Pass the ECCouncil CHFIv9 312-49v9 Questions and answers with CertsForce

Viewing page 2 out of 12 pages
Viewing questions 16-30 out of questions
Questions # 16:

Sectors in hard disks typically contain how many bytes?

Options:

A.

256


B.

512


C.

1024


D.

2048


Expert Solution
Questions # 17:

You are carrying out the last round of testing for your new website before it goes live. The website has many dynamic pages and connects to a SQL backend that accesses your product inventory in a database. You come across a web security site that recommends inputting the following code into a search field on web pages to check for vulnerabilities: When you type this and click on search, you receive a pop-up window that says: "This is a test."

What is the result of this test?

Options:

A.

Your website is vulnerable to CSS


B.

Your website is not vulnerable


C.

Your website is vulnerable to SQL injection


D.

Your website is vulnerable to web bugs


Expert Solution
Questions # 18:

It takes _____________ mismanaged case/s to ruin your professional reputation as a computer forensics examiner?

Options:

A.

by law, three


B.

quite a few


C.

only one


D.

at least two


Expert Solution
Questions # 19:

One way to identify the presence of hidden partitions on a suspect's hard drive is to:

Options:

A.

Add up the total size of all known partitions and compare it to the total size of the hard drive


B.

Examine the FAT and identify hidden partitions by noting an H in the partition Type field


C.

Examine the LILO and note an H in the partition Type field


D.

It is not possible to have hidden partitions on a hard drive


Expert Solution
Questions # 20:

Software firewalls work at which layer of the OSI model?

Options:

A.

Application


B.

Network


C.

Transport


D.

Data Link


Expert Solution
Questions # 21:

On Linux/Unix based Web servers, what privilege should the daemon service be run under?

Options:

A.

Guest


B.

Root


C.

You cannot determine what privilege runs the daemon service


D.

Something other than root


Expert Solution
Questions # 22:

You just passed your ECSA exam and are about to start your first consulting job running security audits for a financial institution in Los Angeles. The IT manager of the company you will be working for tries to see if you remember your ECSA class. He asks about the methodology you will be using to test the company's network. How would you answer?

Options:

A.

Microsoft Methodology


B.

Google Methodology


C.

IBM Methodology


D.

LPT Methodology


Expert Solution
Questions # 23:

From the following spam mail header, identify the host IP that sent this spam?

From jie02@netvigator.com jie02@netvigator.com Tue Nov 27 17:27:11 2001

Received: from viruswall.ie.cuhk.edu.hk (viruswall [137.189.96.52]) by eng.ie.cuhk.edu.hk

(8.11.6/8.11.6) with ESMTP id

fAR9RAP23061 for ; Tue, 27 Nov 2001 17:27:10 +0800 (HKT)

Received: from mydomain.com (pcd249020.netvigator.com [203.218.39.20]) by

viruswall.ie.cuhk.edu.hk (8.12.1/8.12.1)

with SMTP id fAR9QXwZ018431 for ; Tue, 27 Nov 2001 17:26:36 +0800 (HKT)

Message-Id: >200111270926.fAR9QXwZ018431@viruswall.ie.cuhk.edu.hk

From: "china hotel web"

To: "Shlam"

Subject: SHANGHAI (HILTON HOTEL) PACKAGE

Date: Tue, 27 Nov 2001 17:25:58 +0800 MIME-Version: 1.0

X-Priority: 3 X-MSMail-

Priority: Normal

Reply-To: "china hotel web"

Options:

A.

137.189.96.52


B.

8.12.1.0


C.

203.218.39.20


D.

203.218.39.50


Expert Solution
Questions # 24:

Which legal document allows law enforcement to search an office, place of business, or other locale for evidence relating to an alleged crime?

Options:

A.

bench warrant


B.

wire tap


C.

subpoena


D.

search warrant


Expert Solution
Questions # 25:

You are assigned to work in the computer forensics lab of a state police agency. While working on a high profile criminal case, you have followed every applicable procedure, however your boss is still concerned that the defense attorney might question whether evidence has been changed while at the lab. What can you do to prove that the evidence is the same as it was when it first entered the lab?

Options:

A.

make an MD5 hash of the evidence and compare it with the original MD5 hash that was taken when the evidence first entered the lab


B.

make an MD5 hash of the evidence and compare it to the standard database developed by NIST


C.

there is no reason to worry about this possible claim because state labs are certified


D.

sign a statement attesting that the evidence is the same as it was when it entered the lab


Expert Solution
Questions # 26:

Lance wants to place a honeypot on his network. Which of the following would be your recommendations?

Options:

A.

Use a system that has a dynamic addressing on the network


B.

Use a system that is not directly interacting with the router


C.

Use it on a system in an external DMZ in front of the firewall


D.

It doesn't matter as all replies are faked


Expert Solution
Questions # 27:

The offset in a hexadecimal code is:

Options:

A.

The last byte after the colon


B.

The 0x at the beginning of the code


C.

The 0x at the end of the code


D.

The first byte after the colon


Expert Solution
Questions # 28:

What operating system would respond to the following command?

Options:

A.

Windows 95


B.

FreeBSD


C.

Windows XP


D.

Mac OS X


Expert Solution
Questions # 29:

Kyle is performing the final testing of an application he developed for the accounting department.

His last round of testing is to ensure that the program is as secure as possible. Kyle runs the following command. What is he testing at this point?

#include #include int main(int argc, char

*argv[]) { char buffer[10]; if (argc < 2) { fprintf (stderr, "USAGE: %s string\n", argv[0]); return 1; }

strcpy(buffer, argv[1]); return 0; }

Options:

A.

Buffer overflow


B.

SQL injection


C.

Format string bug


D.

Kernal injection


Expert Solution
Questions # 30:

You are working for a local police department that services a population of 1,000,000 people and you have been given the task of building a computer forensics lab. How many law-enforcement computer investigators should you request to staff the lab?

Options:

A.

8


B.

1


C.

4


D.

2


Expert Solution
Viewing page 2 out of 12 pages
Viewing questions 16-30 out of questions