partition Table (GPT)


Expert Solution
Questions # 124:

Netstat is a tool for collecting information regarding network connections. It provides a simple view of TCP and UDP connections, and their state and network traffic statistics. Which of the following commands shows you the TCP and UDP network connections, listening ports, and the identifiers?

Options:

A.

netstat – r


B.

netstat – ano


C.

netstat – b


D.

netstat – s


Expert Solution
Questions # 125:

Which of the following standard represents a legal precedent sent in 1993 by the Supreme Court of the United States regarding the admissibility of expert witnesses’ testimony during federal legal proceedings?

Options:

A.

IOCE


B.

SWGDE & SWGIT


C.

Frye


D.

Daubert


Expert Solution
Questions # 126:

What file is processed at the end of a Windows XP boot to initialize the logon dialog box?

Options:

A.

NTOSKRNL.EXE


B.

NTLDR


C.

LSASS.EXE


D.

NTDETECT.COM


Expert Solution
Questions # 127:

When carrying out a forensics investigation, why should you never delete a partition on a dynamic disk?

Options:

A.

All virtual memory will be deleted


B.

The wrong partition may be set to active


C.

This action can corrupt the disk


D.

The computer will be set in a constant reboot state


Expert Solution
Questions # 128:

Which of the following techniques can be used to beat steganography?

Options:

A.

Encryption


B.

Steganalysis


C.

Decryption


D.

Cryptanalysis


Expert Solution
Questions # 129:

What is one method of bypassing a system BIOS password?

Options:

A.

Removing the processor


B.

Removing the CMOS battery


C.

Remove all the system memory


D.

Login to Windows and disable the BIOS password


Expert Solution
Questions # 130:

Bob works as information security analyst for a big finance company. One day, the anomaly-based intrusion detection system alerted that a volumetric DDOS targeting the main IP of the main web server was occurring. What kind of attack is it?

Options:

A.

IDS attack


B.

APT


C.

Web application attack


D.

Network attack


Expert Solution
Questions # 131:

In Windows Security Event Log, what does an event id of 530 imply?

Options:

A.

Logon Failure – Unknown user name or bad password


B.

Logon Failure – User not allowed to logon at this computer


C.

Logon Failure – Account logon time restriction violation


D.

Logon Failure – Account currently disabled


Expert Solution
Questions # 132:

What type of analysis helps to identify the time and sequence of events in an investigation?

Options:

A.

Time-based


B.

Functional


C.

Relational


D.

Temporal


Expert Solution
Questions # 133:

Which of the following are small pieces of data sent from a website and stored on the user’s computer by the user’s web browser to track, validate, and maintain specific user information?

Options:

A.

Temporary Files


B.

Open files


C.

Cookies


D.

Web Browser Cache


Expert Solution
Questions # 134:

Which of the following tool can the investigator use to analyze the network to detect Trojan activities?

Options:

A.

Regshot


B.

TRIPWIRE


C.

RAM Computer


D.

Capsa


Expert Solution
Questions # 135:

When marking evidence that has been collected with the aa/ddmmyy/nnnn/zz format, what does the nnn denote?

 

Options:

A.

The year the evidence was taken


B.

The sequence number for the parts of the same exhibit


C.

The initials of the forensics analyst


D.

The sequential number of the exhibits seized


Expert Solution
Viewing page 9 out of 15 pages
Viewing questions 121-135 out of questions