Pass the ECCouncil CHFIv9 312-49v9 Questions and answers with CertsForce

Viewing page 12 out of 12 pages
Viewing questions 166-180 out of questions
Questions # 166:

BMP (Bitmap) is a standard file format for computers running the Windows operating system. BMP images can range from black and white (1 bit per pixel) up to 24 bit color (16.7 million colors). Each bitmap file contains a header, the RGBQUAD array, information header, and image data. Which of the following element specifies the dimensions, compression type, and color format for the bitmap?

Options:

A.

Information header


B.

Image data


C.

The RGBQUAD array


D.

Header


Expert Solution
Questions # 167:

What is the investigator trying to view by issuing the command displayed in the following screenshot?

Question # 167

Options:

A.

List of services stopped


B.

List of services closed recently


C.

List of services recently started


D.

List of services installed


Expert Solution
Questions # 168:

What does the command “C:\>wevtutil gl ” display?

Options:

A.

Configuration information of a specific Event Log


B.

Event logs are saved in .xml format


C.

Event log record structure


D.

List of available Event Logs


Expert Solution
Questions # 169:

In which cloud crime do attackers try to compromise the security of the cloud environment in order to steal data or inject a malware?

Options:

A.

Cloud as an Object


B.

Cloud as a Tool


C.

Cloud as an Application


D.

Cloud as a Subject


Expert Solution
Questions # 170:

Buffer overflow vulnerabilities, of web applications, occurs when the application fails to guard its buffer properly and allows writing beyond its maximum size. Thus, it overwrites the _________. There are multiple forms of buffer overflow, including a Heap Buffer Overflow and a Format String Attack.

Options:

A.

Adjacent buffer locations


B.

Adjacent string locations


C.

Adjacent bit blocks


D.

Adjacent memory locations


Expert Solution
Questions # 171:

Which among the following tools can help a forensic investigator to access the registry files during postmortem analysis?

Options:

A.

RegistryChangesView


B.

RegDIIView


C.

RegRipper


D.

ProDiscover


Expert Solution
Questions # 172:

Robert, a cloud architect, received a huge bill from the cloud service provider, which usually doesn't happen. After analyzing the bill, he found that the cloud resource consumption was very high. He then examined the cloud server and discovered that a malicious code was running on the server, which was generating huge but harmless traffic from the server. This means that the server has been compromised by an attacker with the sole intention to hurt the cloud customer financially. Which attack is described in the above scenario?

Options:

A.

XSS Attack


B.

DDoS Attack (Distributed Denial of Service)


C.

Man-in-the-cloud Attack


D.

EDoS Attack (Economic Denial of Service)


Expert Solution
Questions # 173:

Graphics Interchange Format (GIF) is a ____ RGB bitmap image format for images with up to 256 distinct colors per frame.

Options:

A.

8-bit


B.

32-bit


C.

16-bit


D.

24-bit


Expert Solution
Questions # 174:

Which of the following is a precomputed table containing word lists like dictionary files and brute force lists and their hash values?

Options:

A.

Directory Table


B.

Rainbow Table


C.

Master file Table (MFT)


D.

Partition Table


Expert Solution
Questions # 175:

Smith, an employee of a reputed forensic investigation firm, has been hired by a private organization to investigate a laptop that is suspected to be involved in the hacking of the organization’s DC server. Smith wants to find all the values typed into the Run box in the Start menu. Which of the following registry keys will Smith check to find the above information?

Options:

A.

TypedURLs key


B.

MountedDevices key


C.

UserAssist Key


D.

RunMRU key


Expert Solution
Questions # 176:

Brian needs to acquire data from RAID storage. Which of the following acquisition methods is recommended to retrieve only the data relevant to the investigation?

Options:

A.

Static Acquisition


B.

Sparse or Logical Acquisition


C.

Bit-stream disk-to-disk Acquisition


D.

Bit-by-bit Acquisition


Expert Solution
Viewing page 12 out of 12 pages
Viewing questions 166-180 out of questions