Pass the ECCouncil CHFIv9 312-49v9 Questions and answers with CertsForce

Viewing page 1 out of 12 pages
Viewing questions 1-15 out of questions
Questions # 1:

Which of the following refers to the data that might still exist in a cluster even though the original file has been overwritten by another file?

Options:

A.

Sector


B.

Metadata


C.

MFT


D.

Slack Space


Expert Solution
Questions # 2:

The efforts to obtain information before a trail by demanding documents, depositions, questioned and answers written under oath, written requests for admissions of fact and examination of the scene is a description of what legal term?

Options:

A.

Detection


B.

Hearsay


C.

Spoliation


D.

Discovery


Expert Solution
Questions # 3:

E-mail logs contain which of the following information to help you in your investigation? (Choose four.)

Options:

A.

user account that was used to send the account


B.

attachments sent with the e-mail message


C.

unique message identifier


D.

contents of the e-mail message


E.

date and time the message was sent


Expert Solution
Questions # 4:

George is a senior security analyst working for a state agency in Florida. His state's congress just passed a bill mandating every state agency to undergo a security audit annually. After learning what will be required, George needs to implement an IDS as soon as possible before the first audit occurs. The state bill requires that an IDS with a "time-based induction machine" be used.

What IDS feature must George implement to meet this requirement?

Options:

A.

Signature-based anomaly detection


B.

Pattern matching


C.

Real-time anomaly detection


D.

Statistical-based anomaly detection


Expert Solution
Questions # 5:

George is the network administrator of a large Internet company on the west coast. Per corporate policy, none of the employees in the company are allowed to use FTP or SFTP programs without obtaining approval from the IT department. Few managers are using SFTP program on their computers. Before talking to his boss, George wants to have some proof of their activity. George wants to use Ethereal to monitor network traffic, but only SFTP traffic to and from his network.

What filter should George use in Ethereal?

Options:

A.

src port 23 and dst port 23


B.

udp port 22 and host 172.16.28.1/24


C.

net port 22


D.

src port 22 and dst port 22


Expert Solution
Questions # 6:

What method of computer forensics will allow you to trace all ever-established user accounts on a Windows 2000 sever the course of its lifetime?

Options:

A.

forensic duplication of hard drive


B.

analysis of volatile data


C.

comparison of MD5 checksums


D.

review of SIDs in the Registry


Expert Solution
Questions # 7:

You are working in the security Department of law firm. One of the attorneys asks you about the topic of sending fake email because he has a client who has been charged with doing just that. His client alleges that he is innocent and that there is no way for a fake email to actually be sent. You inform the attorney that his client is mistaken and that fake email is possibility and that you can prove it. You return to your desk and craft a fake email to the attorney that appears to come from his boss. What port do you send the email to on the company SMTP server?

Options:

A.

10


B.

25


C.

110


D.

135


Expert Solution
Questions # 8:

Corporate investigations are typically easier than public investigations because:

Options:

A.

the users have standard corporate equipment and software


B.

the investigator does not have to get a warrant


C.

the investigator has to get a warrant


D.

the users can load whatever they want on their machines


Expert Solution
Questions # 9:

Jason is the security administrator of ACMA metal Corporation. One day he notices the company's Oracle database server has been compromised and the customer information along with financial data has been stolen. The financial loss will be in millions of dollars if the database gets into the hands of the competitors. Jason wants to report this crime to the law enforcement agencies immediately.

Which organization coordinates computer crimes investigations throughout the United States?

Options:

A.

Internet Fraud Complaint Center


B.

Local or national office of the U.S. Secret Service


C.

National Infrastructure Protection Center


D.

CERT Coordination Center


Expert Solution
Questions # 10:

Bob has been trying to penetrate a remote production system for the past two weeks. This time however, he is able to get into the system. He was able to use the System for a period of three weeks. However, law enforcement agencies were recoding his every activity and this was later presented as evidence.

The organization had used a Virtual Environment to trap Bob. What is a Virtual Environment?

Options:

A.

A Honeypot that traps hackers


B.

A system Using Trojaned commands


C.

An environment set up after the user logs in


D.

An environment set up before a user logs in


Expert Solution
Questions # 11:

What is the target host IP in the following command?

Options:

A.

172.16.28.95


B.

10.10.150.1


C.

Firewalk does not scan target hosts


D.

This command is using FIN packets, which cannot scan target hosts


Expert Solution
Questions # 12:

Microsoft Outlook maintains email messages in a proprietary format in what type of file?

Options:

A.

.email


B.

.mail


C.

.pst


D.

.doc


Expert Solution
Questions # 13:

Under which Federal Statutes does FBI investigate for computer crimes involving e-mail scams and mail fraud?

Options:

A.

18 U.S.C. 1029 Possession of Access Devices


B.

18 U.S.C. 1030 Fraud and related activity in connection with computers


C.

18 U.S.C. 1343 Fraud by wire, radio or television


D.

18 U.S.C. 1361 Injury to Government Property


E.

18 U.S.C. 1362 Government communication systems


F.

18 U.S.C. 1831 Economic Espionage Act


G.

18 U.S.C. 1832 Trade Secrets Act


Expert Solution
Questions # 14:

Harold is a security analyst who has just run the rdisk /s command to grab the backup SAM files on a computer. Where should Harold navigate on the computer to find the file?

Options:

A.

%systemroot%\system32\LSA


B.

%systemroot%\system32\drivers\etc


C.

%systemroot%\repair


D.

%systemroot%\LSA


Expert Solution
Questions # 15:

What is the following command trying to accomplish?

Options:

A.

Verify that UDP port 445 is open for the 192.168.0.0 network


B.

Verify that TCP port 445 is open for the 192.168.0.0 network


C.

Verify that NETBIOS is running for the 192.168.0.0 network


D.

Verify that UDP port 445 is closed for the 192.168.0.0 network


Expert Solution
Viewing page 1 out of 12 pages
Viewing questions 1-15 out of questions